CN111222104A - Method, device and system for authorizing embedded device by using hardware dongle - Google Patents

Method, device and system for authorizing embedded device by using hardware dongle Download PDF

Info

Publication number
CN111222104A
CN111222104A CN201911423786.7A CN201911423786A CN111222104A CN 111222104 A CN111222104 A CN 111222104A CN 201911423786 A CN201911423786 A CN 201911423786A CN 111222104 A CN111222104 A CN 111222104A
Authority
CN
China
Prior art keywords
authorization
hardware dongle
serial port
embedded
embedded device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911423786.7A
Other languages
Chinese (zh)
Inventor
方圆
刘洪彬
陈洪新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AI Speech Ltd
Original Assignee
AI Speech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AI Speech Ltd filed Critical AI Speech Ltd
Priority to CN201911423786.7A priority Critical patent/CN111222104A/en
Publication of CN111222104A publication Critical patent/CN111222104A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • G06F13/4282Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2213/00Indexing scheme relating to interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F2213/0002Serial port, e.g. RS232C

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Remote Sensing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for authorizing embedded equipment by using a hardware dongle, which comprises the steps of responding to an authorization starting instruction, detecting the state and the available count of the hardware dongle; according to the state and the available count of the hardware dongle, serial port authorization processing is performed on the embedded device; and updating the available count of the hardware dongle according to the serial port authorization processing result. The invention also discloses a device and a system for authorizing the embedded equipment by using the hardware dongle. According to the method and the device disclosed by the invention, the combination of the serial port universality and the dongle safety can be realized, and the safety of the authorization process is increased.

