Method and system for preventing illegal duplication of cipher machine equipment and cipher machine equipment
An illegal copying and cipher machine technology, applied in the field of methods and systems and cipher machine equipment, can solve the problems of theft or loss of administrator locks, illegal copying of server cipher machine equipment, etc., and achieve the effect of preventing illegal copying
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0098] Assuming that user A needs to purchase a new cipher device 1, the device provider first generates a user ID for user A, and records the user ID, the device ID of cipher device 1 and its corresponding encryption chip ID to the cloud server .
[0099] Next, user A needs to register the device after purchasing the cipher machine device 1, that is, generate a registration request packet through the encryption module, and send the registration request packet to the cloud server; the cloud server verifies the validity of the registration request packet, Generate a registration command packet after passing the verification, and send the registration command packet to the encryption module; the encryption module verifies the registration command packet, and records the user ID as a key factor into the encryption module to complete the device registration .
[0100] Further, if user A needs to purchase another new cipher device 2, the same as the above process, the device provi...
example 2
[0102] Assuming that user A needs to purchase a new cipher device 1, the device provider first generates a user ID for user A, and records the user ID, the device ID of cipher device 1 and its corresponding encryption chip ID to the cloud server .
[0103] Next, user A needs to register the device after purchasing the cipher machine device 1, that is, generate a registration request packet through the encryption module, and send the registration request packet to the cloud server; the cloud server verifies the validity of the registration request packet, Generate a registration command packet after passing the verification, and send the registration command packet to the encryption module; the encryption module verifies the registration command packet, and records the user ID as a key factor into the encryption module to complete the device registration .
[0104] Further, if user B needs to purchase a new cipher machine device 3, the same as the above process, the device pro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


