CN110489959B - Protection method, burning method and device for burning file, storage medium and equipment - Google Patents

Protection method, burning method and device for burning file, storage medium and equipment Download PDF

Info

Publication number
CN110489959B
CN110489959B CN201910840655.2A CN201910840655A CN110489959B CN 110489959 B CN110489959 B CN 110489959B CN 201910840655 A CN201910840655 A CN 201910840655A CN 110489959 B CN110489959 B CN 110489959B
Authority
CN
China
Prior art keywords
burning
verification information
file
burning file
written
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910840655.2A
Other languages
Chinese (zh)
Other versions
CN110489959A (en
Inventor
董玉红
唐政清
关富文
彭嘉欣
杨东涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910840655.2A priority Critical patent/CN110489959B/en
Publication of CN110489959A publication Critical patent/CN110489959A/en
Application granted granted Critical
Publication of CN110489959B publication Critical patent/CN110489959B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a method for protecting a burning file, a burning method, a burning device, a storage medium and equipment, and belongs to the technical field of file burning. The application includes: when a burning command is detected, acquiring the identification information of the current equipment and acquiring the verification information stored in a burning file; verifying whether the current equipment is the target equipment or not according to the acquired identification information and the acquired verification information; and determining whether the burning file is allowed to be burnt to the current equipment or not according to the verification result. By the method and the device, the problem that the burning file is used without authorization is solved, and the purpose of protecting the burning file is achieved.

