Supercharge Your Innovation With Domain-Expert AI Agents!

Equipment security verification method, computer equipment and storage medium

A technology of computer equipment and security verification, applied in the field of equipment security verification, to achieve the effect of increasing external security control, improving security, and increasing self-protection mechanisms

Pending Publication Date: 2022-03-29
SHENZHEN FUGUI PRECISION IND CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the main purpose of the present invention is to provide a method for device security verification, computer equipment and storage media, aiming at solving the technical problem of improving the security of IoT terminal devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment security verification method, computer equipment and storage medium
  • Equipment security verification method, computer equipment and storage medium
  • Equipment security verification method, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following description will refer to the accompanying drawings in order to describe the present disclosure more fully. Exemplary embodiments of the invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the exemplary embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like reference numerals designate the same or similar components.

[0041] The terminology used herein is for the purpose of describing particular exemplary embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a" and "an" are intended to include the plural forms as well, unless the context clearly dictates otherwise. Furthermore, when used herein, "comprises" and / or "comprises" or "includes" and / or "comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an equipment security verification method, computer equipment and a storage medium. The device comprises a main controller, an auxiliary controller and a safety integrated circuit, wherein the auxiliary controller and the safety integrated circuit are connected with the main controller. The method comprises the steps that the auxiliary controller obtains a verification result of the main controller from the safety integrated circuit; the auxiliary controller judges whether to terminate the operation of the main controller or not according to the verification result; and when the auxiliary controller determines to terminate the operation of the main controller according to the verification result, the auxiliary controller terminates the operation of the main controller. The safety verification of the main controller is realized through the safety integrated circuit, the operation of the main controller is terminated through the auxiliary controller when the verification of the main controller fails, and the safety of the terminal equipment is ensured.

Description

technical field [0001] The invention relates to the field of security protection, in particular to a method for equipment security verification, computer equipment and a storage medium. Background technique [0002] At present, due to cost considerations, the Internet of Things (IOT) terminal devices on the market usually use controllers with relatively simple functions. Simple controllers cannot provide a complete self-protection mechanism, and the controllers usually contain on-chip memory (on- Chip memory) and flash memory (flash) and other storage spaces, without other protection measures, criminals can easily obtain the IoT terminal device’s identity by means of wrong DEBUG, reverse engineering, dump flash, and brush firmware. Control rights, and even use some illegal programs to disrupt or paralyze the network connected to IoT terminal devices, causing security incidents. [0003] Therefore, how to improve the security of IoT terminal devices has become an urgent prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G16Y40/50
CPCG06F21/44G16Y40/50
Inventor 金传璋
Owner SHENZHEN FUGUI PRECISION IND CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More