Description

Method, device and system for authorizing embedded device by using hardware dongle
Technical Field
The invention relates to the technical field of equipment authorization, in particular to a method and a device for authorizing an embedded device by using a hardware dongle.
Background
In order to ensure that the core technology is protected and controlled by respective manufacturers, and the core technology is prevented from being lost outside and being uncontrollable, when application software is used on equipment, manufacturers generally need to perform authorization verification on the equipment. Currently, authorization of embedded devices, such as intelligent wearable devices, is generally completed in a serial port authorization mode, a bluetooth authorization mode or an online authorization mode. The serial port authorization refers to an implementation mode that authorization is completed by using a universal serial port module in the device, the Bluetooth authorization refers to an implementation mode that authorization of a device end is completed by using a Bluetooth module integrated with the device, and the online authorization refers to an implementation mode that the device is connected to a cloud end to complete authorization. However, bluetooth authorization and online authorization are not generally applicable because they have specific requirements on the capabilities of the devices themselves, such as bluetooth authorization requiring the devices to integrate bluetooth modules, and online authorization requiring the devices to have the capability of connecting to the internet. At present, serial port authorization is wide in application range, however, due to the fact that data in the authorization process is easy to hijack, the serial port authorization has the defects of being easy to crack and low in safety.
Disclosure of Invention
In order to solve the problems, the inventor thinks that the embedded device is authorized by combining a dongle on the basis of serial port authorization so as to improve the security of data in the authorization process.
According to a first aspect of the present invention, there is provided a method for authorizing an embedded device using a hardware dongle, comprising:
responding to an authorized starting instruction, and detecting the state and the available count of the hardware dongle;
according to the state and the available count of the hardware dongle, serial port authorization processing is performed on the embedded device;
and updating the available count of the hardware dongle according to the serial port authorization processing result.
According to a second aspect of the present invention, there is provided an apparatus for authorizing an embedded device using a hardware dongle, comprising
The state detection module is used for responding to the authorized starting instruction and detecting the state and the available count of the hardware dongle;
the serial port authorization module is used for carrying out serial port authorization processing on the embedded equipment according to the state and the available count of the hardware dongle;
and the authorization confirmation module is used for updating the available count of the hardware dongle according to the serial port authorization processing result.
According to a third aspect of the present invention, a system for authorizing an embedded device by using a hardware dongle is provided, which includes an embedded device, an authorization apparatus, and a hardware dongle, wherein the embedded device is connected to the authorization apparatus through a serial port, and the hardware dongle is connected to the authorization apparatus through a USB interface; the authorization device is the device for authorizing the embedded device by using the hardware dongle.
According to a fourth aspect of the present invention, there is provided an electronic apparatus comprising: the system comprises at least one processor and a memory communicatively connected to the at least one processor, wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to enable the at least one processor to perform the steps of the method.
According to a fifth aspect of the present invention, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above-described method.
The authorization scheme of the embedded device provided by the embodiment of the invention combines the universality of the serial port and the safety of the hardware dongle, so that the method is more suitable for intelligent wearable devices, and the safety of the authorization process is greatly improved due to the combination of the hardware dongle.
Drawings
FIG. 1 is a flowchart of a method for authorizing an embedded device using a hardware dongle according to an embodiment of the present invention;
FIG. 2 is a flowchart of a serial port authorization processing method according to an embodiment of the present invention;
FIG. 3 is a schematic block diagram of an apparatus for authorizing an embedded device using a hardware dongle according to an embodiment of the present invention;
FIG. 4 is a schematic block diagram of a system for authorizing an embedded device using a hardware dongle in accordance with one embodiment of the present invention;
fig. 5 is a schematic diagram of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
As used in this disclosure, "module," "device," "system," and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, or software in execution. In particular, for example, an element may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. Also, an application or script running on a server, or a server, may be an element. One or more elements may be in a process and/or thread of execution and an element may be localized on one computer and/or distributed between two or more computers and may be operated by various computer-readable media. The elements may also communicate by way of local and/or remote processes based on a signal having one or more data packets, e.g., from a data packet interacting with another element in a local system, distributed system, and/or across a network in the internet with other systems by way of the signal.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The method for authorizing the embedded device by using the hardware dongle provided by the embodiment of the invention can be applied to any embedded device, for example, terminal devices such as a smart phone, a smart watch, a smart sound box and a smart home, and is particularly suitable for smart wearable devices, and the method is not limited to this. The scheme provided by the invention can realize effective combination of hardware softdog and serial port authorization technology, and realize safer serial port authorization of the embedded device through the management and control of the hardware softdog.
The present invention will be described in further detail with reference to the accompanying drawings.
Fig. 1 schematically shows a flow of a method for authorizing an embedded device by using a hardware dongle according to an embodiment of the present invention, and as shown in fig. 1, the method of this embodiment includes the following steps:
step S101: in response to an authorized initiation instruction, a status and an available count of a hardware dongle are detected. When a user performs an authorization operation by clicking an option for starting authorization (which may be a starting icon of authorization tool software or a starting menu option on an application software user interface), the state and the available count of the accessed hardware dongle are detected according to the authorized starting instruction of the user. The detection of the hardware dongle state is to detect whether the read state is normal according to the interaction protocol of the hardware dongle, and the detection of the available count is to read the value which can be counted according to the interaction protocol of the hardware dongle for judgment. The available count is a count of the number of authorization credentials stored in the hardware dongle that identify the number of embedded devices that can be authorized. The hardware dongle is implemented by using an existing product, for example, a policy dongle is selected, and the detection of the state and the available count of the dongle can refer to the interactive protocol description of the product and call a corresponding interface to perform data reading and state judgment, so details are not repeated here.
Step S102: and performing serial port authorization processing on the embedded equipment according to the state and the available count of the hardware dongle. Through the detection of the state of the hardware dongle, when the state of the hardware dongle is judged to be normal and the available count is greater than zero, the serial port authorization processing is allowed to be started. Fig. 2 schematically shows a flow of serial port authorization processing according to an embodiment of the present invention, and as shown in fig. 2, the serial port processing according to the embodiment of the present invention includes the following two-way handshaking:
during the first handshake 20, an authorization instruction is sent to the embedded device via the serial port. After receiving the authorization instruction, the embedded device analyzes the authorization instruction according to an agreed protocol, and if the authorization instruction is judged according to the analysis result, obtains the device identification ID of the embedded device and returns the device identification ID. The agreed protocol is implemented according to requirements, so that the authorization instruction can be encapsulated according to the protocol, and can be analyzed according to the protocol at the device end, for example, the protocol can be implemented as including a header, a version number, a data length, an operation code and a check code, wherein the operation code is used for identifying the operation required by the instruction, for example, in the case of the authorization instruction, the operation code is defined as "01", and the device end obtains the device identification ID of itself and returns the ID when judging that the operation code is "01" according to the analysis result. The device identification ID is an ID number for uniquely identifying a device, and is, for example, a UUID or a chip ID. Preferably, in order to secure data, the device identification ID is also subjected to a masking and encryption process before being returned. The masked mask may be set according to requirements, and the encryption process may be implemented by using an AES encryption algorithm, etc. embodiments of the present invention are not limited to specific implementations, and those skilled in the art will understand that many existing masking methods and encryption algorithms may be implemented.
During the second handshake 21, decryption and mask removal are performed according to the response of the embedded device to the authorization instruction, that is, the returned device identification ID, to obtain the identification ID of the embedded device, and an authorization code is generated according to the identification ID and returned to the embedded device, the embedded device stores the received unique authorization code, for example, the unique authorization code is solidified to a non-volatile memory such as a flash memory for storage, and an operation instruction is returned after the unique authorization code is stored. The authorization code may be generated according to the ID by calculating the device ID using a SHA1 encryption algorithm, an MD5 algorithm, an MD3 algorithm, or the like, so as to obtain a unique authorization code. When the unique authorization code is sent to the embedded device, encryption is preferably performed first, and the encrypted authorization code is sent to the embedded device, for example, by using an AES encryption algorithm. After receiving an operation instruction for the authorization code returned by the embedded device, the operation instruction is analyzed according to an agreed protocol, and a device processing result is determined according to the operation code, for example, if the operation code is "02", it means that the authorization code has been stored in the device. When the unique authorization code is encrypted for transmission, the embedded device decrypts the data after receiving the data to obtain the authorization code.
Step S103: and updating the available count of the hardware dongle according to the serial port authorization processing result.
When the authorization code is judged to be stored in the device according to the operation instruction returned by the device end during the second handshake 21, the serial authorization process is completed, and at this time, the available count of the hardware dongle is decremented by one, for example, the available count of the original hardware dongle is "100", and at this time, the available count is updated to "99". The entire authorization process is completed after the update of the available count of hardware dongles is completed.
Therefore, when authorization is carried out each time, besides the serial port authorization processing, whether the serial port authorization processing can be started or not is judged through the state and the available count of the hardware dongle, the serial port authorization processing can be carried out on the equipment only when the available count of the hardware dongle is larger than zero, and the value of the available count can be correspondingly reduced after the serial port authorization processing is carried out on the equipment each time. Therefore, the authorization process is managed and controlled through the hardware dongle, and if the hardware dongle is not available or the available count of the hardware dongle is used up, the serial port authorization process cannot be started, the equipment cannot be authorized, and the security of serial port authorization is effectively guaranteed. In addition, in the serial port authorization processing process, a handshake mechanism is adopted, and when no handshake feedback or a feedback error instruction is received within a preset time, data retransmission is carried out, so that the stability and reliability of data transmission are ensured through the handshake and retransmission mechanisms.
Preferably, before sending the authorization instruction to the embedded device, that is, when detecting that the state of the hardware dongle and the available count meet the authorization start condition, the embodiment of the present invention further detects the serial port state of the embedded device (including the receiving and sending state, the baud rate, and the like, which can be implemented by referring to the prior art), and sends the authorization instruction to the embedded device only when the serial port state of the embedded device is normal.