Description

Protection method, burning method and device for burning file, storage medium and equipment
Technical Field
The application belongs to the technical field of file burning, and particularly relates to a method for protecting a burned file, a burning method, a burning device, a storage medium and equipment.
Background
In the field of industrial control, program burning files are usually burned through burning software provided by chip manufacturers or an application program burning tool developed autonomously. The basic requirement for this is to have an independent recordable recording file that can be matched to the recording tool and run on the same processor.
In general, before the device leaves the factory, the program is burned. However, when the program needs to be upgraded in the actual use process, since it cannot be guaranteed that each device is scheduled to be processed by personnel in the factory on site, the burning file may be sent to the personnel on site, for example, to after-sales maintenance personnel, and the field personnel may perform the program upgrade. However, the problem is that the burning file may flow out due to the inability to control the behavior of the personnel on site, and then be used in an unauthorized manner, for example, be burned into similar devices in an unauthorized manner.
Disclosure of Invention
In order to overcome the problems in the related art at least to a certain extent, the application provides a method, a device, a storage medium and equipment for protecting a burning file, which are beneficial to solving the problem that the burning file is used without authorization.
In order to achieve the purpose, the following technical scheme is adopted in the application:
in a first aspect,
the application provides a method for protecting a burning file, which comprises the following steps:
when a burning command is detected, acquiring the identification information of the current equipment and acquiring the verification information stored in a burning file;
verifying whether the current equipment is target equipment or not according to the acquired identification information and the acquired verification information;
and determining whether the burning file is allowed to be burned to the current equipment or not according to the verification result.
Further, the verifying whether the current device is the target device according to the identification information and the verification information includes:
if the identification information is matched with the verification information, verifying that the current equipment is the target equipment; or,
and if the identification information does not match the verification information, verifying that the current equipment is not the target equipment.
Further, the method further comprises:
and if the verification information is not acquired, prohibiting the burning of the burning file to the current equipment.
Further, the method further comprises:
receiving a write request, wherein the write request carries the verification information waiting for writing;
and confirming whether the verification information is allowed to be written into the burning file or not.
Further, the determining whether to allow the verification information waiting to be written into the burning file includes:
and determining whether the designated area configured in the burning file for storing the verification information is empty, and if so, allowing the verification information to be written into the burning file.
Further, the determining whether to allow the verification information waiting for writing to be written into the burning file further includes:
and determining whether the software for executing writing is authorized software, and if so, allowing the verification information to be written into the burning file.
In a second aspect of the present invention,
the application provides a protection device for burning files, which comprises:
the acquisition module is used for acquiring the identification information of the current equipment and acquiring the verification information stored in the burning file;
the first determining module is used for verifying whether the current equipment is the target equipment or not according to the acquired identification information and the acquired verification information;
and the second determining module is used for determining whether the burning file is allowed to be burnt to the current equipment according to the verification result.
In a third aspect,
the application provides a readable storage medium, on which a burning file is stored, and when being executed by a processor, the program in the burning file can realize the steps of any one of the protection methods.
In a fourth aspect of the present invention,
the application provides a burning method of a burning file, which comprises the following steps:
acquiring verification information of current equipment;
sending a write request carrying the verification information to be written into a burning file, and writing the verification information into the burning file when the burning file is allowed to be written;
waiting for the burning file to execute the following steps: acquiring identification information of the current equipment and acquiring the verification information stored in the burning file; verifying whether the current equipment is target equipment or not according to the acquired identification information and the acquired verification information; determining whether the burning file is allowed to be burned to the current equipment or not according to a verification result;
and when the burning file allows the burning file to be burnt into the current equipment, burning operation is executed.
Further, the acquiring the verification information of the current device includes:
acquiring unique identification information which is pre-configured for the current equipment by a manufacturer to serve as the verification information; or,
and acquiring the unique identification information of a certain component on the equipment to be used as the verification information.
Further, before the step of performing the burning operation is performed, the method further includes:
and encrypting the burning file written with the verification information.
In a fifth aspect of the present invention,
the application provides a burn record device of burn record file includes:
the acquisition module is used for acquiring the verification information of the current equipment;
the writing module is used for sending a writing request carrying the verification information to be written into a burning file and writing the verification information into the burning file when the burning file is allowed to be written;
a waiting determination module, configured to wait for the burning file to execute the following steps: acquiring identification information of the current equipment and acquiring the verification information stored in the burning file; verifying whether the current equipment is target equipment or not according to the acquired identification information and the acquired verification information; determining whether the burning file is allowed to be burned to the current equipment or not according to a verification result;
and the burning module is used for executing burning operation when the burning file allows the burning file to be burnt into the current equipment.
In a sixth aspect of the present invention,
the application provides a readable storage medium, on which a burning program is stored, and the burning program realizes the steps of any one of the burning methods when being executed by a processor.
In a seventh aspect,
the application provides a burn record equipment includes:
a memory having an executable program stored thereon;
and the processor is used for executing the executable program in the memory so as to realize the steps of the burning method.
