Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted authentication method for image input equipment, and image input equipment thereof

A technology of image input device and authentication method, applied in the field of trusted authentication method and its image input device, capable of solving problems such as damage to the device, susceptibility to virus, etc.

Active Publication Date: 2016-05-04
TONGFANG COMP
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The image input device is often connected to the computer and transmits files, so it is easy to infect the virus hidden in the computer, so that the computer modifies the firmware of the image input device, damages its own device or attacks the system of other computers connected to it through the image input device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted authentication method for image input equipment, and image input equipment thereof
  • Trusted authentication method for image input equipment, and image input equipment thereof
  • Trusted authentication method for image input equipment, and image input equipment thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the technical solutions and advantages of the embodiments of the present invention more clearly expressed, the technical solutions of the present invention will be further described in detail below through the accompanying drawings and embodiments.

[0043] figure 1 This is a schematic flowchart of a trusted authentication method for an image input device provided by an embodiment of the present invention, such as figure 1 As shown, the method may include the following steps.

[0044] Step 101: The image input device is connected to the host to obtain power. For example, the image input device is connected to the computer host through an interface such as USB, thereby obtaining power from the computer.

[0045] Step 102: The image input device performs a self-check on the device certificate of the image input device. For example, an image input device obtains a device certificate through a read-only memory (ROM, Read-OnlyMemory). The device certificate is a c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted authentication method for image input equipment. The trusted authentication method comprises the following steps that: the image input equipment is connected with a host so as to obtain a power supply; the image input equipment performs self-check of an equipment certificate of the image input equipment; when the self-check is passed, first communication connection between the image input equipment and the host is established; the image input equipment generates a random number and detects the security of the random number; the image input equipment calculates an error detection code of a storage content in a storage area, detects the integrity of the storage content in the storage area according to the error detection code obtained by calculation, and performs hash algorithm of first detection data; the image input equipment detects the security of the hash algorithm according to a hash operation result, and encrypts and decrypts second detection data; the image input equipment detects the security of an encryption and decryption algorithm according to an encryption and decryption operation result; if the encryption algorithm is secure, second communication connection between the image input equipment and the host is established; and the image input equipment receives a read-write command from the host.

Description

Technical field [0001] The present invention relates to the field of communication technology, in particular to a credible authentication method of an image input device and an image input device thereof. Background technique [0002] With the development of technology, more and more devices are becoming portable. The image input device is often connected to the computer and transfers files, and it is easy to infect the hidden virus in the computer, so that the computer can modify the firmware of the image input device, damage its own device or attack the system of other computers connected to it through the image input device. . Summary of the invention [0003] The object of the present invention is to provide a method and an image input device that can realize the credible authentication of an image input device so as to prevent the image input device from attacking the computer system connected to it. [0004] In order to achieve the above objective, in the first aspect, the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/083
Inventor 刘锋李健航郑必可
Owner TONGFANG COMP