Detection equipment authentication method, detection equipment authentication device and electronic equipment

A technology of detection equipment and authentication method, applied in the field of information security, can solve problems such as data leakage of automobile manufacturers, irregular use of automobile diagnostic equipment, and failure to obtain the authorization of the diagnosed automobile, so as to reduce the risk of leakage and standardize the use of the effect.

Pending Publication Date: 2022-04-29
LAUNCH TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, 4S stores that use automotive diagnostic equipment may not be authorized by the manufacturer of the vehicle being diagnosed
In this way, it will lead to irregular use of automotive diagnostic equipment by 4S stores, and even cause data leakage of auto manufacturers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection equipment authentication method, detection equipment authentication device and electronic equipment
  • Detection equipment authentication method, detection equipment authentication device and electronic equipment
  • Detection equipment authentication method, detection equipment authentication device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057]In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0058] Currently, cars and car diagnostic equipment are often not produced by the same manufacturers. When a car breaks down and needs to be diagnosed, the car owner usually drives the car to a car sales service 4S store. In the prior art, when the staff of the 4S shop uses the vehicle diagnostic equipment, they only need to input the user name and password, and then the server of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection equipment authentication method, a detection equipment authentication device and electronic equipment. The method comprises the following steps: acquiring first login information and second login information input by a user; through interaction with a first server, determining a first authentication result of a detection equipment service provider for the first login information; through interaction with a second server, determining a second authentication result of the detection object service provider for the second login information; and if both the first authentication result and the second authentication result are successful authentication, opening the authority of the target service function of the detection equipment. Through the scheme of the invention, the use of the detection equipment by the user can be standardized, and the risk that the data of the detection object service provider is leaked is effectively reduced.

Description

technical field [0001] The application belongs to the technical field of information security, and in particular relates to a detection equipment authentication method, a detection equipment authentication device, electronic equipment, and a computer-readable storage medium. Background technique [0002] Currently, cars and car diagnostic equipment are often not produced by the same manufacturers. When an automobile sales service 4S shop needs to use automobile diagnostic equipment, it only needs to pass the background certification of the automobile diagnostic equipment manufacturer, and can use the automobile diagnostic equipment without restriction. However, in practical applications, the 4S shop that uses the vehicle diagnostic equipment may not be authorized by the manufacturer of the vehicle being diagnosed. In this way, it will lead to irregular use of automotive diagnostic equipment by 4S stores, and even cause data leakage of auto manufacturers. Contents of the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/44
CPCG06F21/31G06F21/445
Inventor 刘均王力
Owner LAUNCH TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products