This application adopts above technical scheme, possesses following beneficial effect at least:
according to the method and the device, when the burning file detects the burning command triggered by the user, the burning file acquires the identification information of the current device and the verification information stored in the burning file, whether the current device is the target device is verified according to the two information, and whether the burning file is allowed to be burned into the current device is determined according to the verified result, so that the burning file stored with the verification information can only be burned into the target device, the problem that the burning file is used without authorization is further solved, and the purpose of protecting the burning file is achieved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart illustrating a method for protecting a burned file according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of a recording apparatus for recording a file according to an embodiment of the present application;
fig. 3 is a schematic flowchart illustrating a method for burning a burned file according to an embodiment of the present application;
FIG. 4 is a schematic structural diagram of a recording apparatus for recording a file according to an embodiment of the present application,
fig. 5 is a schematic structural diagram of a burning apparatus according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail below. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic flow chart of a method for protecting a burning file according to an embodiment of the present application, in which a corresponding program is configured in the burning file to implement the method for protecting the burning file, as shown in fig. 1, the method for protecting the burning file includes the following steps:
step S101, obtaining identification information of the current equipment and obtaining verification information stored in the burning file.
Specifically, a user burns a burning file into a device through a burning tool, the user triggers a burning instruction on an operation interface of the burning tool to enable the burning tool to perform burning operation, the burning file can be used for acquiring identification information of the current device and acquiring verification information stored in the burning file when it is detected that the burning operation is performed by the burning tool, and in a specific application, the verification information is used for verifying whether the current device is a target device, namely when the verification information exists in the burning file, the burning file with the verification information can only be burned in a certain specific device, namely the target device.
And S102, verifying whether the current equipment is the target equipment or not according to the acquired identification information and the acquired verification information.
Specifically, the acquired identification information and the acquired verification information stored in the burning file can be matched and compared, and whether the current device is the target device or not can be verified.
In one embodiment, the verifying whether the current device is the target device according to the identification information and the verification information includes:
if the identification information is matched with the verification information, verifying that the current equipment is the target equipment; or,
and if the identification information does not match the verification information, verifying that the current equipment is not the target equipment.
Specifically, the identification information of the current device is matched and compared with the verification information, and if the identification information of the current device is matched with the verification information, the current device is the only target device corresponding to the burning file, and further the normal operation of the authorized user can be indicated. If the current device is not the only target device corresponding to the burning file, it may be determined that the current device is not the only target device corresponding to the burning file, and in a specific application, after the burning file is burned to the target device, the target device stored with the verification information flows out and is used by unauthorized users, for example, the unauthorized users want to burn the target device into similar devices, and when the burning file is used for unauthorized burning, the burning file verifies the current device, and the verification result that the current device is not the target device may occur.
And step S103, determining whether the burning file is allowed to be burned to the current equipment or not according to a verification result.
Specifically, according to the identification information and the verification information, if the current device is verified to be the target device, the burning tool is allowed to burn the burning file into the current device, which can indicate the normal operation behavior of the authorized user, and accordingly, in a specific application, the burning file with the verification information written therein is burned into the current device, so that the one-time utilization of the burning file is completed, and when the current device is used in the later period and the burning file is extracted by other unauthorized users, the burning file can be guaranteed to be used only once due to the fact that the verification information is written therein, and cannot be applied to the non-target device, so that the unauthorized utilization by the unauthorized users is avoided.
And if the current equipment is verified to be not the target equipment, the burning tool is forbidden to burn the burning file into the current equipment, so that the burning tool cannot complete burning.
Further, through the related embodiments, the burning file stored with the verification information can only be burned in the target device, so that the problem that the burning file is used without authorization is solved, and the purpose of protecting the burning file is achieved.
In a specific application, in order to solve the problem that the burning file which does not store the verification information is illegally burned and achieve the purpose of protecting the burning file, the following embodiment scheme for solving the problem is provided.
In one embodiment, the method further comprises:
and if the verification information is not acquired, prohibiting the burning of the burning file to the current equipment.
Specifically, under the condition that the burning file does not store the verification information, when the burning file which does not store the verification information flows out, when the unauthorized user takes the recording tool and wants to record the recording tool into the similar device, the unauthorized user can record the recording tool, the unauthorized user triggers the burning command on the operation interface of the burning tool to make the burning tool execute the burning operation, and when the burning tool is detected to execute the burning operation, executing the operation of obtaining the verification information stored in the burning file, wherein the burning file can not obtain the verification information, in one embodiment, the recording file that does not store the verification information flows out and is recorded without authorization, and the recording file is triggered by the fact that the verification information is not obtained, so that the recording tool is prohibited from recording the recording file to the current device, and the recording tool cannot complete recording.
