Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware authorization method and system

A technology of hardware and hardware attributes, applied in the field of electronic information, can solve the problems of cracking, the chip does not contain, it is difficult to obtain time and batches, etc., to prevent piracy and prevent missed detection.

Pending Publication Date: 2021-10-26
NEWLAND DIGITAL TECH CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For this solution, the chip may need to contain unique MAC information, and due to offline authorization, it is easy to be cracked by other software, such as the serial number of Windows.
In addition, some chips may not contain unique MAC address information, so this scheme is difficult to apply
[0004] Online authorization is more secure and can monitor device authorization information. However, due to limited conditions, most authorizations still use offline authorization. During production, the specified serial number (machine code) is written into the device. When it is necessary to find the production time and date of the corresponding serial number When it comes to models, it is difficult to simply query the production serial number to obtain information such as the time and batch of equipment production, and it is difficult to trace the hardware information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware authorization method and system
  • Hardware authorization method and system
  • Hardware authorization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. It should be noted here that the descriptions of these embodiments are used to help understand the present invention, but are not intended to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below may be combined with each other as long as they do not constitute a conflict with each other.

[0042] A hardware authorization method, including production test steps and hardware use steps:

[0043] The production test steps include:

[0044] S11: Collect hardware attribute information to generate a machine code, the hardware attribute information includes hardware production date, hardware serial number, and hardware model information;

[0045] In the above step S11, collecting hardware attribute information to generate machine codes includes:

[0046] The se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware authorization method, which comprises a production test step and a hardware use step; the production test step comprises the following steps: S11: collecting hardware attribute information to generate a machine code, the hardware attribute information comprising a hardware production date, a hardware serial number and hardware model information; s12, sending the machine code to a server for verification, specifically, enabling the server to compare the machine code with a to-be-authorized machine code list pre-stored on the machine code, and verification is passed if the machine code is in the to-be-authorized list; s13, after the verification of the machine code is passed, enabling the server to encrypt the machine code to form an encrypted character string, and sending the encrypted character string to hardware; s14, enabling the hardware to store the received encrypted character string in an otp storage space of the hardware. According to the hardware authorization method, the production date, the hardware serial number and the hardware model information of the hardware are adopted as machine codes, the machine codes can be linked with the production date and the production quantity, and the production quantity and the progress of the current date can be managed.

Description

technical field [0001] The invention relates to the technical field of electronic information, in particular to a hardware authorization method. Background technique [0002] In order to protect the intellectual property rights of the software on the hardware produced, for example, the software on the development board produced is stolen on the development board produced by other companies, so that customers will no longer need the development board provided by us, by purchasing other manufacturers or us Competitors' products can also use our products, which will seriously damage the interests of the enterprise. In order to solve the problem of intellectual property protection of the producer's product, the current common method for this situation is to authorize the software of the hardware product. The common method is offline authorization, through the unique identification of the production hardware, usually the Mac address after software encryption The machine code is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/73G06F21/60G06F21/44
CPCG06F21/73G06F21/602G06F21/44
Inventor 林鹏程陈中林家贵
Owner NEWLAND DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products