TWI787026B - Method for controlling testing device and testing device controlling system - Google Patents

Method for controlling testing device and testing device controlling system Download PDF

Info

Publication number
TWI787026B
TWI787026B TW110149496A TW110149496A TWI787026B TW I787026 B TWI787026 B TW I787026B TW 110149496 A TW110149496 A TW 110149496A TW 110149496 A TW110149496 A TW 110149496A TW I787026 B TWI787026 B TW I787026B
Authority
TW
Taiwan
Prior art keywords
test
time
computer hardware
software
hardware lock
Prior art date
Application number
TW110149496A
Other languages
Chinese (zh)
Other versions
TW202326445A (en
Inventor
蘇子雅
施翔文
Original Assignee
致茂電子股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 致茂電子股份有限公司 filed Critical 致茂電子股份有限公司
Priority to TW110149496A priority Critical patent/TWI787026B/en
Application granted granted Critical
Publication of TWI787026B publication Critical patent/TWI787026B/en
Publication of TW202326445A publication Critical patent/TW202326445A/en

Links

Images

Landscapes

  • Testing And Monitoring For Control Systems (AREA)
  • Selective Calling Equipment (AREA)
  • Debugging And Monitoring (AREA)

Abstract

A method for controlling a testing device includes following steps: determining whether a dongle is readable or not; determining a used time stored in the dongle is less than a threshold time stored in a back plane of the testing device or not if it is determined that the dongle is readable; activating a testing software of the testing device and monitoring a testing time of the testing software of the testing device if it is determined that the used time is less than the threshold time; storing the testing time of the testing software of the testing device in a memory; and storing the testing time of the testing software of the testing device in the dongle periodically.

Description

測試機管控方法及測試機管控系統Testing machine management and control method and testing machine management and control system

本案係有關於一種管控方法及管控系統,且特別是有關於一種測試機管控方法及測試機管控系統。This case is about a control method and a control system, and especially about a test machine control method and a test machine control system.

半導體測試系統旨在測試積體電路(Integrated Circuit, IC)的電性功能,以確保積體電路符合相關規範。The semiconductor test system is designed to test the electrical function of an integrated circuit (IC), so as to ensure that the integrated circuit complies with relevant specifications.

由於半導體測試系統之價格高昂,租借半導體測試系統之模式應用而生。然而,現行的租借模式之管控機制尚存安全性的疑慮,諸如管控機制遭破解,此一狀況將導致半導體測試系統之租借廠商蒙受損失,因此,如何提升租借模式之管控機制的安全性,成為本領域廠商急需解決的問題。Due to the high price of the semiconductor test system, the model application of the leased semiconductor test system was born. However, there are still doubts about the safety of the current control mechanism of the rental model. For example, the control mechanism is cracked. This situation will cause losses to the rental manufacturers of semiconductor test systems. Manufacturers in this field urgently need to solve the problem.

本案內容之一技術態樣係關於一種測試機管控方法,其包含以下步驟:判斷是否得以讀取電腦硬體鎖;當判定讀取到電腦硬體鎖,判斷儲存於電腦硬體鎖的使用時間是否小於儲存於測試機之背板的臨界時間;當判定使用時間小於臨界時間,啟動測試機的測試軟體,並監測測試機的測試軟體之測試時間;儲存測試機的測試軟體之測試時間於記憶體;以及週期性紀錄測試機的測試軟體之測試時間於電腦硬體鎖以產生使用時間。One of the technical aspects of this case is related to a test machine control method, which includes the following steps: judging whether the computer hardware lock can be read; when it is determined that the computer hardware lock has been read, judging the use time stored in the computer hardware lock Whether it is less than the critical time stored in the backboard of the tester; when it is determined that the use time is less than the critical time, start the test software of the tester and monitor the test time of the test software of the tester; store the test time of the test software of the tester in the memory body; and periodically record the test time of the test software of the test machine in the computer hardware lock to generate the use time.

本案內容之另一技術態樣係關於一種測試機管控系統,此測試機管控系統包含記憶體及處理器。記憶體用以儲存複數個指令。處理器用以讀取該些指令,並執行以下步驟:判斷是否得以讀取電腦硬體鎖;當判定讀取到電腦硬體鎖,判斷儲存於電腦硬體鎖的使用時間是否小於儲存於測試機之背板的臨界時間;當判定使用時間小於臨界時間,啟動測試機的測試軟體,並監測測試機的測試軟體之測試時間;儲存測試機的測試軟體之測試時間於記憶體;以及週期性紀錄測試機的測試軟體之測試時間於電腦硬體鎖以產生使用時間。Another technical aspect of the content of this case relates to a test machine control system, which includes memory and processors. The memory is used to store a plurality of instructions. The processor is used to read these instructions, and perform the following steps: determine whether the computer hardware lock can be read; when it is determined that the computer hardware lock is read, determine whether the usage time stored in the computer hardware lock is less than that stored in the testing machine The critical time of the backplane; when it is determined that the use time is less than the critical time, start the test software of the test machine, and monitor the test time of the test software of the test machine; store the test time of the test software of the test machine in the memory; and periodically record The test time of the test software of the test machine is locked in the computer hardware to generate the use time.

因此,根據本案之技術內容,本案實施例所示之測試機管控方法及測試機管控系統可使用電腦硬體鎖作為管控機制之安全啟動條件,以提升管控機制的安全性。此外,本案之測試機管控方法及測試機管控系統可比較電腦硬體鎖內存之使用時間及測試機背板內存之臨界時間,以確保測試機尚處於可使用階段,進而準確地管控測試機之使用權限以及使用時間。Therefore, according to the technical content of this case, the testing machine management and control method and testing machine management and control system shown in the embodiment of this case can use the computer hardware lock as the security activation condition of the control mechanism to improve the security of the control mechanism. In addition, the testing machine control method and testing machine control system in this case can compare the use time of the computer hardware lock memory and the critical time of the test machine backplane memory to ensure that the testing machine is still in the usable stage, and then accurately control the testing machine. Usage rights and usage time.