In specific application, whether burning is allowed or not can be determined by combining verification obtained by verifying the verification information, and burning is prohibited determined by not obtaining the verification information, so that whether the burning file has the verification information or not can be effectively prevented from being used by unauthorized burning, and the purpose of protecting the burning file is achieved.
In one embodiment, the method further comprises:
receiving a write request, wherein the write request carries the verification information waiting for writing;
and confirming whether the verification information is allowed to be written into the burning file or not.
Specifically, the purpose of improving the protection effect of the burning file can be achieved by further determining whether to allow the verification information to be written, and the following description correspondingly explains the determination of whether to allow the verification information to be written.
Further, the determining whether to allow the verification information waiting to be written into the burning file includes:
and determining whether the designated area configured in the burning file for storing the verification information is empty, and if so, allowing the verification information to be written into the burning file.
Specifically, an authorized user can write verification information into a designated area in the burning file through a specific burning tool, if the verification information is not written in the burning file, the burning file is the burning file of the target device to be determined, so that the verification information is allowed to be written, and when the verification information is written in the burning file, the burning file with the verification information written therein is determined to be the target device, and in this case, the verification information is not allowed to be written again. By the scheme of the embodiment, the verification information written into the burning file can not be changed, and the burning file stored with the verification information can be used only once, so that the purpose of improving the protection effect of the burning file is achieved.
Further, the determining whether to allow the verification information waiting for writing to be written into the burning file further includes:
and determining whether the software for executing writing is authorized software, and if so, allowing the verification information to be written into the burning file.
Specifically, the authorized user can write verification information into the designated area in the burning file through the authorized burning tool, and it can be understood that the burning tool of the authorized user can be authenticated by the burning file, and when the unauthorized user uses the unauthorized burning tool to write the verification information into the designated area in the burning file, the verification information cannot be written because the unauthorized user cannot obtain the authorized authentication, so as to improve the protection effect of the burning file.
In summary, the above-mentioned related embodiments, which are one or a combination of multiple embodiments, are helpful to solve the problem that the recording file is unauthorized to be used, so as to achieve the purpose of protecting the recording file.
Fig. 2 is a schematic structural diagram of a recording apparatus for recording a file according to an embodiment of the present application, and as shown in fig. 2, the recording apparatus 2 includes:
an obtaining module 201, configured to obtain identification information of a current device and obtain verification information stored in a burning file;
a first determining module 202, configured to verify whether the current device is a target device according to the acquired identification information and the acquired verification information;
and the second determining module 203 is configured to determine whether to allow the burning file to be burned to the current device according to the verification result.
Further, the first determining module 202 is specifically configured to:
if the identification information is matched with the verification information, verifying that the current equipment is the target equipment; or,
and if the identification information does not match the verification information, verifying that the current equipment is not the target equipment.
Further, the device 2 for protecting the burn record file further comprises:
and the prohibiting module 204 is configured to prohibit the burning of the burning file to the current device if the verification information is not obtained.
Further, the device 2 for protecting the burn record file further comprises:
a receiving module 205, configured to receive a write request, where the write request carries the verification information to be written;
a third confirming module 206, configured to confirm whether to allow the verification information to be written into the burning file.
Further, the third confirming module 206 is specifically configured to:
and determining whether the designated area configured in the burning file for storing the verification information is empty, and if so, allowing the verification information to be written into the burning file.
Further, the third confirming module 206 is further specifically configured to:
and determining whether the software for executing writing is authorized software, and if so, allowing the verification information to be written into the burning file.
With respect to the protection device 2 for burning files in the above related embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment related to the method, and will not be described in detail here.
In one embodiment, the present application provides a readable storage medium, on which a burning file is stored, wherein a program in the burning file can realize the steps of the protection method described in any one of the above when being executed by a processor.
With respect to the readable storage medium in the above embodiments, the specific manner of executing the program in the burning file stored in the readable storage medium has been described in detail in the embodiments related to the method, and will not be described in detail here.
Fig. 3 is a schematic flow chart of a method for burning a burned file according to an embodiment of the present application, and as shown in fig. 3, the method for burning the burned file includes the following steps:
step S301, obtaining the verification information of the current device.
Specifically, a user desires to burn a burning file into a current device, in practical application, the user uses a burning tool to burn the current device, the burning tool first obtains verification information of the current device, and the verification information is used for providing the burning file to verify whether the current device is a target device or not, namely when the verification information is written in the burning file, the burning file with the verification information written in can only be burned in a certain specific device, namely the target device.
In one embodiment, the obtaining the verification information of the current device includes:
acquiring unique identification information which is pre-configured for the current equipment by a manufacturer to serve as the verification information; or,
and acquiring the unique identification information of a certain component on the equipment to be used as the verification information.
Specifically, the source of the verification information may be obtained through two aspects, on one hand, the source may be unique identification information configured by the manufacturer for the current device, for example, a unique identifier configured when the device leaves the factory; on the other hand, the unique identification information of a certain component on the current device may also be used, for example, the MAC address of the MAC chip in the current device has uniqueness. The verification information sources in the two aspects can ensure that the burning file written with the verification information can only be burned in a certain specific device, namely the target device.
