Method and system for validating chip validity by utilizing graphical chip

A technology of identification verification and chip identification, applied in the field of information security, can solve problems such as hidden dangers of chip identification, and achieve the effect of facilitating automatic identification management, verifying legality, and enhancing security.

Active Publication Date: 2012-03-14
NATIONZ TECH INC
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The technical problem to be solved by the present invention is to provide a method and system for verifying the legitimacy of a chip by

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for validating chip validity by utilizing graphical chip
  • Method and system for validating chip validity by utilizing graphical chip
  • Method and system for validating chip validity by utilizing graphical chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0042] Such as figure 1 as shown,figure 1 A working flow chart of a system for verifying chip legitimacy applying the present invention is described. The system consists of a logo generation module, a graphic logo recognition module and a verification module.

[0043] The identification generation module includes a chip information database, an information encoding unit, an internal identification generation unit, an internal identification download unit, a verification identification generation unit, a graphic identification generation unit, a graphic identification printing unit, a service unit, and a communication unit. The chip information database stores information representing each chip, such as chip informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system and method for validating the chip validity by utilizing a graphical chip. The system comprises an identifier generation module, a graphical identifier identification module and an identifier validation module. The method for validating the chip validity comprises three basic work flows, namely a graphical identifier generation flow, a graphical identifier identification flow and a graphical identifier validation flow. When validating the chip validity, a user uses the graphical identifier on an identification chip of the graphical identifier identification module, and the graphical identifier is reduced into a verification identifier, the verification identifier is transmitted to the identifier validation module, the identifier validation module compares the verification identifier with an internal identifier which is saved in a chip, the graphical identifier of the chip is falsified if the validation identifier is not in accordance with the internal identifier, and the user can determine whether the chip is counterfeited or illegal or not and further forbids the user to download an application program; and the chip is legal if the validation identifier is in accordance with the internal identifier.

Description

technical field [0001] The invention relates to the field of information security, in particular to a system and method for verifying the legitimacy of chips. Background technique [0002] With the development of information security technology, various security products are becoming more and more popular, including USB KEY for online banking, TF-SIM card for mobile payment, trusted computing TCM chip, encrypted U disk, etc. These security products use Security chip to realize its security function. Due to the broad market prospects and huge profit margins of security chips, illegal operators will try to tamper with chips produced by well-known manufacturers by tampering with their own chips, or forge famous manufacturers on the surface of chips produced by non-known manufacturers. identification, from which illegal benefits are obtained. In addition, in order to ensure the security of chip use, users who do not have the right to use the chip and malicious attackers should...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/71
Inventor 陈诗平
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products