為了使本揭示內容的敘述更加詳盡與完備,下文針對了本案的實施態樣與具體實施例提出了說明性的描述;但這並非實施或運用本案具體實施例的唯一形式。實施方式中涵蓋了多個具體實施例的特徵以及用以建構與操作這些具體實施例的方法步驟與其順序。然而,亦可利用其他具體實施例來達成相同或均等的功能與步驟順序。In order to make the description of the disclosure more detailed and complete, the following provides an illustrative description of the implementation and specific embodiments of the present case; but this is not the only form of implementing or using the specific embodiments of the present case. The description covers features of various embodiments as well as method steps and their sequences for constructing and operating those embodiments. However, other embodiments can also be used to achieve the same or equivalent functions and step sequences.

除非本說明書另有定義,此處所用的科學與技術詞彙之含義與本案所屬技術領域中具有通常知識者所理解與慣用的意義相同。此外,在不和上下文衝突的情形下,本說明書所用的單數名詞涵蓋該名詞的複數型;而所用的複數名詞時亦涵蓋該名詞的單數型。Unless otherwise defined in this specification, the meanings of scientific and technical terms used herein are the same as those understood and commonly used by those with ordinary knowledge in the technical field to which this case belongs. In addition, the singular nouns used in this specification include the plural forms of the nouns, and the plural nouns used also include the singular forms of the nouns, unless the context conflicts with the context.

另外,關於本文中所使用之「耦接」,可指二或多個元件相互直接作實體或電性接觸,或是相互間接作實體或電性接觸,亦可指二或多個元件相互操作或動作。In addition, regarding the "coupling" used herein, it may refer to two or more elements being in direct physical or electrical contact with each other, or indirect physical or electrical contact with each other, or it may refer to two or more elements interoperating. or action.

第1圖係依照本案一實施例繪示一種測試機管控方法100的流程示意圖。為使本案之測試機管控方法100易於理解,請一併參閱第2圖,其係依照本案一實施例繪示一種測試機管控系統200、電腦硬體鎖300及測試機400的電路方塊示意圖。於第2圖中,測試機管控系統200包含記憶體210及處理器220,其中記憶體200耦接於處理器220,且由處理器220讀取記憶體210儲存之複數個指令以執行相關步驟。FIG. 1 is a schematic flowchart illustrating a testing machine management and control method 100 according to an embodiment of the present application. In order to make the testing machine management and control method 100 of this case easy to understand, please also refer to FIG. 2 , which is a schematic circuit block diagram of a testing machine management and control system 200 , a computer hardware lock 300 and a testing machine 400 according to an embodiment of this case. In Figure 2, the testing machine management and control system 200 includes a memory 210 and a processor 220, wherein the memory 200 is coupled to the processor 220, and the processor 220 reads a plurality of instructions stored in the memory 210 to execute related steps .

請參閱第1圖與第2圖,於步驟105中,本案之測試機管控方法100預備啟動測試軟體。於步驟110中,藉由處理器220來判斷是否得以讀取電腦硬體鎖300。舉例而言,當使用者欲使用測試機400來對積體電路(IC)進行測試時,本案需確保使用者擁有電腦硬體鎖300,以作為安全啟動之用。Please refer to FIG. 1 and FIG. 2. In step 105, the testing machine management and control method 100 of this case prepares to start the testing software. In step 110 , it is judged by the processor 220 whether the computer hardware lock 300 can be read. For example, when the user intends to use the testing machine 400 to test the integrated circuit (IC), in this case, it is necessary to ensure that the user has the computer hardware lock 300 for safe activation.

在一實施例中,上述電腦硬體鎖300可為keypro(或稱Dongle),然本案不以此實施例為限,電腦硬體鎖300亦可採用其餘合適之元器件來加以實現。在啟用keypro時需要使用主金鑰(master key)才可燒錄特定身分認證碼(ID),而master key僅有廠商內部留存,讀取時需要ID,因此使用者無法破解keypro內所存的使用時間與其它資訊,亦無法更改其設定。據此,本案應用電腦硬體鎖300而增進測試機400管控之安全性。在另一實施例中,本案之電腦硬體鎖300可透過通用序列匯流排(Universal Serial Bus, USB)與測試機管控系統200進行連結,然本案不以此實施例為限,電腦硬體鎖300亦可採用其餘合適之元器件來與測試機管控系統200進行連結。In one embodiment, the above-mentioned computer hardware lock 300 can be a keypro (or Dongle), but this case is not limited to this embodiment, and the computer hardware lock 300 can also be realized by using other suitable components. When keypro is enabled, a master key (master key) is required to burn a specific identity authentication code (ID), and the master key is only retained internally by the manufacturer, and the ID is required for reading, so users cannot crack the stored ID in keypro. time and other information, and its settings cannot be changed. Accordingly, in this case, the computer hardware lock 300 is used to enhance the security of the control of the testing machine 400 . In another embodiment, the computer hardware lock 300 of this case can be connected with the testing machine management and control system 200 through a universal serial bus (Universal Serial Bus, USB), but this case is not limited to this embodiment, the computer hardware lock The 300 can also use other suitable components to connect with the testing machine management and control system 200 .