Step S302, sending a write request carrying the verification information to be written into a burning file, and writing the verification information into the burning file when the burning file allows writing.
Specifically, when the burning tool writes the verification information into the burning file, the determination permission of the burning file is required, in a specific application, when the burning file receives a write request, whether a designated area configured in the burning file for storing the verification information is empty or not can be determined, if the designated area is empty, the writing of the verification information is allowed, whether software for executing the writing is authorized or not is determined, and if the designated area is authorized software, the writing of the verification information is allowed, so that the burning file stored with the verification information is only used once, and the protection effect of the burning file is further improved.
Step S303, waiting for the burning file to execute the following steps: acquiring identification information of the current equipment and acquiring the verification information stored in the burning file; verifying whether the current equipment is target equipment or not according to the acquired identification information and the acquired verification information; and determining whether the burning file is allowed to be burned to the current equipment or not according to the verification result.
For the related steps to be executed by the burning file, the application has been described in the related embodiments, and details are not described herein.
And step S304, when the burning file allows the burning recording of the burning file into the current equipment, executing burning operation.
Specifically, a user expects to burn a burning file into the current device, the user can keep the continuous connection between the burning tool and the current device before completing burning of the current device, the verification information in the burning file is from the current device, and when the verification information is used for verifying the current device in reverse, the verification is passed naturally, so that the burning tool performs burning operation on the current device, the burning file with the verification information written in is burned into the current device, accordingly, the one-time utilization of the burning file is completed, and in the later use process of the current device, if the burning file is extracted by other unauthorized users, the burning file can be ensured to be used only once due to the fact that the verification information is written in, and cannot be applied to the unauthorized devices, so that the unauthorized utilization by the unauthorized users is avoided.
In one embodiment, before the step of performing the burning operation is performed, the method further includes:
and encrypting the burning file written with the verification information.
Specifically, when the burning file is fed back to the burning tool to allow the burning file to be burned into the current device, the burning tool can immediately respond to the feedback to encrypt the burning file written with the verification information, and then burn the encrypted burning file written with the verification information into the current device. In the later use process of the current equipment, if the burning file is extracted by other unauthorized users, the burning file needs to be decrypted and decoded because the burning file has an encryption measure, so that the difficulty of unauthorized use of the burning file can be improved, the protection level of the burning file is further promoted, and the protection effect of the burning file is improved.
Fig. 4 is a schematic structural diagram of a recording apparatus for recording a file according to an embodiment of the present application, and as shown in fig. 4, the recording apparatus 4 for recording a file includes:
an obtaining module 401, configured to obtain verification information of a current device when a write instruction triggered by a user is received;
a writing module 402, configured to send a write request carrying the verification information to be written to a burning file, and write the verification information into the burning file when the burning file allows writing;
a waiting determination module 403, configured to wait for the burning file to execute the following steps when a burning instruction triggered by a user is received: when the burning command is detected, acquiring the identification information of the current equipment and acquiring the verification information stored in the burning file; verifying whether the current equipment is target equipment or not according to the acquired identification information and the acquired verification information; determining whether the burning file is allowed to be burned to the current equipment or not according to a verification result;
and a burning module 404, configured to execute a burning operation when the burning file allows to burn the burning file into the current device.
Further, the obtaining module 401 is specifically configured to:
acquiring unique identification information which is pre-configured for the current equipment by a manufacturer to serve as the verification information; or,
and acquiring the unique identification information of a certain component on the equipment to be used as the verification information.
Further, the burning module 404 is further configured to:
and encrypting the burning file written with the verification information.
The specific way in which each module performs operations has been described in detail in the embodiment of the method, and will not be described in detail herein.
In one embodiment, the present application provides a readable storage medium, on which a burning program is stored, and the burning program, when executed by a processor, implements the steps of the burning method described in any one of the above.
With regard to the readable storage medium in the above-mentioned embodiments, the specific manner of executing the operation by the stored program has been described in detail in the embodiments related to the method, and will not be elaborated herein.
Fig. 5 is a schematic structural diagram of a burning apparatus according to an embodiment of the present application, and as shown in fig. 5, the burning apparatus 5 includes:
a memory 501 on which an executable program is stored;
a processor 502, configured to execute the executable program in the memory 501, so as to implement the steps of the burning method in any one of the above embodiments.
With respect to the burning apparatus 5 in the above embodiment, the specific way of executing the program in the memory 501 by the processor 502 has been described in detail in the embodiment related to the method, and will not be described in detail here.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present application, the meaning of "plurality" means at least two unless otherwise specified.
It will be understood that when an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may be present. Further, "connected" as used herein may include wirelessly connected. The term "and/or" is used to include any and all combinations of one or more of the associated listed items.
Any process or method descriptions in flow charts or otherwise described herein may be understood as: represents modules, segments or portions of code which include one or more executable instructions for implementing specific logical functions or steps of a process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (11)

