Graphic engine authentication detection method and system applied to embedded terminal

An embedded terminal and graphics engine technology, applied in the direction of digital data authentication, etc., can solve problems such as insufficient security and inability to effectively realize single authentication, and achieve the effect of avoiding losses and convenient authorization

Pending Publication Date: 2022-08-05
WUHAN BLUESTAR TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the technical problems existing in the prior art, the present invention provides a graphic engine authentication detection method and system applied to embedded terminals, which solves the problem of only generating terminals through software in the field of existing embedded terminals (especially liquid crystal instruments) The problems caused by ID user authorization cannot effectively realize single authentication and authentication anomaly detection, and the security is not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Graphic engine authentication detection method and system applied to embedded terminal
  • Graphic engine authentication detection method and system applied to embedded terminal
  • Graphic engine authentication detection method and system applied to embedded terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The principles and features of the present invention will be described below with reference to the accompanying drawings. The examples are only used to explain the present invention, but not to limit the scope of the present invention.

[0029] figure 1 This embodiment provides a flowchart of a graphics engine authentication detection method applied to an embedded terminal. like figure 1 As shown, a graphics engine authentication detection method applied to an embedded terminal provided by this embodiment includes:

[0030] Authentication step: read and decrypt the key authentication information encrypted and solidified in the encryption chip, parse the key authentication information to obtain the terminal ID and authentication data, grant the corresponding graphics engine system usage authority to the current terminal according to the authentication data, and The terminal that is successfully authorized is marked;

[0031] Abnormal handling steps: when an abnormalit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a graphic engine authentication detection method and system applied to an embedded terminal. The method comprises the following steps: encrypting and solidifying authentication key information in an encryption chip; reading and decrypting the encrypted and solidified authentication key information in the encryption chip, analyzing the authentication key information to obtain a terminal ID and authentication data, granting a corresponding graphic engine system permission to the current terminal according to the authentication data, and marking the successfully authorized terminal; when the authentication is abnormal again, whether the terminal enters a super mode or not is judged according to a pre-marking result of the current terminal, and the super mode is that the graphic engine works normally and the authentication is reminded to be abnormal. According to the method, the detection of the authentication abnormity of the graphic engine software is effectively realized, the safety is good, and the loss caused by the fact that the software cannot be used when the environment such as hardware abnormally suddenly occurs is avoided.

Description

technical field [0001] The invention relates to the technical field of embedded terminals, in particular to a graphics engine authentication detection method and system applied to embedded terminals. Background technique [0002] In order to ensure the security of the graphics engine, when the graphics engine is rendered, the graphics engine authentication will be performed. Through the authentication, the user can only obtain the graphics engine within the scope of his own authority to use the rendering, and the graphics engine is a software product and cannot be effectively implemented. Single-unit authentication, especially in the field of liquid crystal instruments, because the liquid crystal instrument itself has high security requirements and extremely high immediacy, it is necessary to propose a graphics engine authentication anomaly detection method and system applied to embedded terminal products to ensure safe Efficiently implement individual authentication and aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/45
CPCG06F21/44G06F21/45G06F2221/2129
Inventor 叶磊陶俊杰
Owner WUHAN BLUESTAR TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products