Preferably, when the embedded device is powered on, whether the embedded device is authorized or not is detected (by judging whether a valid authorization code is stored or not), and if the embedded device is authorized, serial port authorization processing is not started. This avoids duplicate authorization of the embedded device.
FIG. 3 is a schematic diagram illustrating an apparatus for authorizing an embedded device using a hardware dongle according to an embodiment of the present invention, as shown in FIG. 3, which includes
A state detection module 30, configured to detect a state and an available count of the hardware dongle in response to the authorized start instruction;
the serial port authorization module 31 is used for performing serial port authorization processing on the embedded device according to the state and the available count of the hardware dongle;
and the authorization confirming module 32 is used for updating the available count of the hardware dongle according to the serial port authorization processing result.
As shown in fig. 3, the serial port authorization module 31 includes
The authorization starting unit 31A is configured to send an authorization instruction to the embedded device when the hardware dongle is in a normal state and the available count is greater than zero;
the authorization code issuing unit 31B is configured to obtain an identifier ID of the embedded device, generate an authorization code according to the identifier ID, and send the authorization code to the embedded device;
and the authorization feedback unit 31C is configured to receive an operation instruction of the embedded device for the authorization code, and obtain a serial port authorization processing result according to the operation instruction.
The authorization starting unit is also used for detecting the authorization state of the embedded equipment when the hardware dongle state is normal and the available count is greater than zero, and sending an authorization instruction to the embedded equipment when the authorization state of the embedded equipment is unauthorized.
The specific implementation of each module and unit in the embodiment of the apparatus of the present invention may be described with reference to the method part, and the preferred solution mentioned in the method part is also applicable to the apparatus, which is not described herein again.
Fig. 4 schematically shows a system for authorizing an embedded device by using a hardware dongle according to an embodiment of the present invention, which includes an embedded device 1, an authorization apparatus 3, and a hardware dongle 2, as shown in fig. 4, wherein the embedded device 1 is connected to the authorization apparatus 3 through a serial port, and the hardware dongle 2 is connected to the authorization apparatus 3 through a USB interface; the authorization apparatus is the apparatus shown in fig. 3 that authorizes the embedded device using the hardware dongle.
When the embedded device 1 is authorized, the embedded device 1 is connected to the authorization apparatus 3 through a serial port, and the hardware dongle 2 is connected to the authorization apparatus 3 through a USB port. And then, starting the authorization device 3, at this time, the state detection module 30 of the authorization device 3 will first detect the state and available count of the hardware dongle 2, and when the state is normal and the available count is greater than zero, calling the serial port authorization module 31 to perform serial port authorization on the embedded device 1, wherein the processing process of the serial port authorization is the secondary handshake interaction process shown in fig. 2. When the serial port authorization is successful, the authorization confirmation module 32 updates the available count of the hardware dongle 2. Therein, the exemplary authorization apparatus 3 is a computer loaded with the module shown in fig. 3, which is capable of implementing the method processes shown in fig. 1 and 2. Correspondingly, in order to implement the interaction process of the system according to the embodiment of the present invention, the embedded device 1 includes a device code query module for obtaining the device identifier ID and returning the obtained device identifier ID to the authorization apparatus 3 in response to the received authorization instruction, and an authorization module (not shown) for receiving the authorization code, performing solidified storage, and returning an operation instruction.
Through the device and the system of the embodiment of the invention, the hardware dongle can be used for serial port authorization of the embedded equipment, the universality of the serial port is utilized, and the security of the authorization process is ensured, so that the core technology of a software algorithm supplier can be effectively protected.
In some embodiments, the present invention further provides a computer-readable storage medium, in which one or more programs including executable instructions are stored, where the executable instructions can be read and executed by an electronic device (including but not limited to a computer, a server, or a network device, etc.) to perform the above-described method for authorizing an embedded device using a hardware dongle according to the present invention.
In some embodiments, the present invention further provides a computer program product, which includes a computer program stored on a non-volatile computer-readable storage medium, the computer program including program instructions that, when executed by a computer, cause the computer to perform the above-mentioned method for authorizing an embedded device using a hardware dongle.
In some embodiments, an embodiment of the present invention further provides an electronic device, which includes: at least one processor, and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to perform the method for authorizing the embedded device using the hardware dongle.
In some embodiments, the present invention further provides a storage medium having a computer program stored thereon, where the computer program is capable of executing the method for authorizing an embedded device by using a hardware dongle.
The apparatus for authorizing an embedded device by using a hardware dongle according to the embodiment of the present invention can be used to execute the method for authorizing an embedded device by using a hardware dongle according to the embodiment of the present invention, and accordingly achieve the technical effect achieved by the method for authorizing an embedded device by using a hardware dongle according to the embodiment of the present invention, which is not described herein again. In the embodiment of the present invention, the relevant functional module may be implemented by a hardware processor (hardware processor).
Fig. 5 is a schematic hardware structure diagram of an electronic device for performing a method for authorizing an embedded device by using a hardware dongle according to another embodiment of the present application, and as shown in fig. 5, the electronic device includes:
one or more processors 510 and memory 520, with one processor 510 being an example in fig. 5.
The apparatus for performing the method of authorizing an embedded device using a hardware dongle may further include: an input device 530 and an output device 540.