1. A method for protecting a burn record file is characterized by comprising the following steps:
acquiring identification information of current equipment and acquiring verification information stored in a burning file;
verifying whether the current device is a target device according to the acquired identification information and the acquired verification information, including: if the identification information is matched with the verification information, verifying that the current equipment is the target equipment; or if the identification information does not match the verification information, verifying that the current device is not the target device;
determining whether the burning file is allowed to be burned to the current equipment or not according to a verification result;
the method further comprises the following steps:
receiving a write request, wherein the write request carries the verification information waiting for writing;
confirming whether the verification information waiting for writing is allowed to be written into the burning file or not, comprising the following steps: and determining whether the designated area configured in the burning file for storing the verification information is empty, and if so, allowing the verification information to be written into the burning file.
2. The method of claim 1, further comprising:
and if the verification information is not acquired, prohibiting the burning of the burning file to the current equipment.
3. The method of claim 1, wherein the determining whether the verification information waiting to be written is allowed to be written into the burning file further comprises:
and determining whether the software for executing writing is authorized software, and if so, allowing the verification information to be written into the burning file.
4. A protection device for burning files is characterized by comprising:
the acquisition module is used for acquiring the identification information of the current equipment and acquiring the verification information stored in the burning file;
a first determining module, configured to verify whether the current device is a target device according to the acquired identification information and the acquired verification information, where the first determining module includes: if the identification information is matched with the verification information, verifying that the current equipment is the target equipment; or if the identification information does not match the verification information, verifying that the current device is not the target device;
the second determining module is used for determining whether the burning file is allowed to be burnt to the current equipment according to the verification result;
a receiving module, configured to receive a write request, where the write request carries the verification information to be written;
a third confirming module, configured to confirm whether to allow the verification information to be written into the burning file, including: and determining whether the designated area configured in the burning file for storing the verification information is empty, and if so, allowing the verification information to be written into the burning file.
5. A readable storage medium having a burning file stored thereon, wherein the program in the burning file can realize the steps of the method according to any one of claims 1-3 when being executed by a processor.
6. A burning method of a burning file is characterized by comprising the following steps:
acquiring verification information of current equipment;
sending a write request carrying the verification information waiting to be written into a burning file, and confirming whether the burning file allows the verification information waiting to be written into the burning file, wherein the write request comprises: the burning file determines whether a designated area configured in the burning file and storing the verification information is empty, and if the designated area is empty, the verification information is allowed to be written into the burning file; when the burning file is allowed to be written, the verification information is written into the burning file;
waiting for the burning file to execute the following steps: acquiring identification information of the current equipment and acquiring the verification information stored in the burning file; verifying whether the current device is a target device according to the acquired identification information and the acquired verification information, including: if the identification information is matched with the verification information, verifying that the current equipment is the target equipment; or if the identification information does not match the verification information, verifying that the current device is not the target device; determining whether the burning file is allowed to be burned to the current equipment or not according to a verification result;
and when the burning file allows the burning file to be burnt into the current equipment, burning operation is executed.
7. The method of claim 6, wherein obtaining authentication information of the current device comprises:
acquiring unique identification information which is pre-configured for the current equipment by a manufacturer to serve as the verification information; or,
and acquiring the unique identification information of a certain component on the current equipment to be used as the verification information.
8. The method of claim 6, wherein before the step of performing the burn operation is performed, the method further comprises:
and encrypting the burning file written with the verification information.
9. A recording device for recording a file, comprising:
the acquisition module is used for acquiring the verification information of the current equipment;
the writing module is used for sending a writing request carrying the verification information waiting to be written into the burning file and confirming whether the burning file allows the verification information waiting to be written into the burning file, and comprises the following steps: the burning file determines whether a designated area configured in the burning file and storing the verification information is empty, and if the designated area is empty, the verification information is allowed to be written into the burning file; when the burning file is allowed to be written, the verification information is written into the burning file;
a waiting determination module, configured to wait for the burning file to execute the following steps: acquiring identification information of the current equipment and acquiring the verification information stored in the burning file; verifying whether the current device is a target device according to the acquired identification information and the acquired verification information, including: if the identification information is matched with the verification information, verifying that the current equipment is the target equipment; or if the identification information does not match the verification information, verifying that the current device is not the target device; determining whether the burning file is allowed to be burned to the current equipment or not according to a verification result;
and the burning module is used for executing burning operation when the burning file allows the burning file to be burnt into the current equipment.
10. A readable storage medium having a burning program stored thereon, wherein the burning program, when executed by a processor, implements the steps of the method of any one of claims 6-8.
11. A burning apparatus, comprising:
a memory having an executable program stored thereon;
a processor for executing the executable program in the memory to implement the steps of the method of any one of claims 6-8.
CN201910840655.2A 2019-09-06 2019-09-06 Protection method, burning method and device for burning file, storage medium and equipment Active CN110489959B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910840655.2A CN110489959B (en) 2019-09-06 2019-09-06 Protection method, burning method and device for burning file, storage medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910840655.2A CN110489959B (en) 2019-09-06 2019-09-06 Protection method, burning method and device for burning file, storage medium and equipment

