[go: up one dir, main page]

WO2018166109A1 - Terminal test method, and terminal - Google Patents

Terminal test method, and terminal Download PDF

Info

Publication number
WO2018166109A1
WO2018166109A1 PCT/CN2017/091045 CN2017091045W WO2018166109A1 WO 2018166109 A1 WO2018166109 A1 WO 2018166109A1 CN 2017091045 W CN2017091045 W CN 2017091045W WO 2018166109 A1 WO2018166109 A1 WO 2018166109A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
identity
verification information
chip
information
Prior art date
Application number
PCT/CN2017/091045
Other languages
French (fr)
Chinese (zh)
Inventor
杨俊�
周越海
孔峥嵘
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201780047023.XA priority Critical patent/CN109564598B/en
Publication of WO2018166109A1 publication Critical patent/WO2018166109A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Definitions

  • the identifier of the electronic device may include one or a combination of the following: a central processing unit (CPU) chip identifier, a memory chip identifier, and a wireless fidelity (wireless fidelity). , WiFi) chip identity, Bluetooth chip identity, navigation chip identity, frequency modulation (FM) chip identity, WiFi chip corresponding media access control layer (media access control, MAC address), The MAC address corresponding to the Bluetooth chip.
  • CPU central processing unit
  • memory chip identifier a memory chip identifier
  • wireless fidelity wireless fidelity
  • Step 301 The processor in the terminal reads an identity of an electronic device currently used by the terminal.
  • the processor in the terminal needs to read the identity of the current electronic device according to the identity of the electronic device used to generate the second verification information.
  • the processor in the terminal performs the above.
  • the ID of the current CPU chip, the ID of the current storage chip, the MAC address of the current WiFi chip, and the MAC address corresponding to the current Bluetooth chip are correspondingly read.
  • the processor in the terminal when generating the second verification information, if the A algorithm is used to generate an ID verification code for the identifiers of the plurality of electronic devices, the processor in the terminal also uses the A algorithm to read the currently used plurality of electrons. The device's identity generates a new ID check code.
  • the B check algorithm when generating the second check information, the B check algorithm is used to encrypt the ID check code, and the processor in the terminal also uses the B algorithm to encrypt the newly generated ID check code to obtain the first check. information.
  • the processor in the counterfeit terminal cannot be from the memory.
  • the second check information is read in the cloud, that is, the second check information fails to be obtained. At this time, the terminal can be determined to be an illegal terminal.
  • the program for implementing the above-mentioned legality verification on the terminal may be written into the operating system of the terminal, that is, the function of the above-mentioned legality verification may be implemented by the terminal running the operating system.
  • a fake terminal or an illegally refurbished terminal uses the same operating system as a well-known brand terminal in order to counterfeit a well-known brand terminal. Therefore, even a fake terminal or an illegally refurbished terminal is operating normally.
  • the above functions can also be implemented.
  • the above method embodiments may also be implemented by installing an application (application) on the terminal.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device so that the calculation Performing a series of operational steps on a machine or other programmable device to produce computer-implemented processing such that instructions executed on a computer or other programmable device are provided for implementation in one or more processes and/or block diagrams of the flowchart The steps of the function specified in the box or in multiple boxes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

A terminal test method, and a terminal. In the method, a terminal reads the identity of an electronic device currently used by the terminal and generates first verification information according to the read identity; the terminal obtains second verification information, the second verification information being verification information generated in advance according to the identity of a legal electronic device of the terminal; the terminal matches the first verification information with the second verification information for verification, and if the first verification information is not matched with the second verification information, the terminal is determined to be an illegal terminal. By means of embodiments of the method, the legitimacy of a terminal can be verified to identify a fake or illegal refurbished terminal, thereby preventing a user from being cheated.

Description

一种终端检测方法及终端Terminal detection method and terminal
本申请要求在2017年3月13日提交中国专利局、申请号为201710147619.9、发明名称为《一种校验终端的方法和设备》的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese Patent Application, filed on March 13, 2017, to the Chinese Patent Office, Application No. 201710147619.9, entitled "A Method and Apparatus for a Verification Terminal", the entire contents of which are incorporated herein by reference. In the application.
技术领域Technical field
本申请涉及终端技术领域,尤其涉及一种终端检测方法及终端。The present application relates to the field of terminal technologies, and in particular, to a terminal detection method and a terminal.
