WO2017177403A1 - Anti-counterfeiting method for hardware functional module of electronic device, and security chip, hardware functional module, electronic apparatus and system thereof - Google Patents

Anti-counterfeiting method for hardware functional module of electronic device, and security chip, hardware functional module, electronic apparatus and system thereof Download PDF

Info

Publication number
WO2017177403A1
WO2017177403A1 PCT/CN2016/079189 CN2016079189W WO2017177403A1 WO 2017177403 A1 WO2017177403 A1 WO 2017177403A1 CN 2016079189 W CN2016079189 W CN 2016079189W WO 2017177403 A1 WO2017177403 A1 WO 2017177403A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
authentication
function module
hardware function
application
Prior art date
Application number
PCT/CN2016/079189
Other languages
French (fr)
Chinese (zh)
Inventor
黄晓庆
张哲�
Original Assignee
深圳前海达闼云端智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海达闼云端智能科技有限公司 filed Critical 深圳前海达闼云端智能科技有限公司
Priority to PCT/CN2016/079189 priority Critical patent/WO2017177403A1/en
Priority to CN201680002865.9A priority patent/CN107683463A/en
Publication of WO2017177403A1 publication Critical patent/WO2017177403A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring

Definitions

  • the present invention relates to the field of holographic image technology, and in particular, to a security chip, a hardware function module, an electronic device, a system and a method thereof for performing anti-counterfeiting on a hardware device in the field of holographic image technology.
  • the holographic reality technology produced in the technical field of holographic images materializes the digital world into the real world through holographic reality technology, and users can view, touch, sense and manipulate holographic information without any head-mounted device, and holography.
  • the images interact.
  • Implementing this technology requires a specific display device, and a program or application software developed by a manufacturer who manufactures content based on the technology also needs to be developed or run on a device including the display device.
  • this particular display device will also have imitations or other alternatives. Therefore, how to prevent this specific hardware device is an urgent problem to be solved.
  • the hardware anti-counterfeiting detection method of the existing electronic device is to independently detect the hardware module, for example, by using an anti-counterfeit label to perform anti-counterfeiting.
  • the electronic device is disassembled to identify whether the hardware module has an anti-counterfeit label, or how true or false the anti-counterfeit label is.
  • this type of detection requires disassembly of the electronic device. Therefore, the method not only has a high authentication cost, but also is not very convenient to identify and is not practical.
  • the technical problem to be solved by the present invention is to provide a convenient and practical anti-counterfeiting method for hardware function modules of electronic devices, and a security chip, a hardware function module, an electronic device and a system.
  • the present invention provides the following technical solutions:
  • the present invention provides a hardware function module anti-counterfeiting method for an electronic device, the method comprising: receiving an authentication instruction when the hardware function module is used or possibly used by an application; according to the authentication The instruction sends an authentication request message to the authentication server, and receives an authentication result returned by the authentication server.
  • the method further includes determining, based on the authentication result, whether the application that needs to use the hardware function module can continue to be developed or installed on the electronic device.
  • the present invention provides a security chip for anti-counterfeiting, which is applied to a hardware function module, wherein the security chip is built in the hardware function module, and the security chip is used to execute the electronic device of the present invention.
  • the hardware function module anti-counterfeiting method provides a method in any one of the specific embodiments.
  • the present invention provides an anti-counterfeiting hardware function module, which is used in an electronic device, and is characterized in that the hardware function module includes any one of the specific embodiments provided by the anti-forgery security chip of the present invention. Security chip in the middle.
  • the hardware function module further includes: a microprocessor and a module storage device; the module storage device is configured to store an authentication management program; and the microprocessor receives the electronic device security management program to send And according to the notification, it is known that an application uses or may use the hardware function module, reads an authentication management program in the module storage device, and sends an authentication instruction to the security chip by the authentication management program. .
  • the present invention provides an anti-counterfeiting electronic device, which includes a central processing unit and a device storage device, wherein the electronic device further includes any one of the specific embodiments provided by the hardware function module of the present invention.
  • a hardware function module wherein the device storage device is configured to store an electronic device security management program; the central processor reads and runs an electronic device security management program in the device storage device; when the user develops on the electronic device Or when installing an application that needs to use the hardware function module, the electronic device security management program triggers an authentication procedure of the hardware function module.
  • determining, according to the authentication result, whether the electronic device can continue to develop or install the application that needs to use the hardware function module, and the electronic device security management program running in the central processor carried out.
  • the present invention provides an anti-counterfeiting security system, characterized in that the security system comprises an authentication server, and an electronic device according to any of the embodiments provided by the electronic device of the present invention; wherein the authentication a server, configured to receive an authentication request message sent by the electronic device, and further The hardware function module in the electronic device is authenticated according to the authentication request message, and then the authentication result is returned to the electronic device.
  • the present invention provides a computer readable storage medium, characterized in that, when the computing program stored in the computer readable storage medium is executed, any one of the hardware function module anti-counterfeiting methods of the electronic device of the present invention is provided. The method in the detailed description.
  • the present invention provides a computer program product stored in a computer internal storage module, the computer program product being executed to perform the method of any one of the specific embodiments provided by the hardware function module anti-counterfeiting method of the electronic device of the present invention. .
  • the beneficial effects of the present invention are that, when the hardware function module is used by the application or may be used, the authentication program is started, and according to the authentication result, whether the application can continue to be developed or installed, thereby The fake hardware function module can be actually in an unusable state, thereby achieving the anti-counterfeiting effect.
  • the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • FIG. 1 is a flowchart of an anti-counterfeiting method for a hardware function module of an electronic device according to a first embodiment of the present invention
  • FIG. 2 is a signaling interaction diagram of the anti-forgery method of the hardware function module of FIG. 1 in a specific application scenario
  • FIG. 3 is a structural diagram of an anti-counterfeiting system according to Embodiment 2 of the present invention.
  • FIG. 4 is a circuit block diagram of the electronic device of FIG. 2;
  • FIG. 5 is a circuit block diagram of an anti-forgery hardware function module according to Embodiment 3 of the present invention.
  • FIG. 6 is a circuit block diagram of an anti-forgery hardware function module according to Embodiment 4 of the present invention.
  • microprocessor 131 Module storage device 132 Security chip 133 Authentication server 20
  • FIG. 1 is a flowchart of a method for anti-counterfeiting of a hardware function module of an electronic device according to a first embodiment of the present invention.
  • the hardware function module can be a component of an electronic device that can be independently produced and sold by any manufacturer, such as a display module, a storage module, an audio play module, and the like; the method includes:
  • Step 100 Receive an authentication instruction when the hardware function module is used by the application or may be used;
  • Step 200 Send an authentication request message to the authentication server according to the authentication instruction.
  • Step 300 Receive an authentication result returned by the authentication server.
  • the method further includes: Step 400, processing the development or installation process of the application in the electronic device according to the authentication result. Specifically, according to the authentication result, it is determined whether the electronic device can continue to develop or install an application that needs to use the hardware function module. More specifically, when the authentication result is a failure or no authentication result is returned, the application is developed or installed on the electronic device; when the authentication result is successful, the electronic device can continue to be used. Develop or install the application on.
  • the hardware function module is a fake, and the user continues to develop or install an application that needs to use the hardware function module on the electronic device, so that the imitation is actually in an unavailable state.
  • the anti-counterfeiting method provided by the specific embodiment 1 of the present invention when the hardware function module is used by the application or may be used, starts the electronic device security management program, that is, the authentication program, so that the hardware function module and the authentication function
  • the server performs authentication communication, and determines whether the application can continue to be developed or installed according to the authentication result, thereby enabling the fake hardware function module to be actually not
  • the state is available to achieve anti-counterfeiting effects.
  • the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • FIG. 2 it is a signaling interaction diagram in a specific application scenario of the anti-counterfeiting method of FIG.
  • the hardware function module of the electronic device is specifically a hardware function module capable of realizing functions such as hologram image and interaction between the user and the hologram image.
  • a security chip for anti-counterfeiting is built in the hardware function module.
  • an electronic device security management program is set in a software development kit (SDK) in the electronic device, and any content program developer needs to develop an application on the electronic device that needs to use the hardware function module.
  • SDK software development kit
  • the electronic device security management program is triggered, and the authentication communication between the security chip and the authentication server is performed;
  • an API Application Programming Interface
  • the security management program enables authentication communication between the security chip and the authentication server.
  • the electronic device security management program triggers authentication communication between the security chip and the authentication server. Specifically, the electronic device security management program may directly send an authentication command to the security chip for authentication; or may notify the hardware function module first, and then generate an authentication command internally to the security chip. , for authentication.
  • Step S1 when the hardware function module is used by the application or may be used, the security chip receives the authentication instruction, and the security chip is built in a hardware function module;
  • step S1 is implemented in the following two ways:
  • Step S111 the security chip receives an authentication command sent by the electronic device security management program, where the electronic device security management program is an authentication program built in the electronic device; or