Publications (2)

Publication Number Publication Date
CN110489959A CN110489959A (en) 2019-11-22
CN110489959B true CN110489959B (en) 2022-04-26

Family

ID=68556667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910840655.2A Active CN110489959B (en) 2019-09-06 2019-09-06 Protection method, burning method and device for burning file, storage medium and equipment

Country Status (1)

Country Link
CN (1) CN110489959B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111261200B (en) * 2020-01-23 2021-08-20 奇安信科技集团股份有限公司 Burning equipment control method and device based on kernel and electronic equipment
CN112184261A (en) * 2020-09-24 2021-01-05 无锡小天鹅电器有限公司 Household appliance and serial number burning control method, device and medium thereof
CN113442594A (en) * 2021-06-24 2021-09-28 广州众诺电子技术有限公司 Wireless connection equipment, consumable box, method for upgrading consumable chip data and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103294496A (en) * 2012-02-29 2013-09-11 新唐科技股份有限公司 Burning system
CN106789012A (en) * 2016-12-21 2017-05-31 珠海市魅族科技有限公司 A kind of method and device of production line burning firmware
EP3258372A1 (en) * 2015-02-11 2017-12-20 Boe Technology Group Co. Ltd. Burning method and burning system
CN108491212A (en) * 2018-03-19 2018-09-04 广东美的暖通设备有限公司 Burning file method, equipment and computer readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529309A (en) * 2016-09-19 2017-03-22 芯海科技(深圳)股份有限公司 Method for limiting programming number of programmer by encrypting programming file

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103294496A (en) * 2012-02-29 2013-09-11 新唐科技股份有限公司 Burning system
EP3258372A1 (en) * 2015-02-11 2017-12-20 Boe Technology Group Co. Ltd. Burning method and burning system
CN106789012A (en) * 2016-12-21 2017-05-31 珠海市魅族科技有限公司 A kind of method and device of production line burning firmware
CN108491212A (en) * 2018-03-19 2018-09-04 广东美的暖通设备有限公司 Burning file method, equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN110489959A (en) 2019-11-22

Similar Documents

Publication Publication Date Title
CN110489959B (en) Protection method, burning method and device for burning file, storage medium and equipment
KR101720477B1 (en) Remote access control of storage devices
JP4829639B2 (en) Data processing apparatus and data processing method
US20170161489A1 (en) Permission Management Method, Apparatus, and Terminal
JP4999736B2 (en) Data processing device
JP6096186B2 (en) Method and apparatus for using nonvolatile memory device
JP2015026358A (en) Device, host device, host system, and memory system
CN110516428B (en) Data reading and writing method and device of mobile storage equipment and storage medium
TWI652592B (en) Storage device and access control method thereof
JP2009087497A (en) Recording system, information processing device, storage device, recording method, and program
JP2011086026A (en) Information storage device and program, recording medium with the program recorded thereon, and information storage method
JP4717398B2 (en) Method for controlling data processing apparatus
EP2631833A1 (en) Method, device and system for verifying binding data card and mobile host
EP2503482A1 (en) Electronic device with flash memory component
US11238137B2 (en) Enabling program code on target data processing devices
CN110704814B (en) Anti-copy method and device, and storage medium
CN106372466B (en) The licensing burning of WIFI module, processing method and processing device
JP5676145B2 (en) Storage medium, information processing apparatus, and computer program
WO2013185689A1 (en) Authentication method, authentication apparatus and authentication device
CN103119559A (en) Information generation system and method therefor
US20090271875A1 (en) Upgrade Module, Application Program, Server, and Upgrade Module Distribution System
US20090119744A1 (en) Device component roll back protection scheme
JP2010535380A (en) System and method for unauthorized use prevention control
US11175833B2 (en) Method for controlling a data storage device based on a user profile, and associated data storage device
JP5304366B2 (en) Storage medium unit and storage medium automatic erasing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant