TWI787026B - Method for controlling testing device and testing device controlling system - Google Patents
Method for controlling testing device and testing device controlling system Download PDFInfo
- Publication number
- TWI787026B TWI787026B TW110149496A TW110149496A TWI787026B TW I787026 B TWI787026 B TW I787026B TW 110149496 A TW110149496 A TW 110149496A TW 110149496 A TW110149496 A TW 110149496A TW I787026 B TWI787026 B TW I787026B
- Authority
- TW
- Taiwan
- Prior art keywords
- test
- time
- computer hardware
- software
- hardware lock
- Prior art date
Links
Images
Landscapes
- Testing And Monitoring For Control Systems (AREA)
- Selective Calling Equipment (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
本案係有關於一種管控方法及管控系統,且特別是有關於一種測試機管控方法及測試機管控系統。This case is about a control method and a control system, and especially about a test machine control method and a test machine control system.
半導體測試系統旨在測試積體電路(Integrated Circuit, IC)的電性功能,以確保積體電路符合相關規範。The semiconductor test system is designed to test the electrical function of an integrated circuit (IC), so as to ensure that the integrated circuit complies with relevant specifications.
由於半導體測試系統之價格高昂,租借半導體測試系統之模式應用而生。然而,現行的租借模式之管控機制尚存安全性的疑慮,諸如管控機制遭破解,此一狀況將導致半導體測試系統之租借廠商蒙受損失,因此,如何提升租借模式之管控機制的安全性,成為本領域廠商急需解決的問題。Due to the high price of the semiconductor test system, the model application of the leased semiconductor test system was born. However, there are still doubts about the safety of the current control mechanism of the rental model. For example, the control mechanism is cracked. This situation will cause losses to the rental manufacturers of semiconductor test systems. Manufacturers in this field urgently need to solve the problem.
本案內容之一技術態樣係關於一種測試機管控方法,其包含以下步驟:判斷是否得以讀取電腦硬體鎖;當判定讀取到電腦硬體鎖,判斷儲存於電腦硬體鎖的使用時間是否小於儲存於測試機之背板的臨界時間;當判定使用時間小於臨界時間,啟動測試機的測試軟體,並監測測試機的測試軟體之測試時間;儲存測試機的測試軟體之測試時間於記憶體;以及週期性紀錄測試機的測試軟體之測試時間於電腦硬體鎖以產生使用時間。One of the technical aspects of this case is related to a test machine control method, which includes the following steps: judging whether the computer hardware lock can be read; when it is determined that the computer hardware lock has been read, judging the use time stored in the computer hardware lock Whether it is less than the critical time stored in the backboard of the tester; when it is determined that the use time is less than the critical time, start the test software of the tester and monitor the test time of the test software of the tester; store the test time of the test software of the tester in the memory body; and periodically record the test time of the test software of the test machine in the computer hardware lock to generate the use time.
本案內容之另一技術態樣係關於一種測試機管控系統,此測試機管控系統包含記憶體及處理器。記憶體用以儲存複數個指令。處理器用以讀取該些指令,並執行以下步驟:判斷是否得以讀取電腦硬體鎖;當判定讀取到電腦硬體鎖,判斷儲存於電腦硬體鎖的使用時間是否小於儲存於測試機之背板的臨界時間;當判定使用時間小於臨界時間,啟動測試機的測試軟體,並監測測試機的測試軟體之測試時間;儲存測試機的測試軟體之測試時間於記憶體;以及週期性紀錄測試機的測試軟體之測試時間於電腦硬體鎖以產生使用時間。Another technical aspect of the content of this case relates to a test machine control system, which includes memory and processors. The memory is used to store a plurality of instructions. The processor is used to read these instructions, and perform the following steps: determine whether the computer hardware lock can be read; when it is determined that the computer hardware lock is read, determine whether the usage time stored in the computer hardware lock is less than that stored in the testing machine The critical time of the backplane; when it is determined that the use time is less than the critical time, start the test software of the test machine, and monitor the test time of the test software of the test machine; store the test time of the test software of the test machine in the memory; and periodically record The test time of the test software of the test machine is locked in the computer hardware to generate the use time.