  • Step S121 the microcontroller in the hardware function module receives a notification sent by the electronic device security management program, and the notification is used to notify the hardware function module to be used by the application program or may be used by the application program;
  • Step S122 the microcontroller in the hardware function module sends an authentication instruction to the security chip.
  • Step S2 The security chip sends an authentication request message to the authentication server according to the authentication instruction.
  • step S3 the authentication server performs authentication according to the authentication request message, and returns an authentication result.
  • step S4 the security chip receives the authentication result sent by the authentication server.
  • step S5 the security chip sends the authentication result to the electronic device security management program.
  • Step S6 The electronic device security management program determines, according to the authentication result, whether the electronic device can continue to develop or install an application that needs to use the hardware function module. Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program terminates the user to continue to develop or install the application on the electronic device; when the authentication result is successful, the electronic device management The system then allows the user to continue to develop or install the application on the electronic device.
  • FIG. 3 and FIG. 4 an architecture diagram of an anti-counterfeiting system and a circuit block diagram of an electronic device according to Embodiment 2 of the present invention are shown.
  • the anti-counterfeiting system includes: an electronic device 10 and an authentication server 20; the electronic device 10 includes a central processing unit 11, a device storage device 12, and a hardware function module 13.
  • the device storage device 12 is configured to store an electronic device security management program
  • the central processing unit 11 reads and runs an electronic device security management program in the device storage device 12 when the user develops or installs an application that uses the hardware function module 13 on the electronic device 10; the electronic device The security management program triggers the authentication communication between the hardware function module 13 and the server; the electronic device security management program further determines the development or installation process of the application according to the authentication result of the hardware function module 13;
  • the manner in which the electronic device security management program triggers the hardware function module 13 to perform authentication communication may be: the electronic device security management program sends a notification to the hardware function module 13 for notifying the hardware function.
  • the module is used by the application or may be used by the application, and then the hardware function module 13 internally generates an authentication command, so that the hardware function module 13 performs authentication communication with the authentication server; or The electronic device security management program directly to the hardware function module 13 sending an authentication command, so that the hardware function module 13 and the authentication server perform authentication communication.
  • the hardware function module 13 is configured to send an authentication request message to the authentication server 20 for the hardware module that implements a specific function, and receive the authentication result sent back by the authentication server 20, and the authentication is performed. The result is fed back to the electronic device security management program running in the central processing unit 11;
  • the authentication server 20 authenticates the hardware function module 13 according to the authentication request message sent by the hardware function module 13, and returns an authentication result.
  • the hardware function module 13 is triggered to send an authentication request message to the authentication server 20, and the implementation manner may be:
  • the hardware function module 13 After receiving the notification sent by the electronic device security management program, the hardware function module 13 internally generates an authentication command, and then sends an authentication request message to the authentication server 20 according to the authentication command; or
  • the hardware function module 13 After receiving the authentication command sent by the electronic device security management program, the hardware function module 13 sends an authentication request message to the authentication server 20 according to the authentication command.
  • the electronic device security management program running in the central processing unit 11 terminates the development or installation of the application on the electronic device; when the authentication result is Upon success, the electronic device security management program running in the central processing unit 11 allows the application to continue to be developed or installed on the electronic device.
  • the communication between the hardware function module 13 and the authentication server is completed by hardware having a communication function.
  • the hardware having the communication function may be built in the electronic device or may be built in the hardware function module. Since the hardware having the communication function can be obtained according to the prior art, detailed description will not be made here.
  • the hardware function module is a fake, and the user continues to develop or install the application using the hardware function module on the electronic device, so that the fake hardware function module is actually not available. Use status.
  • the electronic device security management program When the electronic device and the hardware function module provided by the second embodiment of the present invention develop or install an application that needs to use the hardware function module on the electronic device, the electronic device security management program is started, and then the hardware function is triggered. Authentication communication between the module and the authentication server, and determining whether the application can continue to be developed or installed according to the authentication result, thereby enabling the fake hardware function module to be practically unavailable, thereby achieving Anti-counterfeiting effect. Moreover, the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • the anti-counterfeiting hardware function module 13 includes a security chip 133.
  • the security chip 133 is configured to send an authentication request message to the authentication server after receiving the authentication command, and receive an authentication result sent by the authentication server, and feed back the authentication result to the electronic device security management program.
  • the authentication instruction is sent by the electronic device security management program.
  • the electronic device security management program determines, based on the authentication result, whether the electronic device can continue to develop or install an application that needs to use the hardware function module. Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program terminates the development or installation of the application on the electronic device; when the authentication result is successful, the electronic device security management The program will then allow the user to continue to develop or install the application on the electronic device.
  • the hardware function module is a fake, and the application that terminates on the electronic device is used to continue to send or install the hardware function module, so that the fake hardware function module is actually unavailable.
  • the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • the communication between the security chip 133 and the authentication server is completed by hardware having a communication function.
  • the hardware having the communication function may be built in the electronic device or built in the hardware function module, or the security chip itself may have a communication function. Since the hardware having the communication function can be obtained according to the prior art, detailed description will not be made here.
  • the security chip provided by the third embodiment of the present invention when the hardware function module is used by an application or may be used by an application, starts an electronic device security management program, and then triggers a comparison between the security chip and the authentication server.
  • the right communication and according to the result of the authentication, determines whether the application can continue to be developed or installed on the electronic device, thereby making the fake hardware function module practically unavailable, thereby achieving the anti-counterfeiting effect.
  • FIG. 6 is a circuit block diagram of an anti-forgery hardware function module according to Embodiment 4 of the present invention.
  • the anti-counterfeiting hardware function module 13 provided in the fourth embodiment further includes a microprocessor 131 and a module storage device 132.
  • the module storage device 132 is configured to store an authentication management program
  • the microprocessor 131 receives the notification sent by the electronic device security management program, and according to the notification, the application program uses or may use the hardware function module 13 to read the authentication management program in the module storage device 132. And the authentication management program sends an authentication instruction to the security chip.
  • the electronic device security management program determines, based on the authentication result, whether the electronic device can continue to develop or install an application that needs to use the hardware function module. Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program terminates the development or installation of the application on the electronic device; when the authentication result is successful, the electronic device security management The program will then allow the user to continue to develop or install the application on the electronic device.
  • the hardware function module is a fake, and the application that terminates on the electronic device is used to continue to send or install the hardware function module, so that the fake hardware function module is actually unavailable.
  • the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • the security chip provided by the fourth embodiment of the present invention when the hardware function module is used by an application or may be used by an application, starts an electronic device security management program, and then triggers a comparison between the security chip and the authentication server. The right communication, and according to the result of the authentication, determines whether the application can continue to be developed or installed on the electronic device, thereby making the fake hardware function module practically unavailable, thereby achieving the anti-counterfeiting effect.
  • the content of the above-mentioned hardware function module, the information exchange between the security chip and the authentication server, the execution process, etc. because the anti-counterfeiting method provided by the specific embodiment 1 of the present invention is based on the same concept, is not exhaustive. For details, refer to the description of the anti-counterfeiting method provided in the specific embodiment 1 of the present invention, and details are not described herein again.
  • ROM Read Only Memory
  • RAM Random Access Memory
  • disk optical disk

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

An anti-counterfeiting method for a hardware functional module (13) of an electronic device, and a security chip (133), the hardware functional module (13), an electronic apparatus (10) and a system thereof. The method comprises: when a hardware functional module (13) is used or may be used by an application program, receiving an authentication instruction; according to the authentication instruction, sending an authentication request message to an authentication server (20); and receiving an authentication result returned by the authentication server (20). Since an authentication program is started when the hardware functional module (13) is used or may be used by the application program, and since whether the application program may continue to be developed or installed is determined according to the authentication result, it is possible to enable a mimic hardware functional module (13) to be actually in an unusable state, thereby achieving the effect of anti-counterfeiting without needing to disassemble a detected electronic apparatus (10); in this way, detection costs may be reduced, and convenience and practicality are realized.