背景技术Background technique
随着终端技术的发展,智能手机越来越普及,随之出现了一些不法分子将仿造出的手机或者非法翻新后的手机当作知名品牌的新机出售。这些仿造的手机的外观、用户界面往往与品牌手机十分接近,用户容易将其当作知名品牌手机购买,而翻新后的手机更是不易被用户察觉。用户往往是在这些手机出现问题、送往品牌相应的维修店后,才发现购买的手机并非正品,无法获取售后保障权益,造成非常差的用户体验,同时也给品牌造成了不良影响。With the development of terminal technology, smartphones have become more and more popular, and some criminals have sold fake mobile phones or illegally refurbished mobile phones as well-known brands. The appearance and user interface of these fake mobile phones are often very close to the brand mobile phones. Users can easily buy them as well-known brand mobile phones, and the refurbished mobile phones are not easily perceived by users. Users often find problems in these mobile phones and send them to the corresponding repair shop of the brand, only to find that the purchased mobile phone is not genuine, can not obtain after-sales protection rights, resulting in a very poor user experience, but also caused adverse effects on the brand.
目前,针对仿造手机或非法翻新手机的鉴别,通常是通过对手机序列号或者国际移动设备身份标识(international mobile equipment identity,IMEI)进行校验,或者由专业人员通过专用设备对手机的硬件版本进行检查,以确认手机是否为正品。At present, the identification of counterfeit mobile phones or illegally refurbished mobile phones is usually performed by verifying the serial number of the mobile phone or the international mobile equipment identity (IMEI), or by a professional to carry out the hardware version of the mobile phone through a dedicated device. Check to see if the phone is genuine.
然而,由于手机序列号以及IMEI比较容易获取,存在易于被仿冒的问题;而对硬件版本进行检查则耗时耗力,不易普及。However, since the mobile phone serial number and IMEI are relatively easy to obtain, there is a problem that it is easy to be counterfeited; and checking the hardware version is time-consuming and labor-intensive, and is not easy to popularize.
发明内容Summary of the invention
本申请实施例提供一种终端检测方法及终端,用以实现对终端的合法性进行校验。The embodiment of the present invention provides a terminal detection method and a terminal, which are used to verify the validity of the terminal.
第一方面,本申请实施例提供了一种终端检测方法,包括:In a first aspect, an embodiment of the present application provides a terminal detection method, including:
终端读取该终端当前使用的电子器件的身份标识,并根据读取的身份标识生成第一校验信息;终端获取预设的第二校验信息,第二校验信息为根据该终端的合法电子器件的身份标识预先生成的校验信息;终端将第一校验信息与第二校验信息进行匹配校验,在第一校验信息与第二校验信息不匹配时,则判断该终端为非法终端。The terminal reads the identity of the electronic device currently used by the terminal, and generates the first verification information according to the read identity identifier; the terminal acquires the preset second verification information, where the second verification information is legal according to the terminal. The identifier of the electronic device identifies the pre-generated verification information; the terminal performs matching verification on the first verification information and the second verification information, and when the first verification information does not match the second verification information, determines the terminal. It is an illegal terminal.
在上述实施例中,在终端的生产过程中,可以根据终端所使用的合法电子器件的身份标识生成第二校验信息,或者在终端正规维修后修改第二校验信息。终端在校验终端合法性时,可以根据当前使用的电子器件的身份标识生成第一校验信息,并将第一校验信息与第二校验信息进行匹配校验,以实现检测终端是否为非法翻新的终端或者仿造的终端。In the above embodiment, in the production process of the terminal, the second verification information may be generated according to the identity identifier of the legal electronic device used by the terminal, or the second verification information may be modified after the terminal is regularly repaired. When verifying the validity of the terminal, the terminal may generate the first verification information according to the identity identifier of the currently used electronic device, and perform matching verification on the first verification information and the second verification information, so as to implement whether the detection terminal is An illegally refurbished terminal or a fake terminal.
在一种可能的实现方式中,实现上述步骤的程序可以被写在终端的操作系统中。通常情况下,仿造的终端或被非法翻新后的终端为了仿冒知名品牌的终端,会使用与知名品牌的终端相同的操作系统,因此,即使仿造的终端或被非法翻新的终端在正常运行操作系统时,也可以实现上述功能。In a possible implementation, the program implementing the above steps can be written in the operating system of the terminal. Usually, a fake terminal or an illegally refurbished terminal uses the same operating system as a well-known brand terminal in order to counterfeit a well-known brand terminal. Therefore, even a fake terminal or an illegally refurbished terminal is operating normally. The above functions can also be implemented.