於執行步驟110後,倘若處理器220判定讀取到電腦硬體鎖300,則表示使用者確實具有電腦硬體鎖300,此時會執行步驟120,藉由處理器220以判斷儲存於電腦硬體鎖300的使用時間是否小於儲存於測試機400之背板410的臨界時間。舉例而言,本案除需確保使用者擁有電腦硬體鎖300外,尚需進一步判斷使用者是否依然具有使用權限,因此,本案還會判斷目前的整體使用使間是否低於臨界時間。在一實施例中,電腦硬體鎖300會綁定背板410之ID,以確保兩者確實為同一使用者所租借之整套測試相關系統。反之,背板410亦會綁定電腦硬體鎖300之ID。After step 110 is executed, if the processor 220 determines that the computer hardware lock 300 has been read, it means that the user does have the computer hardware lock 300. At this time, step 120 will be executed, and the processor 220 will determine that the hardware lock 300 is stored in the computer hardware. Whether the use time of the body lock 300 is less than the critical time stored in the back panel 410 of the testing machine 400 . For example, in this case, in addition to ensuring that the user has the computer hardware lock 300, it is necessary to further determine whether the user still has the right to use it. Therefore, this case will also determine whether the current overall usage time is lower than the critical time. In one embodiment, the computer hardware lock 300 is bound with the ID of the backboard 410 to ensure that the two are indeed a whole test-related system rented by the same user. On the contrary, the ID of the computer hardware lock 300 will also be bound to the backboard 410 .

於執行步驟120後,若判定使用時間小於臨界時間,則表示使用者確實具有使用權限,此時會執行步驟140,啟動測試機400的測試軟體,並監測測試機400的測試軟體之測試時間。在一實施例中,本案之測試機管控方法100可藉由系統軟體(monitor)偵測測試軟體的開始與結束以取得測試軟體之測試時間。After step 120 is executed, if it is determined that the use time is less than the critical time, it means that the user does have the use authority. At this time, step 140 will be executed to start the test software of the test machine 400 and monitor the test time of the test software of the test machine 400. In one embodiment, the test machine management and control method 100 of the present application can detect the start and end of the test software by the system software (monitor) to obtain the test time of the test software.

以廠商設定最大臨界時間為2160小時為例,此最大臨界時間會於測試機400出廠前寫入背板410中,因此,使用者無法自行撰寫程式修改背板410儲存的最大臨界時間,以確保可切實判斷使用者是否具有使用權限。當使用者欲使用測試機400時,本案會判斷電腦硬體鎖300內存的當前使用使間是否小於最大臨界時間2160小時。若判定當前使用時間小於最大臨界時間,則表示當前使用時間還在最大臨界時間2160小時之內,因此,使用者確實具有使用權限,可啟動測試機400的測試軟體以對積體電路進行相關測試。然本案之臨界時間不以上述實施例之2160小時為限,其僅用以例示性地說明本案的實現方式之一。Taking the maximum critical time set by the manufacturer as 2160 hours as an example, this maximum critical time will be written into the backplane 410 before the testing machine 400 leaves the factory. Therefore, users cannot write programs to modify the maximum critical time stored in the backplane 410 to ensure Can actually judge whether the user has the usage authority. When the user intends to use the testing machine 400, the case will determine whether the current usage time of the memory of the computer hardware lock 300 is less than the maximum critical time of 2160 hours. If it is determined that the current use time is less than the maximum critical time, it means that the current use time is still within 2160 hours of the maximum critical time. Therefore, the user does have the right to use and can start the test software of the testing machine 400 to perform related tests on the integrated circuit. . However, the critical time of this case is not limited to 2160 hours in the above-mentioned embodiment, which is only used to illustrate one of the implementation methods of this case.

於步驟110、120中,倘若處理器220判定無法讀取到電腦硬體鎖300,或處理器220判定使用時間不小於臨界時間,則執行步驟115,藉由處理器220禁止啟動測試軟體,並輸出警示信息。舉例而言,當處理器220判定無法讀取到電腦硬體鎖300,表示使用者並未擁有作為安全啟動之用的電腦硬體鎖300,因此,禁止啟動測試軟體,並輸出警示信息以提示使用者。此外,當處理器220判定使用時間不小於臨界時間,表示測試機400之使用時間已超過廠商提供的最大臨界時間,此時使用者已不再具有使用權限,處理器220會輸出警示信息,以提示使用者需先進行結算並繳交使用費用。In steps 110 and 120, if the processor 220 determines that the computer hardware lock 300 cannot be read, or the processor 220 determines that the use time is not less than the critical time, then step 115 is executed, and the test software is prohibited from being started by the processor 220, and Output a warning message. For example, when the processor 220 determines that the computer hardware lock 300 cannot be read, it means that the user does not have the computer hardware lock 300 for secure booting. Therefore, it is forbidden to start the test software, and a warning message is output to prompt user. In addition, when the processor 220 determines that the use time is not less than the critical time, it means that the use time of the tester 400 has exceeded the maximum critical time provided by the manufacturer. At this time, the user no longer has the use authority, and the processor 220 will output a warning message to Prompt the user to settle and pay the usage fee first.

請參閱步驟150,可藉由處理器220儲存測試機400的測試軟體之測試時間於記憶體210。於步驟160中,可藉由處理器220週期性紀錄測試機400的測試軟體之測試時間於電腦硬體鎖300以產生使用時間。Please refer to step 150 , the test time of the test software of the test machine 400 can be stored in the memory 210 by the processor 220 . In step 160 , the processor 220 may periodically record the testing time of the testing software of the testing machine 400 in the computer hardware lock 300 to generate usage time.