The processor 510, the memory 520, the input device 530, and the output device 540 may be connected by a bus or other means, and the bus connection is exemplified in fig. 5.
The memory 520, as a non-volatile computer-readable storage medium, may be used to store a non-volatile software program, a non-volatile computer-executable program, and a module, and may also be used to store an authorization code, such as a program instruction/module/authorization code corresponding to a method for authorizing an embedded device by using a hardware dongle in an embodiment of the present application. The processor 510 executes various functional applications and data processing of the server by executing the nonvolatile software program, instructions and modules stored in the memory 520, that is, implements the method for authorizing the embedded device by using the hardware dongle in the above method embodiment.
The memory 520 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created from use of an apparatus that authorizes the embedded device with the hardware dongle, and the like. Further, the memory 520 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 520 optionally includes memory located remotely from the processor 510, and these remote memories may be connected over a network to a means for authorizing the embedded device with a hardware dongle. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input means 530 may receive input numeric or character information and generate signals related to user settings and function controls of the means for authorizing the embedded device with the hardware dongle. The output device 540 may include a display device such as a display screen.
The one or more modules are stored in the memory 520 and when executed by the one or more processors 510, perform a method for authorizing an embedded device using a hardware dongle as in any of the above method embodiments.
The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the methods provided in the embodiments of the present application.
The electronic device of the embodiments of the present application exists in various forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing highly reliable services.
(5) And other electronic devices with data interaction functions.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the above technical solutions substantially or contributing to the related art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. The method for authorizing the embedded device by using the hardware dongle is characterized by comprising the following steps:
responding to an authorized starting instruction, and detecting the state and the available count of the hardware dongle;
according to the state and the available count of the hardware dongle, serial port authorization processing is performed on the embedded device;
and updating the available count of the hardware dongle according to the serial port authorization processing result.
2. The method of claim 1, wherein said performing serial port authorization processing based on the status and availability count of the hardware dongle comprises performing serial port authorization processing based on the status and availability count of the hardware dongle
When the hardware dongle is in a normal state and the available count is greater than zero, sending an authorization instruction to the embedded device;
according to the response of the embedded equipment to the authorization instruction, acquiring the ID of the embedded equipment, and generating an authorization code according to the ID and returning the authorization code to the embedded equipment;
and receiving an operation instruction of the embedded equipment to the authorization code, and determining a serial port authorization processing result according to the operation instruction.
3. The method of claim 2, wherein updating the hardware dongle availability count based on the serial port authorization process comprises
And when an operation instruction of successfully storing the authorization code sent by the embedded device is received, subtracting one from the available count of the hardware dongle.
4. The method according to claim 2 or 3, characterized in that before sending the authorization instruction to the embedded device, the authorization status of the embedded device is also detected, and when the authorization status of the embedded device is unauthorized, the authorization instruction is sent to the embedded device.
5. The device for authorizing the embedded equipment by using the hardware dongle is characterized by comprising
The state detection module is used for responding to the authorized starting instruction and detecting the state and the available count of the hardware dongle;
the serial port authorization module is used for carrying out serial port authorization processing on the embedded equipment according to the state and the available count of the hardware dongle;
and the authorization confirmation module is used for updating the available count of the hardware dongle according to the serial port authorization processing result.
6. The apparatus of claim 5, wherein the serial port authorization module comprises
The authorization starting unit is used for sending an authorization instruction to the embedded equipment when the hardware dongle is in a normal state and the available count is greater than zero;
the authorization code issuing unit is used for acquiring the identification ID of the embedded equipment, generating an authorization code according to the identification ID and returning the authorization code to the embedded equipment;
and the authorization feedback unit is used for receiving an operation instruction of the embedded device on the authorization code and determining a serial port authorization processing result according to the operation instruction.
7. The apparatus of claim 6, wherein the authorization initiation unit is further configured to detect an authorization status of the embedded device when the hardware dongle status is normal and the available count is greater than zero, and send an authorization instruction to the embedded device when the authorization status of the embedded device is unauthorized.
8. The system for authorizing the embedded equipment by using the hardware dongle is characterized by comprising the embedded equipment, an authorization device and the hardware dongle, wherein the embedded equipment is connected to the authorization device through a serial port, and the hardware dongle is connected to the authorization device through a USB interface;
the device for authorizing the embedded device by using the hardware dongle as claimed in any one of claims 5 to 7.
9. An electronic device, comprising: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the method of any one of claims 1-4.
10. Storage medium on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 4.
CN201911423786.7A 2019-12-31 2019-12-31 Method, device and system for authorizing embedded device by using hardware dongle Pending CN111222104A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911423786.7A CN111222104A (en) 2019-12-31 2019-12-31 Method, device and system for authorizing embedded device by using hardware dongle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911423786.7A CN111222104A (en) 2019-12-31 2019-12-31 Method, device and system for authorizing embedded device by using hardware dongle

Publications (1)

Publication Number Publication Date
CN111222104A true CN111222104A (en) 2020-06-02

Family

ID=70831032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911423786.7A Pending CN111222104A (en) 2019-12-31 2019-12-31 Method, device and system for authorizing embedded device by using hardware dongle

Country Status (1)

Country Link
CN (1) CN111222104A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536241A (en) * 2021-06-01 2021-10-22 上海赫千电子科技有限公司 Countable software authorization method for vehicle-mounted system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848064A (en) * 2018-05-24 2018-11-20 武汉久乐科技有限公司 authorization management method and system
CN109033804A (en) * 2018-09-06 2018-12-18 郑州云海信息技术有限公司 A kind of software virtual machine authorization method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848064A (en) * 2018-05-24 2018-11-20 武汉久乐科技有限公司 authorization management method and system
CN109033804A (en) * 2018-09-06 2018-12-18 郑州云海信息技术有限公司 A kind of software virtual machine authorization method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536241A (en) * 2021-06-01 2021-10-22 上海赫千电子科技有限公司 Countable software authorization method for vehicle-mounted system
CN113536241B (en) * 2021-06-01 2024-05-28 上海赫千电子科技有限公司 Countable software authorization method for vehicle-mounted system

Similar Documents

Publication Publication Date Title
CN110351269B (en) Method for logging in open platform through third-party server
CN112738805B (en) Device control method and apparatus, storage medium, and electronic device
US20210192579A1 (en) Smart broadcasting device
US8438621B2 (en) Method and apparatus for secure management of debugging processes within communication devices
CN108540433B (en) User identity verification method and device
CN107820702B (en) Management and control method, device and electronic equipment
CN111991813B (en) Method and device for logging in game, electronic equipment and storage medium
WO2017185610A1 (en) Intelligent terminal, remote controller and payment method for intelligent terminal
CN112199652B (en) Login method, terminal, server, system, medium and equipment of application program
CN103744686A (en) Control method and system for installing application in intelligent terminal
CN111881441B (en) Method for online activation of device, electronic device and storage medium
KR20160110274A (en) Server Apparatus for Dynamic Secure Module and Driving Method Thereof
CN111125677A (en) Equipment authorization method and system
CN113468515A (en) User identity authentication method and device, electronic equipment and storage medium
CN113039542A (en) Secure counting in cloud computing networks
CN108460251B (en) Method, device and system for running application program
CN110971617A (en) Voice equipment authorization method, authentication method and system
CN108650265B (en) File downloading method and device, storage medium and electronic terminal
CN111222104A (en) Method, device and system for authorizing embedded device by using hardware dongle
CN109858235B (en) Portable equipment and password obtaining method and device thereof
CN104301343A (en) Database updating method and relevant equipment and system
JP2013251814A (en) Radio communication device
JP6847949B2 (en) Network architecture for controlling data signaling
CN111143832A (en) Mobile terminal SDK (software development kit) suitable for multiple scenes and hybrid authorization method thereof
CN112165706B (en) Equipment connection management method and device and Bluetooth equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 215123 building 14, Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Applicant after: Sipic Technology Co.,Ltd.

Address before: 215123 building 14, Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Applicant before: AI SPEECH Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200602