Description

一种电子设备的硬件功能模组的防伪方法及其安全芯片、硬件功能模组、电子装置、系统Anti-counterfeiting method for hardware function module of electronic device and security chip, hardware function module, electronic device and system 【技术领域】[Technical Field]
本发明涉及全息影像技术领域,尤其涉及一种对全息影像技术领域中的硬件装置进行防伪的安全芯片、硬件功能模组、电子装置、系统及其方法。The present invention relates to the field of holographic image technology, and in particular, to a security chip, a hardware function module, an electronic device, a system and a method thereof for performing anti-counterfeiting on a hardware device in the field of holographic image technology.
【背景技术】【Background technique】
现代社会,随着科技的迅猛发展,技术领域的分工也越来越细。一个完整的电子设备中的各个不同硬件模组,往往分别是由不同的厂商提供的。同时,也有很多不同的厂商,生产同一类硬件模组。但是,不同供应商之间的品质、品牌、技术成熟度等等都会存在较大差异。因此,会出现仿冒现象。In modern society, with the rapid development of science and technology, the division of labor in the technical field is becoming more and more detailed. Different hardware modules in a complete electronic device are often provided by different vendors. At the same time, there are many different manufacturers that produce the same type of hardware modules. However, there will be large differences in quality, brand, technology maturity, etc. between different suppliers. Therefore, counterfeiting can occur.
如,目前,在全息影像的技术领域中产生的全息现实技术,通过全息现实技术将数字世界物化到真实世界中,用户无需任何头戴设备即可观看、触摸、感知和操控全息信息,与全息影像进行互动。实现这一技术需要有特定的显示装置,而基于该技术制作内容的厂商所开发的程序或应用软件,也需要在包含该显示装置的设备上开发或者运行。但,如前所述,这种特定的显示装置同样会存在仿制品或其他替代品。因此,如何对该特定的硬件装置进行防伪,是一个亟待解决的问题。For example, at present, the holographic reality technology produced in the technical field of holographic images materializes the digital world into the real world through holographic reality technology, and users can view, touch, sense and manipulate holographic information without any head-mounted device, and holography. The images interact. Implementing this technology requires a specific display device, and a program or application software developed by a manufacturer who manufactures content based on the technology also needs to be developed or run on a device including the display device. However, as mentioned earlier, this particular display device will also have imitations or other alternatives. Therefore, how to prevent this specific hardware device is an urgent problem to be solved.
现有的电子装置的硬件防伪检测方式,是对硬件模组进行独立检测,例如采用打上防伪标签的方式进行防伪。鉴定时,将电子装置拆解开来,辨识该硬件模组是否有防伪标签,或者防伪标签的真假如何。但是,这种检测方式,需要对电子装置进行拆解,因此,该方法不但鉴定成本较高,并且鉴定起来并不十分便捷,实用性不强。The hardware anti-counterfeiting detection method of the existing electronic device is to independently detect the hardware module, for example, by using an anti-counterfeit label to perform anti-counterfeiting. During the identification, the electronic device is disassembled to identify whether the hardware module has an anti-counterfeit label, or how true or false the anti-counterfeit label is. However, this type of detection requires disassembly of the electronic device. Therefore, the method not only has a high authentication cost, but also is not very convenient to identify and is not practical.
【发明内容】[Summary of the Invention]
本发明要解决的技术问题是提供一种便捷、实用的电子设备的硬件功能模组的防伪方法及其安全芯片、硬件功能模组、电子装置、系统。The technical problem to be solved by the present invention is to provide a convenient and practical anti-counterfeiting method for hardware function modules of electronic devices, and a security chip, a hardware function module, an electronic device and a system.
为解决上述技术问题,本发明提供以下技术方案:In order to solve the above technical problems, the present invention provides the following technical solutions:
一方面,本发明提供一种电子设备的硬件功能模组防伪方法,该方法包括:当硬件功能模组被应用程序使用或可能使用时,接收鉴权指令;根据该鉴权 指令,发送鉴权请求消息至鉴权服务器;接收该鉴权服务器返回的鉴权结果。In one aspect, the present invention provides a hardware function module anti-counterfeiting method for an electronic device, the method comprising: receiving an authentication instruction when the hardware function module is used or possibly used by an application; according to the authentication The instruction sends an authentication request message to the authentication server, and receives an authentication result returned by the authentication server.
在一些具体实施方式中,该方法还包括:根据该鉴权结果确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的该应用程序。In some embodiments, the method further includes determining, based on the authentication result, whether the application that needs to use the hardware function module can continue to be developed or installed on the electronic device.
在一些具体实施方式中,根据该鉴权结果确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的该应用程序的步骤,具体包括:当鉴权结果为失败时,终止在该电子装置上开发或安装该应用程序;当鉴权结果为成功时,则允许继续在该电子装置上开发或安装该应用程序。In some embodiments, determining, according to the authentication result, whether the electronic device can continue to develop or install the application that needs to use the hardware function module, specifically, when the authentication result is a failure, terminating in the The application is developed or installed on the electronic device; when the authentication result is successful, the application is allowed to continue to be developed or installed on the electronic device.
另一方面,本发明提供一种防伪的安全芯片,应用于硬件功能模组,其特征在于,所述安全芯片内置于所述硬件功能模组,所述安全芯片用于执行本发明电子设备的硬件功能模组防伪方法提供的任意一个具体实施方式中的方法。In another aspect, the present invention provides a security chip for anti-counterfeiting, which is applied to a hardware function module, wherein the security chip is built in the hardware function module, and the security chip is used to execute the electronic device of the present invention. The hardware function module anti-counterfeiting method provides a method in any one of the specific embodiments.
另一方面,本发明提供一种防伪的硬件功能模组,该硬件功能模组用于电子装置中,其特征在于,该硬件功能模组包括本发明防伪的安全芯片提供的任意一个具体实施方式中的安全芯片。In another aspect, the present invention provides an anti-counterfeiting hardware function module, which is used in an electronic device, and is characterized in that the hardware function module includes any one of the specific embodiments provided by the anti-forgery security chip of the present invention. Security chip in the middle.
在一些具体实施方式中,该硬件功能模组还包括:微处理器以及模组存储装置;该模组存储装置,用于存储鉴权管理程序;该微处理器,接收电子装置安全管理程序发送的通知,并根据该通知获知有应用程序使用或可能使用该硬件功能模组,读取该模组存储装置中的鉴权管理程序,并由该鉴权管理程序向该安全芯片发送鉴权指令。In some embodiments, the hardware function module further includes: a microprocessor and a module storage device; the module storage device is configured to store an authentication management program; and the microprocessor receives the electronic device security management program to send And according to the notification, it is known that an application uses or may use the hardware function module, reads an authentication management program in the module storage device, and sends an authentication instruction to the security chip by the authentication management program. .
另一方面,本发明提供一种防伪的电子装置,该电子装置包括中央处理器以及设备存储装置,其特征在于,该电子装置还包括本发明硬件功能模组提供的任意一个具体实施方式中的硬件功能模组;其中,该设备存储装置,用于存储电子装置安全管理程序;该中央处理器,读取并运行该设备存储装置中的电子装置安全管理程序;当用户在该电子装置上开发或安装需使用该硬件功能模组的应用程序时,该电子装置安全管理程序触发该硬件功能模组的鉴权程序。In another aspect, the present invention provides an anti-counterfeiting electronic device, which includes a central processing unit and a device storage device, wherein the electronic device further includes any one of the specific embodiments provided by the hardware function module of the present invention. a hardware function module; wherein the device storage device is configured to store an electronic device security management program; the central processor reads and runs an electronic device security management program in the device storage device; when the user develops on the electronic device Or when installing an application that needs to use the hardware function module, the electronic device security management program triggers an authentication procedure of the hardware function module.
在一些具体实施方式中,根据该鉴权结果确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的该应用程序的步骤,由该中央处理器中运行的电子装置安全管理程序执行。In some embodiments, determining, according to the authentication result, whether the electronic device can continue to develop or install the application that needs to use the hardware function module, and the electronic device security management program running in the central processor carried out.
另一方面,本发明提供一种防伪的安全系统,其特征在于,该安全系统包括鉴权服务器,以及如本发明电子装置提供的任意一项具体实施方式中的电子装置;其中,该鉴权服务器,用于接收该电子装置发送的鉴权请求消息,并根 据该鉴权请求消息对该电子装置中的硬件功能模组进行鉴权,然后向该电子装置返回鉴权结果。In another aspect, the present invention provides an anti-counterfeiting security system, characterized in that the security system comprises an authentication server, and an electronic device according to any of the embodiments provided by the electronic device of the present invention; wherein the authentication a server, configured to receive an authentication request message sent by the electronic device, and further The hardware function module in the electronic device is authenticated according to the authentication request message, and then the authentication result is returned to the electronic device.