舉例而言,記憶體210之存取速度較快,因此,本案可經常性地將測試時間存於記憶體210中,例如每隔第一周期(如每分鐘)將測試時間存於記憶體210內,以更加準確地掌握使用者之測試時間,但又不至於影響整體運作速度。由於本案於測試期間,將不斷地去紀錄並比較測試時間的正確性,即便使用者透過特殊方式離開軟體(如直接關機或中止軟體),亦無需擔心漏掉對於使用時間的紀錄,因此,使用者無法透過特殊方式以破解本案之機制。在一實施例中,上述記憶體210可為測試機管控系統200上的記憶體映射(shared memory)。For example, the access speed of the memory 210 is relatively fast, therefore, in this case, the test time can be stored in the memory 210 frequently, for example, the test time is stored in the memory 210 every first cycle (such as every minute) In order to more accurately grasp the user's test time, but it will not affect the overall operation speed. Since this case will continuously record and compare the accuracy of the test time during the test period, even if the user leaves the software in a special way (such as directly shutting down or stopping the software), there is no need to worry about missing the record of the usage time. Therefore, use Those who cannot use special methods to crack the mechanism of this case. In one embodiment, the above-mentioned memory 210 may be a shared memory on the testing machine management system 200 .

此外,電腦硬體鎖300之存取速度低於記憶體210,因此,本案週期性地將測試時間存於電腦硬體鎖300中,例如每隔第二周期(如每小時)將測試時間存於電腦硬體鎖300內,以將測試時間一併存到安全性更佳的電腦硬體鎖300,且拉長儲存時間而不至於影響整體運作速度。然本案不以上述實施例所示之每分鐘紀錄及每小時紀錄為限,紀錄之時間及記憶體210之種類皆可以其餘合適的條件來加以實現。此外,需說明的是,本案不以第1、2圖所示之步驟及結構為限,其僅用以例示性地繪示本案的實現方式之一。In addition, the access speed of the computer hardware lock 300 is lower than that of the memory 210. Therefore, this case periodically stores the test time in the computer hardware lock 300, for example, the test time is stored every second cycle (such as every hour). In the computer hardware lock 300, the test time can be stored in the computer hardware lock 300 with better security, and the storage time can be prolonged without affecting the overall operation speed. However, this case is not limited to the recording per minute and recording per hour shown in the above-mentioned embodiments, the recording time and the type of memory 210 can be realized with other suitable conditions. In addition, it should be noted that this application is not limited to the steps and structures shown in Figures 1 and 2, which are only used to illustrate one of the implementation methods of this application.

第3圖係依照本案一實施例繪示一種測試機管控方法100A的流程示意圖。相較於第1圖所示之測試機管控方法100,第3圖之測試機管控方法100A更具有判斷使用時間與測試時間的步驟130A、判斷測試時間是否得以紀錄至電腦硬體鎖的步驟170A…等等步驟,將於後文中詳細說明。FIG. 3 is a schematic flowchart illustrating a testing machine management and control method 100A according to an embodiment of the present application. Compared with the testing machine management and control method 100 shown in FIG. 1, the testing machine management and control method 100A in FIG. 3 has a step 130A of judging the usage time and testing time, and a step 170A of judging whether the testing time can be recorded in the computer hardware lock ... and other steps will be described in detail later.

為使本案之測試機管控方法100A易於理解,請一併參閱第4圖,其係依照本案一實施例繪示一種測試機管控系統200A、電腦硬體鎖300A及測試機400A的電路方塊示意圖。於第4圖中,記憶體210A耦接於處理器220A,且由處理器220A讀取記憶體210A儲存之複數個指令以執行相關步驟。此外,測試機管控系統200A可透過資料線500A耦接於測試機400A,且測試機400A可透過測試載板430A以對積體電路進行測試。In order to make the testing machine control method 100A of this case easy to understand, please also refer to FIG. 4 , which is a schematic circuit block diagram of a testing machine control system 200A, a computer hardware lock 300A, and a testing machine 400A according to an embodiment of this case. In FIG. 4, the memory 210A is coupled to the processor 220A, and the processor 220A reads a plurality of instructions stored in the memory 210A to execute related steps. In addition, the testing machine control system 200A can be coupled to the testing machine 400A through the data cable 500A, and the testing machine 400A can test the integrated circuit through the testing carrier board 430A.

請參閱第3圖與第4圖,於步驟105A中,本案之測試機管控方法100A預備啟動測試軟體。於步驟110A中,藉由處理器220A來判斷是否得以讀取電腦硬體鎖300A。Please refer to FIG. 3 and FIG. 4 , in step 105A, the testing machine management and control method 100A of this case prepares to start the testing software. In step 110A, the processor 220A determines whether the computer hardware lock 300A can be read.

於執行步驟110A後,倘若處理器220A判定讀取到電腦硬體鎖300A,則表示使用者確實具有電腦硬體鎖300A,此時會執行步驟120A,藉由處理器220A以判斷儲存於電腦硬體鎖300A的使用時間是否小於儲存於測試機400A之背板410A的臨界時間。在一實施例中,背板410A的臨界時間可儲存於背板記憶體420A中。After step 110A is executed, if the processor 220A determines that the computer hardware lock 300A has been read, it means that the user does have the computer hardware lock 300A. At this time, step 120A will be executed, and the processor 220A can determine whether the computer hardware lock is stored in the computer hardware. Whether the use time of the body lock 300A is less than the critical time stored in the back panel 410A of the testing machine 400A. In one embodiment, the critical time of the backplane 410A can be stored in the backplane memory 420A.

請參閱步驟120A,若判定使用時間小於臨界時間,則表示使用者確實具有使用權限,此時會執行步驟125A,以讀取背板410A及電腦硬體鎖300A的使用期限及計費方式。舉例而言,背板410A及電腦硬體鎖300A內可紀錄使用期限及計費方式等等相關資訊,例如使用期限為3個月一期,計費方式是以每小時計費…等等,以供測試機管控方法100A後續使用。Please refer to step 120A, if it is determined that the use time is less than the critical time, it means that the user does have the use authority, and step 125A will be executed at this time to read the use period and billing method of the backplane 410A and the computer hardware lock 300A. For example, the back panel 410A and the computer hardware lock 300A can record relevant information such as the usage period and the billing method, for example, the usage period is 3 months, and the billing method is hourly billing, etc., For subsequent use of the testing machine management and control method 100A.

