Verification method, elevator control equipment and elevator peripheral equipment

A verification method and elevator control technology, applied in the electronic field, can solve problems such as unusable, easy to be cracked and acquired, easy to crack encryption protocols, etc., to achieve the effect of improving effectiveness and increasing the difficulty of cracking

Active Publication Date: 2019-02-15
上海清皎软件有限公司
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

ID binding is based on ID storage. Pirated software and hardware cannot be used because the ID cannot be matched.
[0005] However, in the above software protocol encryption method, because the data can be captured on the bus, it is easy to crack the encryption protocol through the algorithm analyzer, and the running program in the core main controller is also easy to crack and obtain the running program. source code for

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, elevator control equipment and elevator peripheral equipment
  • Verification method, elevator control equipment and elevator peripheral equipment
  • Verification method, elevator control equipment and elevator peripheral equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0032] Such as figure 1 Shown is a flow chart of the first embodiment of the verification method of the present invention. This method is used to verify the legitimacy of the peripheral equipment connected to the elevator control equipment. The above peripheral equipment may specifically be a car top board circuit board, a car display circuit board, an outside hall display circuit board, and a car command circuit board. The elevator control equipment includes a main control board, and the main control board has a first microprocessor and a first encryption chip; the elevator peripheral equipment i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a verification method, elevator control equipment and elevator peripheral equipment, and is applied to the elevator control equipment. The elevator control equipment comprises amain control board, and a first microprocessor and a first encryption chip are arranged on the main control board. The verification method comprises the following steps that when the peripheral equipment is connected to the elevator control equipment, the first microprocessor generates a first random number and sends the first random number to the first encryption chip and the peripheral equipment, and the first encryption chip is used for storing a first secret key and a first encryption algorithm; the first encryption chip performs an encryption operation on the first random number by usingthe first encryption algorithm and the first secret key to obtain first ciphertext data, and sends the first ciphertext data to the first microprocessor; and the first microprocessor compares the first ciphertext data received from the first encryption chip with second ciphertext data received from the peripheral equipment, and confirms that the peripheral equipment is legal when the first ciphertext data and the second ciphertext data are identical.

Description

technical field [0001] The present invention relates to the field of electronic technology, and more specifically, relates to a verification method, elevator control equipment and elevator peripheral equipment. Background technique [0002] During the long-term use of the elevator, it is necessary to regularly carry out damage and replacement of accessories, commissioning and maintenance, etc., to ensure the long-term safe use of the elevator. In general, the elevator factory that sells the elevator is responsible for maintenance or its designated maintenance company is responsible for the maintenance and maintenance of its elevator system. [0003] However, more and more informal manufacturers use illegal means to compete for the maintenance benefits of elevators, such as: privately replacing the damaged parts of the original elevator, and illegally maintaining the original elevator at a low price. However, due to the unknown source of accessories, it is difficult to guara...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): B66B5/00
CPCB66B5/0031
Inventor 关文江黄鹿李利涛
Owner 上海清皎软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products