Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and device

An authentication and unique technology, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of being easily counterfeited, consumers unable to debate the authenticity, disturbing the normal order of the market, etc., to prevent counterfeiting, protect interests, The effect of protecting the rights and interests of consumers

Inactive Publication Date: 2012-05-30
KONKA GROUP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventors have found that when some embedded devices are put into the market as new products, they are easy to be counterfeited. Counterfeiters can not only easily imitate the hardware of the embedded device, but also load the software program into the embedded device by copying the software program in the embedded device In the counterfeit hardware, a "cottage version" product can be produced and put on the market, and the counterfeit genuine product is sold, and because the program is copied and realized, the functions of the "counterfeit version" product are the same as those of the genuine product, making Consumers are unable to debate authenticity, which greatly disrupts the normal order of the market and damages the interests of genuine product manufacturers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device
  • Authentication method and device
  • Authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0038] It should be noted that the embodiment of the present invention is applicable to authenticate all embedded devices that require software support, including but not limited to any one or more of the following devices: mobile phones, MP3 players, MP4 Players, game consoles, learning machines, electronic dictionaries.

[0039] See figure 1 , is a schematic structural diagram of the first embodiment of the authentication device of the present invention; the aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method, which comprises: reading a chip code of a chip in an embedded device for bearing programs when the loaded programs are operated by the embedded device; judging whether the read chip code is matched with a special code preset in the programs; and if the read chip code is matched with the special code preset in the programs, permitting the embedded device to operate the programs; and if the read chip code is not matched with the special code preset in the programs, stopping the embedded device from operating the programs. The embodiment of the invention also discloses an authentication device. By adopting the method and the device, the counterfeiting of the embedded device can be prevented effectively, the interests of consumers can be protected, and the benefits of manufacturers of genuine products can also be protected.

Description

technical field [0001] The invention relates to the field of embedded technology, in particular to an authentication method and device. Background technique [0002] With the development of information technology, embedded technology has also developed rapidly. Embedded devices have become an indispensable part of people's information life due to their low configuration requirements, high system professionalism, and strong real-time performance. Common embedded devices include: mobile phones, MP3 (Moving Picture Experts Group Audio Layer III) players, MP4 players, game consoles, learning machines, electronic dictionaries, digital cameras and other electronic products The commonality of these embedded devices is that they need to rely on the corresponding programs when using them, that is, they need to load the necessary programs for running in the embedded devices, and run the loaded programs in the embedded devices to use the embedded devices. corresponding function. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/44
Inventor 张学平
Owner KONKA GROUP