因此,根據本案之技術內容,本案實施例所示之測試機管控方法及測試機管控系統可使用電腦硬體鎖作為管控機制之安全啟動條件,以提升管控機制的安全性。此外,本案之測試機管控方法及測試機管控系統可比較電腦硬體鎖內存之使用時間及測試機背板內存之臨界時間,以確保測試機尚處於可使用階段,進而準確地管控測試機之使用權限以及使用時間。Therefore, according to the technical content of this case, the testing machine management and control method and testing machine management and control system shown in the embodiment of this case can use the computer hardware lock as the security activation condition of the control mechanism to improve the security of the control mechanism. In addition, the testing machine control method and testing machine control system in this case can compare the use time of the computer hardware lock memory and the critical time of the test machine backplane memory to ensure that the testing machine is still in the usable stage, and then accurately control the testing machine. Usage rights and usage time.
為了使本揭示內容的敘述更加詳盡與完備,下文針對了本案的實施態樣與具體實施例提出了說明性的描述;但這並非實施或運用本案具體實施例的唯一形式。實施方式中涵蓋了多個具體實施例的特徵以及用以建構與操作這些具體實施例的方法步驟與其順序。然而,亦可利用其他具體實施例來達成相同或均等的功能與步驟順序。In order to make the description of the disclosure more detailed and complete, the following provides an illustrative description of the implementation and specific embodiments of the present case; but this is not the only form of implementing or using the specific embodiments of the present case. The description covers features of various embodiments as well as method steps and their sequences for constructing and operating those embodiments. However, other embodiments can also be used to achieve the same or equivalent functions and step sequences.
除非本說明書另有定義,此處所用的科學與技術詞彙之含義與本案所屬技術領域中具有通常知識者所理解與慣用的意義相同。此外,在不和上下文衝突的情形下,本說明書所用的單數名詞涵蓋該名詞的複數型;而所用的複數名詞時亦涵蓋該名詞的單數型。Unless otherwise defined in this specification, the meanings of scientific and technical terms used herein are the same as those understood and commonly used by those with ordinary knowledge in the technical field to which this case belongs. In addition, the singular nouns used in this specification include the plural forms of the nouns, and the plural nouns used also include the singular forms of the nouns, unless the context conflicts with the context.
另外,關於本文中所使用之「耦接」,可指二或多個元件相互直接作實體或電性接觸,或是相互間接作實體或電性接觸,亦可指二或多個元件相互操作或動作。In addition, regarding the "coupling" used herein, it may refer to two or more elements being in direct physical or electrical contact with each other, or indirect physical or electrical contact with each other, or it may refer to two or more elements interoperating. or action.
第1圖係依照本案一實施例繪示一種測試機管控方法100的流程示意圖。為使本案之測試機管控方法100易於理解,請一併參閱第2圖,其係依照本案一實施例繪示一種測試機管控系統200、電腦硬體鎖300及測試機400的電路方塊示意圖。於第2圖中,測試機管控系統200包含記憶體210及處理器220,其中記憶體200耦接於處理器220,且由處理器220讀取記憶體210儲存之複數個指令以執行相關步驟。FIG. 1 is a schematic flowchart illustrating a testing machine management and
請參閱第1圖與第2圖,於步驟105中,本案之測試機管控方法100預備啟動測試軟體。於步驟110中,藉由處理器220來判斷是否得以讀取電腦硬體鎖300。舉例而言,當使用者欲使用測試機400來對積體電路(IC)進行測試時,本案需確保使用者擁有電腦硬體鎖300,以作為安全啟動之用。Please refer to FIG. 1 and FIG. 2. In