在一种可能的实现方式中,第二校验信息,可以存储在终端的存储器中,那么,终端在获取第二校验信息时,可以从终端的存储器中获取预设的第二校验信息;第二校验信息 也可以存储在云端,那么,终端在获取第二校验信息时,向云端发送获取第二校验信息的请求,该请求中包括该终端的身份标识,例如终端序列号或终端的IMEI,云端将与该身份标识对应的第二校验信息发送给终端。或者,还可以终端的存储器以及云端均存储有第二校验信息,当终端从这二者中的一处获取第二校验信息失败时,还可以从另一处获取。In a possible implementation, the second verification information may be stored in the memory of the terminal, and the terminal may obtain the preset second verification information from the memory of the terminal when acquiring the second verification information. Second verification information The terminal may also be stored in the cloud. Then, when acquiring the second verification information, the terminal sends a request for acquiring the second verification information to the cloud, where the request includes the identity of the terminal, such as the terminal serial number or the IMEI of the terminal, and the cloud Sending second verification information corresponding to the identity identifier to the terminal. Alternatively, the second check information may be stored in the memory of the terminal and the cloud. When the terminal fails to obtain the second check information from one of the two, the terminal may also obtain the information from another location.
在一种可能的实现方式中,第二校验信息可以存储在终端的非易失性存储器中。非易失性存储器不易损坏,且非专业人员无法对其进行读写,故将第二校验信息存储在非易失性存储器中不易丢失、不易被篡改。In a possible implementation, the second verification information may be stored in a non-volatile memory of the terminal. The non-volatile memory is not easily damaged, and the non-professionals cannot read or write it. Therefore, storing the second verification information in the non-volatile memory is not easily lost and is not easily falsified.
在一种可能的实现方式中,若终端获取第二校验信息失败,则判断该终端为非法终端。例如,若终端为仿造的终端,那么该终端的存储器中可能没有存储第二校验信息,而云端中也没有存储该终端的第二校验信息。In a possible implementation, if the terminal fails to obtain the second verification information, it is determined that the terminal is an illegal terminal. For example, if the terminal is a fake terminal, the second verification information may not be stored in the memory of the terminal, and the second verification information of the terminal is not stored in the cloud.
在一种可能的实现方式中,在判定终端为非法终端后,终端可以输出判定信息,将判定信息显示给用户,以使用户知晓该终端为非法终端,避免用户被欺骗。In a possible implementation manner, after determining that the terminal is an illegal terminal, the terminal may output the determination information, and display the determination information to the user, so that the user knows that the terminal is an illegal terminal, and the user is prevented from being deceived.
在一种可能的实现方式中,终端可以在接收到合法性验证指示之后,再执行上述实施例。例如,终端中可以设置有开启合法性验证的控件,当该控件被触发时,终端按照如前所述的方法进行验证。In a possible implementation manner, the terminal may perform the foregoing embodiment after receiving the validity verification indication. For example, a control for enabling legality verification may be set in the terminal. When the control is triggered, the terminal performs verification according to the method described above.
在一种可能的实现方式中,电子器件的身份标识,可以包括以下之一或组合:中央处理器(central processing unit,CPU)芯片的身份标识,存储器芯片的身份标识,无线保真(wireless fidelity,WiFi)芯片的身份标识,蓝牙芯片的身份标识,导航芯片的身份标识,频率调制(frequency modulation,FM)芯片的身份标识,WiFi芯片对应的媒体介入控制层(media access control,MAC)地址,蓝牙芯片对应的MAC地址。In a possible implementation manner, the identifier of the electronic device may include one or a combination of the following: a central processing unit (CPU) chip identifier, a memory chip identifier, and a wireless fidelity (wireless fidelity). , WiFi) chip identity, Bluetooth chip identity, navigation chip identity, frequency modulation (FM) chip identity, WiFi chip corresponding media access control layer (media access control, MAC address), The MAC address corresponding to the Bluetooth chip.
第二方面,本申请实施例还提供了一种终端,该终端具有实现上述第一方面方法实施例中终端行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或所述软件包括一个或多个与上述功能相对应的模块。In a second aspect, the embodiment of the present application further provides a terminal, where the terminal has a function of implementing terminal behavior in the foregoing method embodiment of the first aspect. The functions may be implemented by hardware or by corresponding software implemented by hardware. The hardware or the software includes one or more modules corresponding to the functions described above.