於步驟110A、120A中,倘若處理器220A判定無法讀取到電腦硬體鎖300A,或處理器220A判定使用時間不小於臨界時間,則執行步驟115A,藉由處理器220A禁止啟動測試軟體,並輸出警示信息以提示使用者,或請使用者先進行結算並繳交使用費用。In steps 110A and 120A, if the processor 220A determines that the computer hardware lock 300A cannot be read, or the processor 220A determines that the use time is not less than the critical time, then step 115A is executed, and the test software is prohibited from being started by the processor 220A, and Output a warning message to remind the user, or ask the user to make a settlement and pay the usage fee first.

接著,測試機管控方法100A執行步驟130A以藉由處理器220A判斷電腦硬體鎖300A的使用時間是否大於記憶體210A的測試時間。Next, the test machine management and control method 100A executes step 130A to determine whether the use time of the computer hardware lock 300A is greater than the test time of the memory 210A by the processor 220A.

倘若判定電腦硬體鎖300A的使用時間大於記憶體210A的測試時間,則執行步驟133A以電腦硬體鎖300A的使用時間作為監測測試機400A的測試軟體之測試時間的啟動時間。另一方面,若判定電腦硬體鎖300A的使用時間不大於記憶體210A的測試時間,則執行步驟135A以記憶體210A的測試時間作為監控測試機400A的測試軟體之測試時間之啟動時間。If it is determined that the use time of the computer hardware lock 300A is greater than the test time of the memory 210A, then execute step 133A and use the use time of the computer hardware lock 300A as the start time of the test time of the test software of the monitoring tester 400A. On the other hand, if it is determined that the use time of the computer hardware lock 300A is not greater than the test time of the memory 210A, then execute step 135A and use the test time of the memory 210A as the start time of the test time of the test software of the monitoring and testing machine 400A.

舉例而言,當使用者欲使用測試機400A來對積體電路進行測試時,測試機管控系統200A會讀取記憶體210A所紀錄的測試時間與電腦硬體鎖300A所紀錄的使用時間,並將兩者進行比較,以較大者為主,如此一來,就不會漏掉累計時間,即便遇到有心人士欲破解,亦可多一層防護。For example, when the user intends to use the testing machine 400A to test the integrated circuit, the testing machine management and control system 200A will read the test time recorded in the memory 210A and the use time recorded in the computer hardware lock 300A, and Comparing the two, the larger one is the main one. In this way, the cumulative time will not be missed, and even if someone who wants to crack it can also have an extra layer of protection.

隨後,執行步驟140A,啟動測試機400A的測試軟體,並監測測試機400A的測試軟體之測試時間。於步驟150A中,可藉由處理器220A儲存測試機400A的測試軟體之測試時間於記憶體210A。於步驟160A中,可藉由處理器220A週期性紀錄測試機400A的測試軟體之測試時間於電腦硬體鎖300A以產生使用時間。Subsequently, step 140A is executed to start the testing software of the testing machine 400A, and monitor the testing time of the testing software of the testing machine 400A. In step 150A, the test time of the test software of the test machine 400A can be stored in the memory 210A by the processor 220A. In step 160A, the processor 220A may periodically record the testing time of the testing software of the testing machine 400A in the computer hardware lock 300A to generate the usage time.

接著,執行步驟165A,關閉測試軟體並紀錄關閉時間。舉例而言,當監測到測試機400A的測試軟體關閉時,關閉測試軟體並紀錄關閉時間。再者執行步驟170A,藉由處理器220A以判斷測試時間是否得紀錄至電腦硬體鎖300A。倘若測試時間得以紀錄至電腦硬體鎖300A,則執行步驟180A,將測試機400A的試軟體之測試時間寫入電腦硬體鎖300A,並儲存紀錄檔。倘若測試時間無法紀錄至電腦硬體鎖300A,則執行步驟175A,直接儲存紀錄檔。Then, execute step 165A, close the test software and record the closing time. For example, when it is detected that the testing software of the testing machine 400A is closed, the testing software is closed and the closing time is recorded. Furthermore, step 170A is executed, and the processor 220A is used to determine whether the test time has to be recorded in the computer hardware lock 300A. If the test time can be recorded in the computer hardware lock 300A, then execute step 180A, write the test time of the test software of the testing machine 400A into the computer hardware lock 300A, and save the record file. If the test time cannot be recorded in the computer hardware lock 300A, then execute step 175A to directly store the record file.

舉例而言,在測試結束後,會將之前所紀錄的使用時間重新寫回電腦硬體鎖300A,更新試用期間,同時將使用時間也紀錄到加密的文字檔案中,並儲存到測試機管控系統200A的另一記憶體(非記憶體210A)中以作資料紀錄。再者,即便使用時間無法寫回電腦硬體鎖300A,本案亦會將使用時間也紀錄到加密的文字檔案中,並儲存到測試機管控系統200A的另一記憶體中以作資料紀錄。需說明的是,本案不以第3、4圖所示之步驟及結構為限,其僅用以例示性地繪示本案的實現方式之一。For example, after the test is over, the previously recorded usage time will be rewritten back to the computer hardware lock 300A, and the trial period will be updated. At the same time, the usage time will also be recorded in an encrypted text file and stored in the testing machine control system Another memory (non-memory 210A) of 200A is used for data recording. Furthermore, even if the use time cannot be written back to the computer hardware lock 300A, the use time will also be recorded in an encrypted text file in this case, and stored in another memory of the testing machine control system 200A for data recording. It should be noted that this case is not limited to the steps and structures shown in Figures 3 and 4, which are only used to illustrate one of the implementations of this case.