在一實施例中,上述電腦硬體鎖300可為keypro(或稱Dongle),然本案不以此實施例為限,電腦硬體鎖300亦可採用其餘合適之元器件來加以實現。在啟用keypro時需要使用主金鑰(master key)才可燒錄特定身分認證碼(ID),而master key僅有廠商內部留存,讀取時需要ID,因此使用者無法破解keypro內所存的使用時間與其它資訊,亦無法更改其設定。據此,本案應用電腦硬體鎖300而增進測試機400管控之安全性。在另一實施例中,本案之電腦硬體鎖300可透過通用序列匯流排(Universal Serial Bus, USB)與測試機管控系統200進行連結,然本案不以此實施例為限,電腦硬體鎖300亦可採用其餘合適之元器件來與測試機管控系統200進行連結。In one embodiment, the above-mentioned
於執行步驟110後,倘若處理器220判定讀取到電腦硬體鎖300,則表示使用者確實具有電腦硬體鎖300,此時會執行步驟120,藉由處理器220以判斷儲存於電腦硬體鎖300的使用時間是否小於儲存於測試機400之背板410的臨界時間。舉例而言,本案除需確保使用者擁有電腦硬體鎖300外,尚需進一步判斷使用者是否依然具有使用權限,因此,本案還會判斷目前的整體使用使間是否低於臨界時間。在一實施例中,電腦硬體鎖300會綁定背板410之ID,以確保兩者確實為同一使用者所租借之整套測試相關系統。反之,背板410亦會綁定電腦硬體鎖300之ID。After
於執行步驟120後,若判定使用時間小於臨界時間,則表示使用者確實具有使用權限,此時會執行步驟140,啟動測試機400的測試軟體,並監測測試機400的測試軟體之測試時間。在一實施例中,本案之測試機管控方法100可藉由系統軟體(monitor)偵測測試軟體的開始與結束以取得測試軟體之測試時間。After
以廠商設定最大臨界時間為2160小時為例,此最大臨界時間會於測試機400出廠前寫入背板410中,因此,使用者無法自行撰寫程式修改背板410儲存的最大臨界時間,以確保可切實判斷使用者是否具有使用權限。當使用者欲使用測試機400時,本案會判斷電腦硬體鎖300內存的當前使用使間是否小於最大臨界時間2160小時。若判定當前使用時間小於最大臨界時間,則表示當前使用時間還在最大臨界時間2160小時之內,因此,使用者確實具有使用權限,可啟動測試機400的測試軟體以對積體電路進行相關測試。然本案之臨界時間不以上述實施例之2160小時為限,其僅用以例示性地說明本案的實現方式之一。Taking the maximum critical time set by the manufacturer as 2160 hours as an example, this maximum critical time will be written into the
於步驟110、120中,倘若處理器220判定無法讀取到電腦硬體鎖300,或處理器220判定使用時間不小於臨界時間,則執行步驟115,藉由處理器220禁止啟動測試軟體,並輸出警示信息。舉例而言,當處理器220判定無法讀取到電腦硬體鎖300,表示使用者並未擁有作為安全啟動之用的電腦硬體鎖300,因此,禁止啟動測試軟體,並輸出警示信息以提示使用者。此外,當處理器220判定使用時間不小於臨界時間,表示測試機400之使用時間已超過廠商提供的最大臨界時間,此時使用者已不再具有使用權限,處理器220會輸出警示信息,以提示使用者需先進行結算並繳交使用費用。In
請參閱步驟150,可藉由處理器220儲存測試機400的測試軟體之測試時間於記憶體210。於步驟160中,可藉由處理器220週期性紀錄測試機400的測試軟體之測試時間於電腦硬體鎖300以產生使用時間。Please refer to
舉例而言,記憶體210之存取速度較快,因此,本案可經常性地將測試時間存於記憶體210中,例如每隔第一周期(如每分鐘)將測試時間存於記憶體210內,以更加準確地掌握使用者之測試時間,但又不至於影響整體運作速度。由於本案於測試期間,將不斷地去紀錄並比較測試時間的正確性,即便使用者透過特殊方式離開軟體(如直接關機或中止軟體),亦無需擔心漏掉對於使用時間的紀錄,因此,使用者無法透過特殊方式以破解本案之機制。在一實施例中,上述記憶體210可為測試機管控系統200上的記憶體映射(shared memory)。For example, the access speed of the
此外,電腦硬體鎖300之存取速度低於記憶體210,因此,本案週期性地將測試時間存於電腦硬體鎖300中,例如每隔第二周期(如每小時)將測試時間存於電腦硬體鎖300內,以將測試時間一併存到安全性更佳的電腦硬體鎖300,且拉長儲存時間而不至於影響整體運作速度。然本案不以上述實施例所示之每分鐘紀錄及每小時紀錄為限,紀錄之時間及記憶體210之種類皆可以其餘合適的條件來加以實現。此外,需說明的是,本案不以第1、2圖所示之步驟及結構為限,其僅用以例示性地繪示本案的實現方式之一。In addition, the access speed of the
第3圖係依照本案一實施例繪示一種測試機管控方法100A的流程示意圖。相較於第1圖所示之測試機管控方法100,第3圖之測試機管控方法100A更具有判斷使用時間與測試時間的步驟130A、判斷測試時間是否得以紀錄至電腦硬體鎖的步驟170A…等等步驟,將於後文中詳細說明。FIG. 3 is a schematic flowchart illustrating a testing machine management and control method 100A according to an embodiment of the present application. Compared with the testing machine management and
為使本案之測試機管控方法100A易於理解,請一併參閱第4圖,其係依照本案一實施例繪示一種測試機管控系統200A、電腦硬體鎖300A及測試機400A的電路方塊示意圖。於第4圖中,記憶體210A耦接於處理器220A,且由處理器220A讀取記憶體210A儲存之複數個指令以執行相關步驟。此外,測試機管控系統200A可透過資料線500A耦接於測試機400A,且測試機400A可透過測試載板430A以對積體電路進行測試。In order to make the testing machine control method 100A of this case easy to understand, please also refer to FIG. 4 , which is a schematic circuit block diagram of a testing machine control system 200A, a