在一个可能的设计中,所述终端的结构中包括读取单元、生成单元、获取单元、匹配单元和判定单元,这些单元可以执行上述方法示例中相应功能,具体参见方法示例中的详细描述,此处不做赘述。In a possible design, the structure of the terminal includes a reading unit, a generating unit, an obtaining unit, a matching unit, and a determining unit, and the units may perform corresponding functions in the foregoing method examples, and specifically refer to the detailed description in the method example. I will not repeat them here.
第三方面,本申请实施例还提供了一种终端,该终端具有实现上述第一方面方法实施例中终端行为的功能。所述功能可以通过硬件实现。所述终端的结构中包括处理器,以及分别与处理器连接的存储器和收发器。其中,处理器用于调用所述存储器中预先存储的计算机程序执行上述第一方面方法示例中终端行为的功能,具体参见方法示例中的详细描述,此处不做赘述。In a third aspect, the embodiment of the present application further provides a terminal, where the terminal has a function of implementing terminal behavior in the foregoing method embodiment of the first aspect. The functions can be implemented in hardware. The structure of the terminal includes a processor, and a memory and a transceiver respectively connected to the processor. The processor is used to invoke the function of the terminal in the method of the first aspect to perform the function of the terminal in the method of the first aspect. For details, refer to the detailed description in the method example, and details are not described herein.
第四方面,本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机指令,当指令在计算机上运行时,使得计算机执行如第一方面所述的方法实施例。In a fourth aspect, the embodiment of the present application further provides a computer readable storage medium, where the computer readable storage medium stores computer instructions, when the instructions are run on a computer, causing the computer to perform the method according to the first aspect Example.
附图说明DRAWINGS
图1为本申请实施例提供的一种终端的结构示意图;FIG. 1 is a schematic structural diagram of a terminal according to an embodiment of the present application;
图2A为本申请实施例提供的校验信息生成过程示意图之一;2A is a schematic diagram of a verification information generation process according to an embodiment of the present application;
图2B为本申请实施例提供的校验信息生成过程示意图之二;2B is a second schematic diagram of a verification information generation process according to an embodiment of the present application;
图3为本申请实施例提供的一种终端检测方法流程示意图; FIG. 3 is a schematic flowchart of a method for detecting a terminal according to an embodiment of the present disclosure;
图4为本申请实施例提供的另一种终端检测方法流程示意图;FIG. 4 is a schematic flowchart of another terminal detection method according to an embodiment of the present disclosure;
图5为本申请实施例提供的另一种终端的结构示意图。FIG. 5 is a schematic structural diagram of another terminal according to an embodiment of the present application.
具体实施方式detailed description
下面将结合附图对本申请实施例作进一步地详细描述。The embodiments of the present application will be further described in detail below with reference to the accompanying drawings.
本申请实施例涉及的终端,可以包括手机、平板电脑、个人数字助理(personal digital assistant,PDA)、车载电脑、可穿戴设备等。The terminal involved in the embodiment of the present application may include a mobile phone, a tablet computer, a personal digital assistant (PDA), a vehicle-mounted computer, a wearable device, and the like.
图1示出的是与本发明实施例相关的终端100的部分结构的框图。如图1所示,终端100可以包括处理器110、分别与处理器110连接的存储器120、显示器130,可选地,终端100还可以包括射频(radio frequency,RF)电路140、音频电路150、扬声器151、麦克风152、其他输入设备160等,此外,终端100还包括为其供电的电源。1 is a block diagram showing a part of the structure of a terminal 100 related to an embodiment of the present invention. As shown in FIG. 1 , the terminal 100 may include a processor 110 , a memory 120 respectively connected to the processor 110 , and a display 130 . Optionally, the terminal 100 may further include a radio frequency (RF) circuit 140 , an audio circuit 150 , The speaker 151, the microphone 152, other input devices 160, and the like, in addition, the terminal 100 further includes a power source for supplying power thereto.
本领域技术人员可以理解,图1中示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。It will be understood by those skilled in the art that the terminal structure shown in FIG. 1 does not constitute a limitation of the terminal, and may include more or less components than those illustrated, or combine some components, or split some components, or Different parts are arranged.