另一方面,本发明提供一种计算机可读存储介质,其特征在于该计算机可读存储介质中存储的计算程序在被运行时,执行本发明电子设备的硬件功能模组防伪方法提供的任意一个具体实施方式中的方法。In another aspect, the present invention provides a computer readable storage medium, characterized in that, when the computing program stored in the computer readable storage medium is executed, any one of the hardware function module anti-counterfeiting methods of the electronic device of the present invention is provided. The method in the detailed description.
另一方面,本发明提供一种计算机程序产品,其存储于计算机内部存储模块,该计算机程序产品被运行时执行本发明电子设备的硬件功能模组防伪方法提供的任意一个具体实施方式中的方法。In another aspect, the present invention provides a computer program product stored in a computer internal storage module, the computer program product being executed to perform the method of any one of the specific embodiments provided by the hardware function module anti-counterfeiting method of the electronic device of the present invention. .
本发明的有益效果在于,由于是在该硬件功能模组被应用程序使用或可能被使用时,会启动鉴权程序,并根据鉴权结果决定该应用程序是否可以继续开发或安装,由此,可以使仿制的硬件功能模组实际上处于不可用状态,从而达到防伪的效果。该防伪方法无需将被检测的电子装置拆解开来,既可以降低检测成本,也方便、实用。The beneficial effects of the present invention are that, when the hardware function module is used by the application or may be used, the authentication program is started, and according to the authentication result, whether the application can continue to be developed or installed, thereby The fake hardware function module can be actually in an unusable state, thereby achieving the anti-counterfeiting effect. The anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
【附图说明】[Description of the Drawings]
图1本发明具体实施方式一提供的一种电子设备的硬件功能模组防伪方法的流程图;1 is a flowchart of an anti-counterfeiting method for a hardware function module of an electronic device according to a first embodiment of the present invention;
图2为图1的硬件功能模组防伪方法在具体应用场景下的信令交互图;2 is a signaling interaction diagram of the anti-forgery method of the hardware function module of FIG. 1 in a specific application scenario;
图3本发明具体实施方式二提供的一种防伪系统的架构图;FIG. 3 is a structural diagram of an anti-counterfeiting system according to Embodiment 2 of the present invention; FIG.
图4为图2中电子装置的电路原理框图;4 is a circuit block diagram of the electronic device of FIG. 2;
图5本发明具体实施方式三提供的一种防伪的硬件功能模组的电路原理框图;FIG. 5 is a circuit block diagram of an anti-forgery hardware function module according to Embodiment 3 of the present invention; FIG.
图6本发明具体实施方式四提供的一种防伪的硬件功能模组的电路原理框图。FIG. 6 is a circuit block diagram of an anti-forgery hardware function module according to Embodiment 4 of the present invention.
附图标记:Reference mark:
电子装置 Electronic device 1010
中央处理器 CPU 1111
设备存储装置设备存储装置Device storage device storage device 1212
硬件功能模组 Hardware function module 1313
微处理器 microprocessor 131131
模组存储装置 Module storage device 132132
安全芯片 Security chip 133133
鉴权服务器 Authentication server 2020
【具体实施方式】【detailed description】
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及具体实施方式,对本发明进行进一步详细说明。应当理解,此处所描述的具体具体实施方式仅用以解释本发明,并不用于限定本发明。The present invention will be further described in detail below in conjunction with the drawings and specific embodiments. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
此外,下面所描述的本发明各个实施方式中所涉及到的技术特征只要彼此之间未构成冲突就可以相互组合。Further, the technical features involved in the various embodiments of the present invention described below may be combined with each other as long as they do not constitute a conflict with each other.
具体实施方式1DETAILED DESCRIPTION OF THE INVENTION 1
如图1所示,本发明具体实施方式一提供的一种电子设备的硬件功能模组防伪方法的流程图。该硬件功能模组可以是显示模组、存储模组、音频播放模组等等可以由任意厂商独立生产并出售的电子装置中的组件;该方法包括:FIG. 1 is a flowchart of a method for anti-counterfeiting of a hardware function module of an electronic device according to a first embodiment of the present invention. The hardware function module can be a component of an electronic device that can be independently produced and sold by any manufacturer, such as a display module, a storage module, an audio play module, and the like; the method includes:
步骤100,当硬件功能模组被应用程序使用或可能使用时,接收鉴权指令;Step 100: Receive an authentication instruction when the hardware function module is used by the application or may be used;
步骤200,根据鉴权指令,发送鉴权请求消息至鉴权服务器;Step 200: Send an authentication request message to the authentication server according to the authentication instruction.
步骤300,接收鉴权服务器返回的鉴权结果。Step 300: Receive an authentication result returned by the authentication server.
进一步的,该方法还包括:步骤400,根据鉴权结果处理该电子装置中应用程序的开发或安装进程。具体的,是根据该鉴权结果,确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的应用程序。更为具体的是,当鉴权结果是失败时或无鉴权结果返回时,则终止在该电子装置上开发或安装该应用程序;当鉴权结果是成功时,则可继续在该电子装置上开发或安装该应用程序。Further, the method further includes: Step 400, processing the development or installation process of the application in the electronic device according to the authentication result. Specifically, according to the authentication result, it is determined whether the electronic device can continue to develop or install an application that needs to use the hardware function module. More specifically, when the authentication result is a failure or no authentication result is returned, the application is developed or installed on the electronic device; when the authentication result is successful, the electronic device can continue to be used. Develop or install the application on.
因为鉴权失败,说明该硬件功能模组是仿制品,终止用户继续在该电子设备上开发或者安装需使用该硬件功能模组的应用程序,使得该仿制品实际上处于不可用状态。Because the authentication fails, the hardware function module is a fake, and the user continues to develop or install an application that needs to use the hardware function module on the electronic device, so that the imitation is actually in an unavailable state.
本发明具体实施方式一提供的防伪方法,由于是在该硬件功能模组被应用程序使用或可能被使用时,会启动电子装置安全管理程序,即鉴权程序,使得硬件功能模组与鉴权服务器之间进行鉴权通信,并根据鉴权结果决定该应用程序是否可以继续开发或安装,由此,可以使仿制的硬件功能模组实际上处于不 可用状态,从而达到防伪的效果。并且,该防伪方法无需将被检测的电子装置拆解开来,既可以降低检测成本,也方便、实用。The anti-counterfeiting method provided by the specific embodiment 1 of the present invention, when the hardware function module is used by the application or may be used, starts the electronic device security management program, that is, the authentication program, so that the hardware function module and the authentication function The server performs authentication communication, and determines whether the application can continue to be developed or installed according to the authentication result, thereby enabling the fake hardware function module to be actually not The state is available to achieve anti-counterfeiting effects. Moreover, the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
如图2所示,为图1的防伪方法的在具体应用场景下的信令交互图。As shown in FIG. 2, it is a signaling interaction diagram in a specific application scenario of the anti-counterfeiting method of FIG.
该具体的应用场景是全息实现技术领域。其中,电子装置的硬件功能模组,具体而言是一种可以实现全息影像以及用户与全息影像之间进行互动等功能的硬件功能模组。该硬件功能模组中内置了用于防伪的安全芯片,当在该电子装置上开发运行某一应用程序,而该应用程序的开发或运行又必须使用或可能使到该硬件功能模组时,则电子装置安全管理程序(如:鉴权程序)会被触发,使得该硬件功能模组中内置的安全芯片与鉴权服务器之间通信,进行鉴权。This specific application scenario is in the field of holographic implementation technology. The hardware function module of the electronic device is specifically a hardware function module capable of realizing functions such as hologram image and interaction between the user and the hologram image. A security chip for anti-counterfeiting is built in the hardware function module. When an application is developed and run on the electronic device, and the development or operation of the application must use or possibly enable the hardware function module, The electronic device security management program (eg, the authentication program) is triggered to enable communication between the security chip built in the hardware function module and the authentication server for authentication.
而该电子装置安全管理程序被触发的情形至少可以有两种:There are at least two situations in which the electronic device security management program is triggered:
其一,该电子装置中的软件开发工具包(SDK,Software Development Kit)中设置一个电子装置安全管理程序,任何一个内容程序开发者需要在该电子装置上开发一个需要使用该硬件功能模块的应用程序时,则该电子装置安全管理程序会被触发,并使得该安全芯片与鉴权服务器之间进行鉴权通信;First, an electronic device security management program is set in a software development kit (SDK) in the electronic device, and any content program developer needs to develop an application on the electronic device that needs to use the hardware function module. In the program, the electronic device security management program is triggered, and the authentication communication between the security chip and the authentication server is performed;
其二,当任何一个用户在该电子装置上安装某一应用程序,而该应用程序的运行需要使用该硬件功能模组时,API(Application Programming Interface,应用程序编程接口)也会触发上述电子装置安全管理程序,使得该安全芯片与鉴权服务器之间进行鉴权通信。Second, when any user installs an application on the electronic device, and the application needs to use the hardware function module, an API (Application Programming Interface) also triggers the electronic device. The security management program enables authentication communication between the security chip and the authentication server.
综合上述两种情形,即,当该硬件功能模组被应用程序使用或者可能被使用时,电子装置安全管理程序都会触发该安全芯片与鉴权服务器之间进行鉴权通信。具体而言,该电子装置安全管理程序可以是直接发送鉴权指令给安全芯片,进行鉴权;也可以是先通知该硬件功能模块,然后该硬件功能模块内部生成一鉴权指令发送给安全芯片,进行鉴权。The above two situations are integrated, that is, when the hardware function module is used by the application or may be used, the electronic device security management program triggers authentication communication between the security chip and the authentication server. Specifically, the electronic device security management program may directly send an authentication command to the security chip for authentication; or may notify the hardware function module first, and then generate an authentication command internally to the security chip. , for authentication.