請參閱第3圖與第4圖,於步驟105A中,本案之測試機管控方法100A預備啟動測試軟體。於步驟110A中,藉由處理器220A來判斷是否得以讀取電腦硬體鎖300A。Please refer to FIG. 3 and FIG. 4 , in
於執行步驟110A後,倘若處理器220A判定讀取到電腦硬體鎖300A,則表示使用者確實具有電腦硬體鎖300A,此時會執行步驟120A,藉由處理器220A以判斷儲存於電腦硬體鎖300A的使用時間是否小於儲存於測試機400A之背板410A的臨界時間。在一實施例中,背板410A的臨界時間可儲存於背板記憶體420A中。After
請參閱步驟120A,若判定使用時間小於臨界時間,則表示使用者確實具有使用權限,此時會執行步驟125A,以讀取背板410A及電腦硬體鎖300A的使用期限及計費方式。舉例而言,背板410A及電腦硬體鎖300A內可紀錄使用期限及計費方式等等相關資訊,例如使用期限為3個月一期,計費方式是以每小時計費…等等,以供測試機管控方法100A後續使用。Please refer to step 120A, if it is determined that the use time is less than the critical time, it means that the user does have the use authority, and step 125A will be executed at this time to read the use period and billing method of the
於步驟110A、120A中,倘若處理器220A判定無法讀取到電腦硬體鎖300A,或處理器220A判定使用時間不小於臨界時間,則執行步驟115A,藉由處理器220A禁止啟動測試軟體,並輸出警示信息以提示使用者,或請使用者先進行結算並繳交使用費用。In
接著,測試機管控方法100A執行步驟130A以藉由處理器220A判斷電腦硬體鎖300A的使用時間是否大於記憶體210A的測試時間。Next, the test machine management and control method 100A executes step 130A to determine whether the use time of the
倘若判定電腦硬體鎖300A的使用時間大於記憶體210A的測試時間,則執行步驟133A以電腦硬體鎖300A的使用時間作為監測測試機400A的測試軟體之測試時間的啟動時間。另一方面,若判定電腦硬體鎖300A的使用時間不大於記憶體210A的測試時間,則執行步驟135A以記憶體210A的測試時間作為監控測試機400A的測試軟體之測試時間之啟動時間。If it is determined that the use time of the
舉例而言,當使用者欲使用測試機400A來對積體電路進行測試時,測試機管控系統200A會讀取記憶體210A所紀錄的測試時間與電腦硬體鎖300A所紀錄的使用時間,並將兩者進行比較,以較大者為主,如此一來,就不會漏掉累計時間,即便遇到有心人士欲破解,亦可多一層防護。For example, when the user intends to use the
隨後,執行步驟140A,啟動測試機400A的測試軟體,並監測測試機400A的測試軟體之測試時間。於步驟150A中,可藉由處理器220A儲存測試機400A的測試軟體之測試時間於記憶體210A。於步驟160A中,可藉由處理器220A週期性紀錄測試機400A的測試軟體之測試時間於電腦硬體鎖300A以產生使用時間。Subsequently,
接著,執行步驟165A,關閉測試軟體並紀錄關閉時間。舉例而言,當監測到測試機400A的測試軟體關閉時,關閉測試軟體並紀錄關閉時間。再者執行步驟170A,藉由處理器220A以判斷測試時間是否得紀錄至電腦硬體鎖300A。倘若測試時間得以紀錄至電腦硬體鎖300A,則執行步驟180A,將測試機400A的試軟體之測試時間寫入電腦硬體鎖300A,並儲存紀錄檔。倘若測試時間無法紀錄至電腦硬體鎖300A,則執行步驟175A,直接儲存紀錄檔。Then, execute
舉例而言,在測試結束後,會將之前所紀錄的使用時間重新寫回電腦硬體鎖300A,更新試用期間,同時將使用時間也紀錄到加密的文字檔案中,並儲存到測試機管控系統200A的另一記憶體(非記憶體210A)中以作資料紀錄。再者,即便使用時間無法寫回電腦硬體鎖300A,本案亦會將使用時間也紀錄到加密的文字檔案中,並儲存到測試機管控系統200A的另一記憶體中以作資料紀錄。需說明的是,本案不以第3、4圖所示之步驟及結構為限,其僅用以例示性地繪示本案的實現方式之一。For example, after the test is over, the previously recorded usage time will be rewritten back to the
在一實施例中,本案提供測試機管控方法100、100A及測試機管控系統200、200A之即時結算機制如後。首先,測試機管控系統200、200A之系統軟體(monitor)所偵測到的時間,需先扣除電腦硬體鎖300內存的使用時間,以避免時間被重複計算。隨後,本案會將儲存於記憶體210、210A及電腦硬體鎖300、300A的所有時間進行結算。接著,本案會將記憶體210、210A及電腦硬體鎖300、300A內的時間歸0。當使用者繼續使用測試機400時,本案會重新以測試機管控方法100、100A之流程來進行相關認證以及時間計算。In one embodiment, this case provides the real-time settlement mechanism of the testing machine management and