下面结合图1对终端100的各个构成部件进行具体的介绍:The components of the terminal 100 will be specifically described below with reference to FIG. 1 :
处理器110是终端100的控制中心,利用各种接口和线路连接整个终端的各个部分,通过运行或执行存储在存储器120内的计算机程序和/或模块,以及调用存储在存储器120内的数据,执行终端100的各种功能和处理数据,从而对终端进行整体监控。The processor 110 is a control center of the terminal 100 that connects various portions of the entire terminal using various interfaces and lines, by running or executing computer programs and/or modules stored in the memory 120, and recalling data stored in the memory 120, The various functions and processing data of the terminal 100 are performed to perform overall monitoring of the terminal.
可选的,处理器110可包括一个或多个处理单元。处理器110可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器110中。Alternatively, processor 110 may include one or more processing units. The processor 110 can integrate an application processor and a modem processor, wherein the application processor primarily processes an operating system, a user interface, an application, etc., and the modem processor primarily processes wireless communications. It can be understood that the above modem processor may not be integrated into the processor 110.
存储器120,可用于存储计算机程序和数据,处理器110通过运行预先存储在存储器120中的计算机程序,执行终端100的各种功能应用以及数据处理。存储器120可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统(例如,安卓操作系统或IOS操作系统)、至少一个功能所需的应用程序;存储数据区可存储根据终端100的使用所创建的数据等,例如联系人信息等。The memory 120 is operable to store computer programs and data, and the processor 110 executes various functional applications and data processing of the terminal 100 by running a computer program previously stored in the memory 120. The memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system (for example, an Android operating system or an IOS operating system), an application required for at least one function; and the storage data area may be stored according to the terminal. The data created by the use of 100, etc., such as contact information.
显示器130,可用于显示提供给用户的信息、由用户输入的信息以及终端100的各种菜单等。The display 130 can be used to display information provided to the user, information input by the user, various menus of the terminal 100, and the like.
RF电路140,可用于收发信息或通话过程中,信号的接收和发送。通常,RF电路包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(low noise amplifier,LNA)、双工器等。此外,RF电路还可以通过无线通信与网络和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(global system of mobile communication,GSM)、通用分组无线服务(general packet radio service,GPRS)、码分多址(code division multiple access,CDMA)、宽带码分多址(wideband code division multiple access,WCDMA)、长期演进(long term evolution,LTE)、电子邮件、短消息服务(short messaging service,SMS)等。The RF circuit 140 can be used for transmitting and receiving information and receiving and transmitting signals during a call. Generally, RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (LNA), a duplexer, and the like. In addition, the RF circuit can communicate with the network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to global system of mobile communication (GSM), general packet radio service (GPRS), code division multiple access (code) Division multiple access (CDMA), wideband code division multiple access (WCDMA), long term evolution (LTE), e-mail, short messaging service (SMS), and the like.
音频电路150、扬声器151、麦克风152可提供用户与终端100之间的音频接口。音频电路150可将接收到的音频数据转换后的信号,传输到扬声器151,由扬声器151转换为声音信号输出;另一方面,麦克风152将收集的声音信号转换为信号,由音频电路150接收后转换为音频数据,再将音频数据输出至RF电路140以发送给比如另一终端,或者 将音频数据输出至存储器120以便进一步处理。The audio circuit 150, the speaker 151, and the microphone 152 can provide an audio interface between the user and the terminal 100. The audio circuit 150 can transmit the converted audio data to the speaker 151 for conversion to the sound signal output by the speaker 151; on the other hand, the microphone 152 converts the collected sound signal into a signal, which is received by the audio circuit 150. Converting to audio data, and then outputting the audio data to the RF circuit 140 for transmission to, for example, another terminal, or The audio data is output to the memory 120 for further processing.
其他输入设备160可用于接收输入的数字或字符信息,以及产生与终端100的用户设置以及功能控制有关的键信号输入。具体地,其他输入设备160可包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、操作杆等中的一种或多种。 Other input devices 160 can be used to receive input digital or character information, as well as to generate key signal inputs related to user settings and function control of terminal 100. In particular, other input devices 160 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), joysticks, and the like.
终端100还包括给各个部件供电的电源(比如电池),可选的,电源可以通过电源管理系统与处理器110逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗等功能。The terminal 100 further includes a power source (such as a battery) for supplying power to the various components. Optionally, the power source can be logically connected to the processor 110 through the power management system to manage functions such as charging, discharging, and power consumption through the power management system.