在一實施例中,本案提供測試機管控方法100、100A及測試機管控系統200、200A之即時結算機制如後。首先,測試機管控系統200、200A之系統軟體(monitor)所偵測到的時間,需先扣除電腦硬體鎖300內存的使用時間,以避免時間被重複計算。隨後,本案會將儲存於記憶體210、210A及電腦硬體鎖300、300A的所有時間進行結算。接著,本案會將記憶體210、210A及電腦硬體鎖300、300A內的時間歸0。當使用者繼續使用測試機400時,本案會重新以測試機管控方法100、100A之流程來進行相關認證以及時間計算。In one embodiment, this case provides the real-time settlement mechanism of the testing machine management and control method 100, 100A and the testing machine management and control system 200, 200A as follows. Firstly, the time detected by the system software (monitor) of the testing machine control system 200 and 200A needs to be deducted from the memory usage time of the computer hardware lock 300 to avoid double counting of the time. Subsequently, the case will be settled with all the time stored in the memory 210, 210A and the computer hardware lock 300, 300A. Then, in this case, the time in the memory 210, 210A and the computer hardware lock 300, 300A will be reset to 0. When the user continues to use the testing machine 400, the process of the testing machine management and control method 100, 100A will be used again in this case to carry out relevant authentication and time calculation.

由上述本案實施方式可知,應用本案具有下列優點。本案實施例所示之測試機管控方法及測試機管控系統可使用電腦硬體鎖作為管控機制之啟動條件,以提升管控機制的安全性。此外,本案之測試機管控方法及測試機管控系統可比較電腦硬體鎖內存之使用時間及測試機背板內存之臨界時間,以確保測試機尚處於可使用階段,進而準確地管控測試機之使用權限以及使用時間。As can be seen from the implementation manner of the present case described above, the application of the present case has the following advantages. The testing machine management and control method and testing machine management and control system shown in the embodiment of this case can use a computer hardware lock as the activation condition of the control mechanism to improve the security of the control mechanism. In addition, the testing machine control method and testing machine control system in this case can compare the use time of the computer hardware lock memory and the critical time of the test machine backplane memory to ensure that the testing machine is still in the usable stage, and then accurately control the testing machine. Usage rights and usage time.

雖然上文實施方式中揭露了本案的具體實施例,然其並非用以限定本案,本案所屬技術領域中具有通常知識者,在不悖離本案之原理與精神的情形下,當可對其進行各種更動與修飾,因此本案之保護範圍當以附隨申請專利範圍所界定者為準。Although the specific examples of this case are disclosed in the above implementation mode, they are not used to limit this case. Those who have ordinary knowledge in the technical field of this case can carry out this case without departing from the principle and spirit of this case. Various changes and modifications, so the protection scope of this case should be defined by the scope of the accompanying patent application.

100, 100A:方法 105, 110, 115, 120, 140, 150, 160:步驟 105A, 110A, 115A, 120A, 125A, 130A, 133A, 135A, 140A, 150A, 160A, 165A, 170A, 175A, 180A:步驟 200, 200A:測試機管控系統 210, 210A:記憶體 220, 220A:處理器 300, 300A:電腦硬體鎖 400, 400A:測試機 410, 410A:背板 420A:記憶體 430a:測試載板 100, 100A: method 105, 110, 115, 120, 140, 150, 160: steps 105A, 110A, 115A, 120A, 125A, 130A, 133A, 135A, 140A, 150A, 160A, 165A, 170A, 175A, 180A: Step 200, 200A: Testing machine control system 210, 210A: memory 220, 220A: Processor 300, 300A:Computer hardware lock 400, 400A: Tester 410, 410A: Backplane 420A: memory 430a: Test carrier board

為讓本案之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附圖式之說明如下: 第1圖係依照本案一實施例繪示一種測試機管控方法的流程示意圖。 第2圖係依照本案一實施例繪示一種測試機管控系統、電腦硬體鎖及測試機的電路方塊示意圖。 第3圖係依照本案一實施例繪示一種測試機管控方法的流程示意圖。 第4圖係依照本案一實施例繪示一種測試機管控系統、電腦硬體鎖及測試機的示意圖。 根據慣常的作業方式,圖中各種特徵與元件並未依比例繪製,其繪製方式是為了以最佳的方式呈現與本案相關的具體特徵與元件。此外,在不同圖式間,以相同或相似的元件符號來指稱相似的元件/部件。 In order to make the above and other purposes, features, advantages and embodiments of this case more obvious and understandable, the accompanying drawings are explained as follows: FIG. 1 is a schematic flowchart illustrating a method for controlling a testing machine according to an embodiment of the present application. Fig. 2 is a schematic circuit block diagram of a testing machine management and control system, a computer hardware lock, and a testing machine according to an embodiment of the present case. FIG. 3 is a schematic flow diagram illustrating a testing machine control method according to an embodiment of the present case. Fig. 4 is a schematic diagram illustrating a testing machine management and control system, a computer hardware lock, and a testing machine according to an embodiment of the present case. In accordance with common practice, the various features and elements in the drawings are not drawn to scale, but are drawn in a manner to best present specific features and elements relevant to the case. In addition, the same or similar reference numerals refer to similar elements/components in different drawings.