由上述本案實施方式可知,應用本案具有下列優點。本案實施例所示之測試機管控方法及測試機管控系統可使用電腦硬體鎖作為管控機制之啟動條件,以提升管控機制的安全性。此外,本案之測試機管控方法及測試機管控系統可比較電腦硬體鎖內存之使用時間及測試機背板內存之臨界時間,以確保測試機尚處於可使用階段,進而準確地管控測試機之使用權限以及使用時間。As can be seen from the implementation manner of the present case described above, the application of the present case has the following advantages. The testing machine management and control method and testing machine management and control system shown in the embodiment of this case can use a computer hardware lock as the activation condition of the control mechanism to improve the security of the control mechanism. In addition, the testing machine control method and testing machine control system in this case can compare the use time of the computer hardware lock memory and the critical time of the test machine backplane memory to ensure that the testing machine is still in the usable stage, and then accurately control the testing machine. Usage rights and usage time.
雖然上文實施方式中揭露了本案的具體實施例,然其並非用以限定本案,本案所屬技術領域中具有通常知識者,在不悖離本案之原理與精神的情形下,當可對其進行各種更動與修飾,因此本案之保護範圍當以附隨申請專利範圍所界定者為準。Although the specific examples of this case are disclosed in the above implementation mode, they are not used to limit this case. Those who have ordinary knowledge in the technical field of this case can carry out this case without departing from the principle and spirit of this case. Various changes and modifications, so the protection scope of this case should be defined by the scope of the accompanying patent application.
100, 100A:方法
105, 110, 115, 120, 140, 150, 160:步驟
105A, 110A, 115A, 120A, 125A, 130A, 133A, 135A, 140A, 150A, 160A, 165A, 170A, 175A, 180A:步驟
200, 200A:測試機管控系統
210, 210A:記憶體
220, 220A:處理器
300, 300A:電腦硬體鎖
400, 400A:測試機
410, 410A:背板
420A:記憶體
430a:測試載板
100, 100A:
為讓本案之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附圖式之說明如下: 第1圖係依照本案一實施例繪示一種測試機管控方法的流程示意圖。 第2圖係依照本案一實施例繪示一種測試機管控系統、電腦硬體鎖及測試機的電路方塊示意圖。 第3圖係依照本案一實施例繪示一種測試機管控方法的流程示意圖。 第4圖係依照本案一實施例繪示一種測試機管控系統、電腦硬體鎖及測試機的示意圖。 根據慣常的作業方式,圖中各種特徵與元件並未依比例繪製,其繪製方式是為了以最佳的方式呈現與本案相關的具體特徵與元件。此外,在不同圖式間,以相同或相似的元件符號來指稱相似的元件/部件。 In order to make the above and other purposes, features, advantages and embodiments of this case more obvious and understandable, the accompanying drawings are explained as follows: FIG. 1 is a schematic flowchart illustrating a method for controlling a testing machine according to an embodiment of the present application. Fig. 2 is a schematic circuit block diagram of a testing machine management and control system, a computer hardware lock, and a testing machine according to an embodiment of the present case. FIG. 3 is a schematic flow diagram illustrating a testing machine control method according to an embodiment of the present case. Fig. 4 is a schematic diagram illustrating a testing machine management and control system, a computer hardware lock, and a testing machine according to an embodiment of the present case. In accordance with common practice, the various features and elements in the drawings are not drawn to scale, but are drawn in a manner to best present specific features and elements relevant to the case. In addition, the same or similar reference numerals refer to similar elements/components in different drawings.