基于以上应用场景,该方法包括以下步骤:步骤S1,当硬件功能模组被应用程序使用或可能使用时,安全芯片接收鉴权指令,该安全芯片内置于一硬件功能模组中;Based on the above application scenario, the method includes the following steps: Step S1, when the hardware function module is used by the application or may be used, the security chip receives the authentication instruction, and the security chip is built in a hardware function module;
具体的,步骤S1为以下两种实现方式:Specifically, step S1 is implemented in the following two ways:
方式一method one
步骤S111,安全芯片接收电子装置安全管理程序发送的鉴权指令,该电子装置安全管理程序是内置于电子装置中的鉴权程序;或者, Step S111, the security chip receives an authentication command sent by the electronic device security management program, where the electronic device security management program is an authentication program built in the electronic device; or
方式二Way two
步骤S121,硬件功能模组中的微控制器接收电子装置安全管理程序发送的通知,该通知是用于通知该硬件功能模组被该应用程序使用或可能被该应用程序使用;Step S121, the microcontroller in the hardware function module receives a notification sent by the electronic device security management program, and the notification is used to notify the hardware function module to be used by the application program or may be used by the application program;
步骤S122,该硬件功能模组中的微控制器发送鉴权指令给安全芯片。Step S122, the microcontroller in the hardware function module sends an authentication instruction to the security chip.
步骤S2,安全芯片根据鉴权指令,向鉴权服务器发送鉴权请求消息。Step S2: The security chip sends an authentication request message to the authentication server according to the authentication instruction.
步骤S3,鉴权服务器根据鉴权请求消息进行鉴权,并返回鉴权结果。In step S3, the authentication server performs authentication according to the authentication request message, and returns an authentication result.
步骤S4,安全芯片接收鉴权服务器发给的鉴权结果。In step S4, the security chip receives the authentication result sent by the authentication server.
步骤S5,安全芯片将该鉴权结果发送给电子装置安全管理程序。In step S5, the security chip sends the authentication result to the electronic device security management program.
步骤S6,电子装置安全管理程序根据该鉴权结果,确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的应用程序。具体的,当鉴权结果是失败时或无鉴权结果返回时,电子装置安全管理程序会终止用户继续在该电子装置上开发或安装该应用程序;当鉴权结果是成功时,电子装置管理系统则允许用户继续在该电子装置上开发或安装该应用程序。Step S6: The electronic device security management program determines, according to the authentication result, whether the electronic device can continue to develop or install an application that needs to use the hardware function module. Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program terminates the user to continue to develop or install the application on the electronic device; when the authentication result is successful, the electronic device management The system then allows the user to continue to develop or install the application on the electronic device.
具体实施方式2DETAILED DESCRIPTION 2
如图3和图4所示,本发明具体实施方式二提供的一种防伪系统的架构图及电子装置的电路原理框图。As shown in FIG. 3 and FIG. 4, an architecture diagram of an anti-counterfeiting system and a circuit block diagram of an electronic device according to Embodiment 2 of the present invention are shown.
该防伪系统包括:电子装置10和鉴权服务器20;该电子装置10包括中央处理器11,设备存储装置12以及硬件功能模组13。The anti-counterfeiting system includes: an electronic device 10 and an authentication server 20; the electronic device 10 includes a central processing unit 11, a device storage device 12, and a hardware function module 13.
该设备存储装置12,用于存储电子装置安全管理程序;The device storage device 12 is configured to store an electronic device security management program;
该中央处理器11,当用户在该电子装置10上开发或安装需使用该硬件功能模组13的应用程序时,读取并运行该设备存储装置12中的电子装置安全管理程序;该电子装置安全管理程序触发该硬件功能模组13与服务器之间进行鉴权通信;该电子装置安全管理程序还会根据该硬件功能模组13的鉴权结果决定该应用程序的开发或安装进程;The central processing unit 11 reads and runs an electronic device security management program in the device storage device 12 when the user develops or installs an application that uses the hardware function module 13 on the electronic device 10; the electronic device The security management program triggers the authentication communication between the hardware function module 13 and the server; the electronic device security management program further determines the development or installation process of the application according to the authentication result of the hardware function module 13;
具体的,该电子装置安全管理程序触发该硬件功能模组13进行鉴权通信的方式可以是:该电子装置安全管理程序向该硬件功能模组13发送通知,该通知是用于通知该硬件功能模组被该应用程序使用或可能被该应用程序使用,然后该硬件功能模组13内部生成一鉴权指令,使得该硬件功能模组13与鉴权服务器之间进行鉴权通信;或者,该电子装置安全管理程序直接向该硬件功能模组 13发送鉴权指令,使得该硬件功能模组13与鉴权服务器之间进行鉴权通信。Specifically, the manner in which the electronic device security management program triggers the hardware function module 13 to perform authentication communication may be: the electronic device security management program sends a notification to the hardware function module 13 for notifying the hardware function. The module is used by the application or may be used by the application, and then the hardware function module 13 internally generates an authentication command, so that the hardware function module 13 performs authentication communication with the authentication server; or The electronic device security management program directly to the hardware function module 13 sending an authentication command, so that the hardware function module 13 and the authentication server perform authentication communication.
该硬件功能模组13,为实现某一特定功能的硬件模组,被触发向该鉴权服务器20发送鉴权请求消息,并接收鉴权服务器20发回的鉴权结果,并将该鉴权结果反馈给中央处理器11中运行的电子装置安全管理程序;The hardware function module 13 is configured to send an authentication request message to the authentication server 20 for the hardware module that implements a specific function, and receive the authentication result sent back by the authentication server 20, and the authentication is performed. The result is fed back to the electronic device security management program running in the central processing unit 11;
鉴权服务器20,根据该硬件功能模组13发送的鉴权请求消息,对硬件功能模组13进行鉴权,并返回鉴权结果。The authentication server 20 authenticates the hardware function module 13 according to the authentication request message sent by the hardware function module 13, and returns an authentication result.
具体的,该硬件功能模组13被触发向该鉴权服务器20发送鉴权请求消息,实现方式可以是:Specifically, the hardware function module 13 is triggered to send an authentication request message to the authentication server 20, and the implementation manner may be:
该硬件功能模组13接收到电子装置安全管理程序发送的通知之后,内部生成鉴权指令,然后根据该鉴权指令向该鉴权服务器20发送鉴权请求消息;或者,After receiving the notification sent by the electronic device security management program, the hardware function module 13 internally generates an authentication command, and then sends an authentication request message to the authentication server 20 according to the authentication command; or
该硬件功能模组13接收到电子装置安全管理程序发送的鉴权指令后,根据该鉴权指令向鉴权服务器20发送鉴权请求消息。After receiving the authentication command sent by the electronic device security management program, the hardware function module 13 sends an authentication request message to the authentication server 20 according to the authentication command.
具体的,当鉴权结果是失败时或无鉴权结果返回时,中央处理器11中运行的电子装置安全管理程序会终止在该电子装置上继续开发或安装该应用程序;当鉴权结果是成功时,中央处理器11中运行的电子装置安全管理程序则允许在该电子装置上继续开发或安装该应用程序。Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program running in the central processing unit 11 terminates the development or installation of the application on the electronic device; when the authentication result is Upon success, the electronic device security management program running in the central processing unit 11 allows the application to continue to be developed or installed on the electronic device.
需要说明的是,本具体实施方式2中,该硬件功能模组13与鉴权服务器之间的通信是通过具备通信功能的硬件完成的。该具备通信功能的硬件可以是内置于该电子装置中,也可以是内置于该硬件功能模组中。由于该具备通信功能的硬件可以根据现有技术获得,此处则不再做详细表述。It should be noted that, in the second embodiment, the communication between the hardware function module 13 and the authentication server is completed by hardware having a communication function. The hardware having the communication function may be built in the electronic device or may be built in the hardware function module. Since the hardware having the communication function can be obtained according to the prior art, detailed description will not be made here.
因为鉴权失败,说明该硬件功能模组是仿制品,终止用户继续在该电子设备上开发或者安装需使用使用该硬件功能模组的应用程序,使得该仿制的硬件功能模组实际上处于不可用状态。Because the authentication fails, the hardware function module is a fake, and the user continues to develop or install the application using the hardware function module on the electronic device, so that the fake hardware function module is actually not available. Use status.