國內寄存資訊(請依寄存機構、日期、號碼順序註記) 無 國外寄存資訊(請依寄存國家、機構、日期、號碼順序註記) 無 Domestic deposit information (please note in order of depositor, date, and number) none Overseas storage information (please note in order of storage country, institution, date, and number) none

100:方法 100: method

105,110,115,120,140,150,160:步驟 105,110,115,120,140,150,160: steps

Claims (10)

一種測試機管控方法,包含:判斷是否得以讀取一電腦硬體鎖;當判定讀取到該電腦硬體鎖,判斷儲存於該電腦硬體鎖的一使用時間是否小於儲存於一測試機之一背板的一臨界時間;當判定該使用時間小於該臨界時間,啟動該測試機的一測試軟體,並監測該測試機的該測試軟體之一測試時間;儲存該測試機的該測試軟體之該測試時間於一記憶體;以及週期性紀錄該測試機的該測試軟體之該測試時間於該電腦硬體鎖以產生該使用時間。 A testing machine control method, comprising: judging whether a computer hardware lock can be read; when it is judged that the computer hardware lock is read, judging whether a usage time stored in the computer hardware lock is less than that stored in a testing machine A critical time of a backplane; when it is determined that the use time is less than the critical time, start a test software of the tester, and monitor a test time of the test software of the tester; store the test time of the test software of the tester The test time is stored in a memory; and the test time of the test software of the test machine is periodically recorded in the computer hardware lock to generate the use time. 如請求項1所述之測試機管控方法,更包含:當判定無法讀取該電腦硬體鎖或判定該使用時間不小於該臨界時間,禁止啟動該測試機的該測試軟體並輸出一警示信息。 The test machine control method as described in claim 1 further includes: when it is determined that the computer hardware lock cannot be read or the use time is not less than the critical time, prohibiting the start of the test software of the test machine and outputting a warning message . 如請求項1所述之測試機管控方法,其中儲存該測試機的該測試軟體之該測試時間於該記憶體的步驟包含:每隔一第一周期儲存該測試機的該測試軟體之該測試時間於該記憶體;其中週期性紀錄該測試機的該測試軟體之該測試時間於 該電腦硬體鎖以產生該使用時間的步驟包含:每隔一第二周期紀錄該測試機的該測試軟體之該測試時間於該電腦硬體鎖以產生該使用時間,其中該第二周期大於該第一周期。 The test machine control method as described in claim 1, wherein the step of storing the test time of the test software of the test machine in the memory includes: storing the test of the test software of the test machine every first cycle The time is in the memory; the test time of the test software of the test machine is periodically recorded in The step of using the computer hard lock to generate the usage time includes: recording the test time of the test software of the testing machine in the computer hardware lock every second cycle to generate the usage time, wherein the second cycle is greater than the first cycle. 如請求項1所述之測試機管控方法,更包含:當監測到該測試機的該測試軟體關閉時,將該測試機的該測試軟體之該測試時間寫入該電腦硬體鎖。 The test machine control method as described in claim 1 further includes: when it is detected that the test software of the test machine is closed, writing the test time of the test software of the test machine into the computer hardware lock. 如請求項4所述之測試機管控方法,更包含:判斷該電腦硬體鎖的該使用時間是否大於該記憶體的該測試時間;當判定該電腦硬體鎖的該使用時間大於該記憶體的該測試時間,以該電腦硬體鎖的該使用時間作為監測該測試機的該測試軟體之該測試時間之一啟動時間;以及當判定該電腦硬體鎖的該使用時間不大於該記憶體的該測試時間,以該記憶體的該測試時間作為監控該測試機的該測試軟體之該測試時間之該啟動時間。 The test machine control method as described in claim 4 further includes: judging whether the usage time of the computer hardware lock is greater than the test time of the memory; when it is determined that the usage time of the computer hardware lock is greater than the memory For the test time, the use time of the computer hardware lock is used as one of the start-up times of the test time of the test software for monitoring the test machine; and when it is determined that the use time of the computer hardware lock is not greater than the memory The test time of the memory is used as the start-up time of the test time of the test software of the test machine. 一種測試機管控系統,包含:一記憶體,用以儲存複數個指令;以及一處理器,用以讀取該些指令,並執行以下步驟:判斷是否得以讀取一電腦硬體鎖;當判定讀取到該電腦硬體鎖,判斷儲存於該電腦硬體鎖 的一使用時間是否小於儲存於一測試機之一背板的一臨界時間;當判定該使用時間小於該臨界時間,啟動該測試機的一測試軟體,並監測該測試機的該測試軟體之一測試時間;儲存該測試機的該測試軟體之該測試時間於該記憶體;以及週期性紀錄該測試機的該測試軟體之該測試時間於該電腦硬體鎖以產生該使用時間。 A control system for a testing machine, comprising: a memory for storing a plurality of instructions; and a processor for reading the instructions and performing the following steps: judging whether a computer hardware lock can be read; when judging Read the hardware lock of the computer and judge whether it is stored in the hardware lock of the computer Whether a usage time of the testing machine is less than a critical time stored in a backboard of a tester; when it is determined that the usage time is less than the critical time, start a test software of the testing machine, and monitor one of the testing software of the testing machine testing time; storing the testing time of the testing software of the testing machine in the memory; and periodically recording the testing time of the testing software of the testing machine in the computer hardware lock to generate the usage time. 如請求項6所述之測試機管控系統,其中該處理器更用以讀取該些指令並執行以下步驟:當判定無法讀取該電腦硬體鎖或判定該使用時間不小於該臨界時間,禁止啟動該測試機的該測試軟體並輸出一警示信息。 The testing machine management and control system as described in claim 6, wherein the processor is further used to read the instructions and perform the following steps: when it is determined that the computer hardware lock cannot be read or the use time is not less than the critical time, Prohibit starting the testing software of the testing machine and output a warning message. 如請求項6所述之測試機管控系統,其中該處理器執行之儲存該測試機的該測試軟體之該測試時間於該記憶體的步驟包含:每隔一第一周期儲存該測試機的該測試軟體之該測試時間於該記憶體;其中該處理器執行之週期性紀錄該測試機的該測試軟體之該測試時間於該電腦硬體鎖以產生該使用時間的步驟包含:每隔一第二周期紀錄該測試機的該測試軟體之該測試時 間於該電腦硬體鎖,其中該第二周期大於該第一周期。 The test machine management and control system as described in claim 6, wherein the step of storing the test time of the test software of the test machine in the memory executed by the processor includes: storing the test time of the test machine every first cycle The test time of the test software is stored in the memory; the step of periodically recording the test time of the test software of the test machine in the computer hardware lock by the processor to generate the usage time includes: every second Two-cycle recording of the test time of the test software of the test machine between the computer hardware lock, wherein the second period is greater than the first period. 如請求項6所述測試機管控系統,其中該處理器更用以讀取該些指令並執行以下步驟:當監測到該測試機的該測試軟體關閉時,將該測試機的該測試軟體之該測試時間寫入該電腦硬體鎖。 The testing machine management and control system as described in claim 6, wherein the processor is further used to read the instructions and perform the following steps: when it is detected that the testing software of the testing machine is closed, the testing software of the testing machine is closed The test time is written into the computer hardware lock. 如請求項9所述之測試機管控系統,其中該處理器更用以讀取該些指令並執行以下步驟:判斷該電腦硬體鎖的該使用時間是否大於該記憶體的該測試時間;當判定該電腦硬體鎖的該使用時間大於該記憶體的該測試時間,以該電腦硬體鎖的該使用時間作為監測該測試機的該測試軟體之該測試時間之一啟動時間;以及當判定該電腦硬體鎖的該使用時間不大於該記憶體的該測試時間,以該記憶體的該測試時間作為監控該測試機的該測試軟體之該測試時間之該啟動時間。 The test machine management and control system as described in claim 9, wherein the processor is further used to read the instructions and perform the following steps: determine whether the use time of the computer hardware lock is greater than the test time of the memory; Determine that the use time of the computer hardware lock is greater than the test time of the memory, use the use time of the computer hardware lock as one of the start-up times of the test time of the test software for monitoring the test machine; and when it is determined The use time of the computer hardware lock is not longer than the test time of the memory, and the test time of the memory is used as the start-up time of the test time of the test software monitoring the test machine.
TW110149496A 2021-12-29 2021-12-29 Method for controlling testing device and testing device controlling system TWI787026B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW110149496A TWI787026B (en) 2021-12-29 2021-12-29 Method for controlling testing device and testing device controlling system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW110149496A TWI787026B (en) 2021-12-29 2021-12-29 Method for controlling testing device and testing device controlling system