國內寄存資訊(請依寄存機構、日期、號碼順序註記) 無 國外寄存資訊(請依寄存國家、機構、日期、號碼順序註記) 無 Domestic deposit information (please note in order of depositor, date, and number) none Overseas storage information (please note in order of storage country, institution, date, and number) none
100:方法 100: method
105,110,115,120,140,150,160:步驟 105,110,115,120,140,150,160: steps
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW110149496A TWI787026B (en) | 2021-12-29 | 2021-12-29 | Method for controlling testing device and testing device controlling system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW110149496A TWI787026B (en) | 2021-12-29 | 2021-12-29 | Method for controlling testing device and testing device controlling system |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI787026B true TWI787026B (en) | 2022-12-11 |
TW202326445A TW202326445A (en) | 2023-07-01 |
Family
ID=85795042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW110149496A TWI787026B (en) | 2021-12-29 | 2021-12-29 | Method for controlling testing device and testing device controlling system |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI787026B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201025067A (en) * | 2008-12-31 | 2010-07-01 | Giga Byte Tech Co Ltd | System operation method using hardware locks and electronic devices activated by hardware locks |
TW201035799A (en) * | 2008-12-11 | 2010-10-01 | Oberthur Technologies | A method of protecting a secure USB key |
TW201128435A (en) * | 2010-02-02 | 2011-08-16 | Everise Technology Co Ltd | Periodic code lock device for CNC |
CN107391966A (en) * | 2017-07-21 | 2017-11-24 | 北京深思数盾科技股份有限公司 | A kind of method for protecting software, device and software protective lock |
TW201822063A (en) * | 2016-12-08 | 2018-06-16 | 緯創資通股份有限公司 | Electronic apparatus and secure boot method thereof |
-
2021
- 2021-12-29 TW TW110149496A patent/TWI787026B/en active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201035799A (en) * | 2008-12-11 | 2010-10-01 | Oberthur Technologies | A method of protecting a secure USB key |
TW201025067A (en) * | 2008-12-31 | 2010-07-01 | Giga Byte Tech Co Ltd | System operation method using hardware locks and electronic devices activated by hardware locks |
TW201128435A (en) * | 2010-02-02 | 2011-08-16 | Everise Technology Co Ltd | Periodic code lock device for CNC |
TW201822063A (en) * | 2016-12-08 | 2018-06-16 | 緯創資通股份有限公司 | Electronic apparatus and secure boot method thereof |
CN107391966A (en) * | 2017-07-21 | 2017-11-24 | 北京深思数盾科技股份有限公司 | A kind of method for protecting software, device and software protective lock |
Also Published As
Publication number | Publication date |
---|---|
TW202326445A (en) | 2023-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE47621E1 (en) | Secure transaction microcontroller with secure boot loader | |
CN103207975B (en) | The method of protection password and computing machine | |
LeMay et al. | Cumulative attestation kernels for embedded systems | |
TW200949684A (en) | Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels | |
US8370923B2 (en) | Access to a processing device | |
CN101176069B (en) | Method for operating a computer system | |
RU2220443C2 (en) | Method for checking execution of computer programs in compliance with their application | |
EP0824233A2 (en) | Method and apparatus for secure execution of software prior to a computer system being powered down or entering a low energy consumption mode | |
JPS6046744B2 (en) | Computer operating system security devices | |
TW200949682A (en) | Apparatus and method for disabling a microprocessor that provides for a secure execution mode | |
US20090307783A1 (en) | Data processing device, method, program, integrated circuit, and program generating device | |
US9202060B2 (en) | Method for secure self-booting of an electronic device | |
CN101432752A (en) | Trusted platform field upgrade system and method | |
JP2008512787A (en) | System and method for secure running bus protection without deadlock of resources | |
TW201011643A (en) | Apparatus and method for updating set of limited access model specific registers in a microprocessor | |
TWI787026B (en) | Method for controlling testing device and testing device controlling system | |
CN108345787A (en) | Determine the method, detection device and system of processor security | |
GB2424494A (en) | Methods, devices and data structures for trusted data | |
KR101305502B1 (en) | Computer system and control method thereof | |
US6898555B2 (en) | Method for indicating the integrity of use-information of a computer program | |
CN104751082B (en) | Operating system and data security control method and device | |
CN103105783B (en) | embedded element and control method | |
CN116433341A (en) | Tester control method and tester control system | |
JP2004139292A (en) | Policy diagnostic system of access control | |
CN111708707A (en) | Debugging method of embedded microprocessor and embedded microprocessor |