本发明具体实施方式二提供的电子装置以及硬件功能模组,当在该电子设备上开发或者安装需使用该硬件功能模组的应用程序时,会启动电子装置安全管理程序,然后触发该硬件功能模组与鉴权服务器之间的鉴权通信,并根据鉴权结果决定该应用程序是否可以继续开发或者安装,由此,可以使仿制的硬件功能模组实际上处于不可用在状态,从而达到防伪的效果。并且,该防伪方法无需将被检测的电子装置拆解开来,既可以降低检测成本,也方便、实用。 When the electronic device and the hardware function module provided by the second embodiment of the present invention develop or install an application that needs to use the hardware function module on the electronic device, the electronic device security management program is started, and then the hardware function is triggered. Authentication communication between the module and the authentication server, and determining whether the application can continue to be developed or installed according to the authentication result, thereby enabling the fake hardware function module to be practically unavailable, thereby achieving Anti-counterfeiting effect. Moreover, the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
具体实施方式3DETAILED DESCRIPTION OF THE INVENTION
如图5所示,本发明具体实施方式三提供的一种防伪的硬件功能模组的电路原理框图。该防伪硬件功能模组13包括:安全芯片133。As shown in FIG. 5, a circuit block diagram of an anti-forgery hardware function module according to a third embodiment of the present invention is shown. The anti-counterfeiting hardware function module 13 includes a security chip 133.
该安全芯片133,用于在接收到鉴权指令之后,向鉴权服务器发送鉴权请求消息;并接收鉴权服务器发给的鉴权结果,将该鉴权结果反馈给电子装置安全管理程序。The security chip 133 is configured to send an authentication request message to the authentication server after receiving the authentication command, and receive an authentication result sent by the authentication server, and feed back the authentication result to the electronic device security management program.
在具体实施方式三中,鉴权指令是由电子装置安全管理程序发送。In the third embodiment, the authentication instruction is sent by the electronic device security management program.
电子装置安全管理程序根据该鉴权结果,确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的应用程序。具体的,当鉴权结果是失败时或无鉴权结果返回时,电子装置安全管理程序会终止在该电子装置上继续开发或安装该应用程序;当鉴权结果是成功时,电子装置安全管理程序则会允许用户继续在该电子装置上开发或安装该应用程序。The electronic device security management program determines, based on the authentication result, whether the electronic device can continue to develop or install an application that needs to use the hardware function module. Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program terminates the development or installation of the application on the electronic device; when the authentication result is successful, the electronic device security management The program will then allow the user to continue to develop or install the application on the electronic device.
因为鉴权失败,说明该硬件功能模组是仿制品,终止在该电子设备上开继续发或者安装使用该硬件功能模组的应用程序,使得该仿制的硬件功能模组实际上处于不可用状态,从而为达到防伪的效果。并且,该防伪方法无需将被检测的电子装置拆解开来,既可以降低检测成本,也方便、实用。Because the authentication fails, the hardware function module is a fake, and the application that terminates on the electronic device is used to continue to send or install the hardware function module, so that the fake hardware function module is actually unavailable. In order to achieve the anti-counterfeiting effect. Moreover, the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
需要说明的是,本具体实施方式3中,该安全芯片133与鉴权服务器之间的通信是通过具备通信功能的硬件完成的。该具备通信功能的硬件可以是内置于该电子装置中,或者是内置于该硬件功能模组中,也可以是该安全芯片本身则具备通信功能。由于该具备通信功能的硬件可以根据现有技术获得,此处则不再做详细表述。It should be noted that, in the third embodiment, the communication between the security chip 133 and the authentication server is completed by hardware having a communication function. The hardware having the communication function may be built in the electronic device or built in the hardware function module, or the security chip itself may have a communication function. Since the hardware having the communication function can be obtained according to the prior art, detailed description will not be made here.
本发明具体实施方式三提供的安全芯片,当该硬件功能模组被应用程序使用或可能被应用程序使用时,会启动电子装置安全管理程序,然后触发该安全芯片与鉴权服务器之间的鉴权通信,并根据鉴权结果决定该应用程序是否可以继续在该电子装置上开发或安装,由此,可以使仿制的硬件功能模组实际上处于不可用状态,从而达到防伪的效果。The security chip provided by the third embodiment of the present invention, when the hardware function module is used by an application or may be used by an application, starts an electronic device security management program, and then triggers a comparison between the security chip and the authentication server. The right communication, and according to the result of the authentication, determines whether the application can continue to be developed or installed on the electronic device, thereby making the fake hardware function module practically unavailable, thereby achieving the anti-counterfeiting effect.
具体实施方式4DETAILED DESCRIPTION OF THE INVENTION
如图6所示,本发明具体实施方式四提供的一种防伪的硬件功能模组的电路原理框图。相对于具体实施方式三而言,具体实施方式四提供的一种防伪硬件功能模组13还包括:微处理器131以及模组存储装置132。 FIG. 6 is a circuit block diagram of an anti-forgery hardware function module according to Embodiment 4 of the present invention. The anti-counterfeiting hardware function module 13 provided in the fourth embodiment further includes a microprocessor 131 and a module storage device 132.
该模组存储装置132,用于存储鉴权管理程序;The module storage device 132 is configured to store an authentication management program;
该微处理器131,接收电子装置安全管理程序发送的通知;并根据该通知获知有应用程序使用或可能使用该硬件功能模组13,读取该模组存储装置132中的鉴权管理程序,并由该鉴权管理程序向该安全芯片发送鉴权指令。The microprocessor 131 receives the notification sent by the electronic device security management program, and according to the notification, the application program uses or may use the hardware function module 13 to read the authentication management program in the module storage device 132. And the authentication management program sends an authentication instruction to the security chip.
电子装置安全管理程序根据该鉴权结果,确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的应用程序。具体的,当鉴权结果是失败时或无鉴权结果返回时,电子装置安全管理程序会终止在该电子装置上继续开发或安装该应用程序;当鉴权结果是成功时,电子装置安全管理程序则会允许用户继续在该电子装置上开发或安装该应用程序。The electronic device security management program determines, based on the authentication result, whether the electronic device can continue to develop or install an application that needs to use the hardware function module. Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program terminates the development or installation of the application on the electronic device; when the authentication result is successful, the electronic device security management The program will then allow the user to continue to develop or install the application on the electronic device.
因为鉴权失败,说明该硬件功能模组是仿制品,终止在该电子设备上开继续发或者安装使用该硬件功能模组的应用程序,使得该仿制的硬件功能模组实际上处于不可用状态,从而为达到防伪的效果。并且,该防伪方法无需将被检测的电子装置拆解开来,既可以降低检测成本,也方便、实用。Because the authentication fails, the hardware function module is a fake, and the application that terminates on the electronic device is used to continue to send or install the hardware function module, so that the fake hardware function module is actually unavailable. In order to achieve the anti-counterfeiting effect. Moreover, the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
本发明具体实施方式四提供的安全芯片,当该硬件功能模组被应用程序使用或可能被应用程序使用时,会启动电子装置安全管理程序,然后触发该安全芯片与鉴权服务器之间的鉴权通信,并根据鉴权结果决定该应用程序是否可以继续在该电子装置上开发或安装,由此,可以使仿制的硬件功能模组实际上处于不可用状态,从而达到防伪的效果。值得说明的是,上述硬件功能模组、安全芯片与鉴权服务器之间的信息交互、执行过程等内容,由于与本发明的具体实施方式一提供的防伪方法是基于同一构思,有不详尽之处,具体内容可参见本发明的具体实施方式一提供的防伪方法的叙述,此处不再赘述。The security chip provided by the fourth embodiment of the present invention, when the hardware function module is used by an application or may be used by an application, starts an electronic device security management program, and then triggers a comparison between the security chip and the authentication server. The right communication, and according to the result of the authentication, determines whether the application can continue to be developed or installed on the electronic device, thereby making the fake hardware function module practically unavailable, thereby achieving the anti-counterfeiting effect. It should be noted that the content of the above-mentioned hardware function module, the information exchange between the security chip and the authentication server, the execution process, etc., because the anti-counterfeiting method provided by the specific embodiment 1 of the present invention is based on the same concept, is not exhaustive. For details, refer to the description of the anti-counterfeiting method provided in the specific embodiment 1 of the present invention, and details are not described herein again.
本领域普通技术人员可以理解具体实施方式的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:只读存储器(ROM,Read Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁盘或光盘等。A person skilled in the art can understand that all or part of the various methods of the specific embodiments can be completed by a program to instruct related hardware, and the program can be stored in a computer readable storage medium, and the storage medium can include: Read Only Memory (ROM), Random Access Memory (RAM), disk or optical disk.
上述具体实施方式说明但并不限制本发明,本领域的技术人员能在权利要求的范围内设计出多个可代替实例。所属领域的技术人员应该意识到,对在没有违反如所附权利要求书所定义的本发明的范围之内,可对具体实现方案做出适当的调整、等同替换、修改等。因此,凡依据本发明的原则和构思,所做的任意修改和变化,均在所附权利要求书所定义的本发明的范围之内。 The above detailed description illustrates but does not limit the invention, and those skilled in the art can devise various alternative examples within the scope of the claims. Those skilled in the art will appreciate that appropriate modifications, equivalent substitutions, modifications and the like can be made to the specific embodiments without departing from the scope of the invention as defined by the appended claims. Therefore, any modifications and variations of the present invention are intended to be included within the scope of the invention as defined by the appended claims.