Publications (2)

Publication Number Publication Date
TWI787026B true TWI787026B (en) 2022-12-11
TW202326445A TW202326445A (en) 2023-07-01

Family

ID=85795042

Family Applications (1)

Application Number Title Priority Date Filing Date
TW110149496A TWI787026B (en) 2021-12-29 2021-12-29 Method for controlling testing device and testing device controlling system

Country Status (1)

Country Link
TW (1) TWI787026B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201025067A (en) * 2008-12-31 2010-07-01 Giga Byte Tech Co Ltd System operation method using hardware locks and electronic devices activated by hardware locks
TW201035799A (en) * 2008-12-11 2010-10-01 Oberthur Technologies A method of protecting a secure USB key
TW201128435A (en) * 2010-02-02 2011-08-16 Everise Technology Co Ltd Periodic code lock device for CNC
CN107391966A (en) * 2017-07-21 2017-11-24 北京深思数盾科技股份有限公司 A kind of method for protecting software, device and software protective lock
TW201822063A (en) * 2016-12-08 2018-06-16 緯創資通股份有限公司 Electronic apparatus and secure boot method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201035799A (en) * 2008-12-11 2010-10-01 Oberthur Technologies A method of protecting a secure USB key
TW201025067A (en) * 2008-12-31 2010-07-01 Giga Byte Tech Co Ltd System operation method using hardware locks and electronic devices activated by hardware locks
TW201128435A (en) * 2010-02-02 2011-08-16 Everise Technology Co Ltd Periodic code lock device for CNC
TW201822063A (en) * 2016-12-08 2018-06-16 緯創資通股份有限公司 Electronic apparatus and secure boot method thereof
CN107391966A (en) * 2017-07-21 2017-11-24 北京深思数盾科技股份有限公司 A kind of method for protecting software, device and software protective lock

Also Published As

Publication number Publication date
TW202326445A (en) 2023-07-01

Similar Documents

Publication Publication Date Title
USRE47621E1 (en) Secure transaction microcontroller with secure boot loader
CN103207975B (en) The method of protection password and computing machine
LeMay et al. Cumulative attestation kernels for embedded systems
TW200949684A (en) Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels
US8370923B2 (en) Access to a processing device
CN101176069B (en) Method for operating a computer system
RU2220443C2 (en) Method for checking execution of computer programs in compliance with their application
EP0824233A2 (en) Method and apparatus for secure execution of software prior to a computer system being powered down or entering a low energy consumption mode
JPS6046744B2 (en) Computer operating system security devices
TW200949682A (en) Apparatus and method for disabling a microprocessor that provides for a secure execution mode
US20090307783A1 (en) Data processing device, method, program, integrated circuit, and program generating device
US9202060B2 (en) Method for secure self-booting of an electronic device
CN101432752A (en) Trusted platform field upgrade system and method
JP2008512787A (en) System and method for secure running bus protection without deadlock of resources
TW201011643A (en) Apparatus and method for updating set of limited access model specific registers in a microprocessor
TWI787026B (en) Method for controlling testing device and testing device controlling system
CN108345787A (en) Determine the method, detection device and system of processor security
GB2424494A (en) Methods, devices and data structures for trusted data
KR101305502B1 (en) Computer system and control method thereof
US6898555B2 (en) Method for indicating the integrity of use-information of a computer program
CN104751082B (en) Operating system and data security control method and device
CN103105783B (en) embedded element and control method
CN116433341A (en) Tester control method and tester control system
JP2004139292A (en) Policy diagnostic system of access control
CN111708707A (en) Debugging method of embedded microprocessor and embedded microprocessor