Claims (11)

  1. 一种电子设备的硬件功能模组防伪方法,该方法包括:An anti-counterfeiting method for a hardware function module of an electronic device, the method comprising:
    当硬件功能模组被应用程序使用或可能使用时,接收鉴权指令;Receiving an authentication command when the hardware function module is used by the application or may be used;
    根据该鉴权指令,发送鉴权请求消息至鉴权服务器;Sending an authentication request message to the authentication server according to the authentication instruction;
    接收该鉴权服务器返回的鉴权结果。Receiving the authentication result returned by the authentication server.
  2. 如权利要求1所述的防伪方法,其中,该方法还包括:The anti-counterfeiting method according to claim 1, wherein the method further comprises:
    根据该鉴权结果确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的该应用程序。Based on the authentication result, it is determined whether the application that needs to use the hardware function module can be continuously developed or installed on the electronic device.
  3. 如权利要求2所述的防伪方法,其中,根据该鉴权结果确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的该应用程序的步骤,具体包括:The anti-counterfeiting method of claim 2, wherein determining, according to the authentication result, whether the electronic device can continue to develop or install the application that needs to use the hardware function module, specifically includes:
    当鉴权结果为失败时或无鉴权结果返回时,终止在该电子装置上开发或安装该应用程序;当鉴权结果为成功时,则允许继续在该电子装置上开发或安装该应用程序。When the authentication result is a failure or no authentication result is returned, the application is developed or installed on the electronic device; when the authentication result is successful, the application is allowed to be developed or installed on the electronic device. .
  4. 一种防伪的安全芯片,应用于硬件功能模组,其特征在于,所述安全芯片内置于所述硬件功能模组,所述安全芯片用于执行如权利要求1至3中任意一项所述的电子设备的硬件功能模组防伪方法。An anti-counterfeit security chip is applied to a hardware function module, wherein the security chip is built in the hardware function module, and the security chip is used to perform the method according to any one of claims 1 to 3. The hardware function module anti-counterfeiting method of the electronic device.
  5. 一种防伪的硬件功能模组,该硬件功能模组用于电子装置中,其特征在于,该硬件功能模组包括如权利要求4所述的安全芯片。An anti-counterfeiting hardware function module is used in an electronic device, characterized in that the hardware function module comprises the security chip according to claim 4.
  6. 如权利要求5所述的硬件功能模组,其中,该硬件功能模组还包括:微处理器以及模组存储装置;The hardware function module of claim 5, wherein the hardware function module further comprises: a microprocessor and a module storage device;
    该模组存储装置,用于存储鉴权管理程序;The module storage device is configured to store an authentication management program;
    该微处理器,接收电子装置安全管理程序发送的通知,并根据该通知获知有应用程序使用或可能使用该硬件功能模组,读取该模组存储装置中的鉴权管理程序,并由该鉴权管理程序向该安全芯片发送鉴权指令。The microprocessor receives the notification sent by the electronic device security management program, and according to the notification, the application program uses or may use the hardware function module to read the authentication management program in the module storage device, and The authentication management program sends an authentication command to the security chip.
  7. 一种防伪的电子装置,该电子装置包括中央处理器以及设备存储装置,其特征在于,该电子装置还包括如权利要求5或6所述的硬件功能模组;其中,An anti-counterfeiting electronic device, comprising: a central processing unit and a device storage device, wherein the electronic device further comprises the hardware function module according to claim 5 or 6;
    该设备存储装置,用于存储电子装置安全管理程序;The device storage device is configured to store an electronic device security management program;
    该中央处理器,读取并运行该设备存储装置中的电子装置安全管理程序; 当用户在该电子装置上开发或安装需使用该硬件功能模组的应用程序时,该电子装置安全管理程序触发该硬件功能模组的鉴权程序。The central processor reads and runs an electronic device security management program in the device storage device; When the user develops or installs an application that uses the hardware function module on the electronic device, the electronic device security management program triggers an authentication procedure of the hardware function module.
  8. 如权利要求7所述的电子装置,其中,根据该鉴权结果确定该电子装置上是否可以继续开发或安装需要使用该硬件功能模组的该应用程序的步骤,由该中央处理器中运行的电子装置安全管理程序执行。The electronic device according to claim 7, wherein the step of determining whether the electronic device can continue to develop or install the application requiring the hardware function module according to the authentication result is run by the central processor The electronic device security management program is executed.
  9. 一种防伪的安全系统,其特征在于,该安全系统包括鉴权服务器,以及如权利要求7或8所述的电子装置;其中,该鉴权服务器,用于接收该电子装置发送的鉴权请求消息,并根据该鉴权请求消息对该电子装置中的硬件功能模组进行鉴权,然后向该电子装置返回鉴权结果。An anti-counterfeiting security system, characterized in that the security system comprises an authentication server, and the electronic device according to claim 7 or 8, wherein the authentication server is configured to receive an authentication request sent by the electronic device And authenticating the hardware function module in the electronic device according to the authentication request message, and then returning the authentication result to the electronic device.
  10. 一种计算机可读存储介质,其特征在于该计算机可读存储介质中存储的计算程序在被运行时,执行如权利要求1至3中任意一项所述的方法。A computer readable storage medium characterized in that the computing program stored in the computer readable storage medium, when executed, performs the method of any one of claims 1 to 3.
  11. 一种计算机程序产品,其存储于计算机内部存储模块,该计算机程序产品被运行时执行如权利要求1至3中任意一项所述的方法。 A computer program product stored in a computer internal storage module, the computer program product being executed to perform the method of any one of claims 1 to 3.
PCT/CN2016/079189 2016-04-13 2016-04-13 Anti-counterfeiting method for hardware functional module of electronic device, and security chip, hardware functional module, electronic apparatus and system thereof WO2017177403A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2016/079189 WO2017177403A1 (en) 2016-04-13 2016-04-13 Anti-counterfeiting method for hardware functional module of electronic device, and security chip, hardware functional module, electronic apparatus and system thereof
CN201680002865.9A CN107683463A (en) 2016-04-13 2016-04-13 The method for anti-counterfeit and its safety chip of the hardware capability module of a kind of electronic equipment, hardware capability module, electronic installation, system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/079189 WO2017177403A1 (en) 2016-04-13 2016-04-13 Anti-counterfeiting method for hardware functional module of electronic device, and security chip, hardware functional module, electronic apparatus and system thereof

Publications (1)

Publication Number Publication Date
WO2017177403A1 true WO2017177403A1 (en) 2017-10-19

Family

ID=60042256

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/079189 WO2017177403A1 (en) 2016-04-13 2016-04-13 Anti-counterfeiting method for hardware functional module of electronic device, and security chip, hardware functional module, electronic apparatus and system thereof

Country Status (2)

Country Link
CN (1) CN107683463A (en)
WO (1) WO2017177403A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1746807A (en) * 2005-09-29 2006-03-15 浪潮电子信息产业股份有限公司 Anti-fogery method of parts of famous-brand computer
US7058811B2 (en) * 2001-10-31 2006-06-06 Intel Corporation Apparatus and method to prevent a device driver from loading on a counterfeit hardware element
CN102810077A (en) * 2012-06-29 2012-12-05 北京奇虎科技有限公司 Abnormal hardware detecting method and device
CN103716794A (en) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 Two-way safety verification method and system based on portable device
CN103902402A (en) * 2012-12-30 2014-07-02 航天信息股份有限公司 Radio frequency tag safety chip device and data processing method thereof
CN203909502U (en) * 2014-02-28 2014-10-29 深圳市铭为科技有限公司 Household electrical appliance having fitting false-proof function

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123029A (en) * 2011-03-23 2011-07-13 贺春红 Counterfeiting token and method of dynamic passwords

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7058811B2 (en) * 2001-10-31 2006-06-06 Intel Corporation Apparatus and method to prevent a device driver from loading on a counterfeit hardware element
CN1746807A (en) * 2005-09-29 2006-03-15 浪潮电子信息产业股份有限公司 Anti-fogery method of parts of famous-brand computer
CN102810077A (en) * 2012-06-29 2012-12-05 北京奇虎科技有限公司 Abnormal hardware detecting method and device
CN103902402A (en) * 2012-12-30 2014-07-02 航天信息股份有限公司 Radio frequency tag safety chip device and data processing method thereof
CN103716794A (en) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 Two-way safety verification method and system based on portable device
CN203909502U (en) * 2014-02-28 2014-10-29 深圳市铭为科技有限公司 Household electrical appliance having fitting false-proof function

Also Published As

Publication number Publication date
CN107683463A (en) 2018-02-09

Similar Documents

Publication Publication Date Title
EP3814946B1 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
JP6719079B2 (en) Information equipment, data processing system, data processing method and computer program
CN102693379B (en) Protection operating system Configuration Values
KR100402071B1 (en) Systems and methods for integrity certification and verification of content consumption environments
KR101008448B1 (en) Systems and methods for deterring software piracy in a volume license environment
CN109716331B (en) Application deployment conforming to application data sharing and decision service platform mode
US9639794B2 (en) Secure upgrade supplies and methods
WO2020092094A1 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
TWI679551B (en) Process identity authentication method and device
CN103077345B (en) Based on software authorization method and the system of virtual machine
AU2012101559A4 (en) Device identification using synthetic device keys
KR20150113087A (en) Securing a computing device accessory
US20190311108A1 (en) Recording of intrinsic device signatures in block chain for counterfeit prevention
US20140157368A1 (en) Software authentication
EP2924947B1 (en) Method and apparatus for controlling access
CN111985929A (en) Transaction verification method and device in block chain, node equipment and storage medium
KR101034127B1 (en) Systems and methods for integrity certification and verification
WO2023122633A1 (en) Verified presentation of non-fungible tokens
WO2017177403A1 (en) Anti-counterfeiting method for hardware functional module of electronic device, and security chip, hardware functional module, electronic apparatus and system thereof
US9680816B2 (en) Attesting authenticity of infrastructure modules
US20220405413A1 (en) Information management system, method of controlling the information management system, and storage medium storing program
CN110365492A (en) A kind of method for authenticating, system, equipment and medium
JP2010287081A (en) Device, method and program for managing license
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
CN113596030A (en) Equipment network distribution method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16898222

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21.03.2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16898222

Country of ref document: EP

Kind code of ref document: A1