尽管未在图中示出,终端100还可以包括摄像头、蓝牙模块、导航模块、WiFi模块、FM模块等,在此不再赘述。Although not shown in the figure, the terminal 100 may further include a camera, a Bluetooth module, a navigation module, a WiFi module, an FM module, and the like, and details are not described herein again.
下面介绍本申请实施例提供的终端检测方法。The terminal detection method provided by the embodiment of the present application is described below.
在执行本申请实施例提供的终端检测方法流程之前,可以根据终端使用的合法电子器件的身份标识生成用于检测终端合法性的基准校验信息,即本申请实施例中的第二校验信息。Before performing the process of the terminal detection method provided by the embodiment of the present application, the reference verification information for detecting the validity of the terminal may be generated according to the identity identifier of the legal electronic device used by the terminal, that is, the second verification information in the embodiment of the present application. .
一般来说,正规厂商生产的电子器件,至少有一个用于唯一标识该电子器件的身份标识。例如,每个CPU芯片有其唯一的身份标识号(identification,ID),每个存储器的芯片也有其唯一的ID。Generally, an electronic device produced by a regular manufacturer has at least one identity for uniquely identifying the electronic device. For example, each CPU chip has its own unique identification number (ID), and each memory chip also has its unique ID.
一个终端中可以包含有CPU芯片、存储器芯片,以及WiFi芯片、蓝牙芯片、导航芯片、FM芯片等。相应的,用于生成第二校验信息的电子器件的身份标识,可以包括CPU芯片的ID、存储芯片的ID、WiFi芯片的ID、蓝牙芯片的ID、导航芯片的ID以及FM芯片的ID等。当然,也可以仅使用上述多种芯片ID中的一种或组合用于生成第二校验信息。A terminal may include a CPU chip, a memory chip, and a WiFi chip, a Bluetooth chip, a navigation chip, an FM chip, and the like. Correspondingly, the identifier of the electronic device for generating the second verification information may include an ID of the CPU chip, an ID of the memory chip, an ID of the WiFi chip, an ID of the Bluetooth chip, an ID of the navigation chip, an ID of the FM chip, and the like. . Of course, it is also possible to use only one or a combination of the above various chip IDs for generating the second verification information.
随着芯片集成技术的发展,也可以将多种芯片的功能集成到一个芯片中。例如,目前业界已经开始在终端中使用“四合一芯片”,即用于实现WiFi功能、蓝牙功能、导航功能、FM功能的芯片。对于使用了这种“四合一芯片”的终端,处理器在执行上述步骤时,可以相应读取该“四合一芯片”的ID。With the development of chip integration technology, the functions of various chips can also be integrated into one chip. For example, the industry has begun to use "four-in-one chips" in terminals, that is, chips for implementing WiFi functions, Bluetooth functions, navigation functions, and FM functions. For the terminal using the "four-in-one chip", the processor can read the ID of the "four-in-one chip" correspondingly when performing the above steps.
用于唯一标识电子器件的身份标识,除了上述ID之外,还可以包括其他信息。例如,每个WiFi芯片,都对应一个唯一的MAC地址;每个蓝牙芯片也对应一个唯一的MAC地址。因此,也可以将WiFi芯片的MAC地址作为WiFi芯片的身份标识,将蓝牙芯片的MAC地址作为蓝牙芯片的身份标识。The identity used to uniquely identify the electronic device may include other information in addition to the above ID. For example, each WiFi chip corresponds to a unique MAC address; each Bluetooth chip also corresponds to a unique MAC address. Therefore, the MAC address of the WiFi chip can also be used as the identity of the WiFi chip, and the MAC address of the Bluetooth chip is used as the identity of the Bluetooth chip.
当然,用于生成第二校验信息的电子器件的身份标识,可以既包括电子器件的ID,也包括该电子器件对应的MAC地址。此外,终端中还可以包括其他电子器件,因此,用于生成第二校验信息的电子器件的身份标识,还可以包括除上述电子器件之外的其他电子器件的身份标识,本申请对此不做限制。Of course, the identity of the electronic device used to generate the second verification information may include both the ID of the electronic device and the MAC address corresponding to the electronic device. In addition, other electronic devices may be included in the terminal. Therefore, the identity of the electronic device used to generate the second verification information may further include identifiers of other electronic devices than the foregoing electronic devices. Make restrictions.
通常情况下,终端的第二校验信息,可以是在终端的生成过程中根据该终端的初始各电子器件的身份标识生成的,或者,还可以是在该终端更换了电子器件后根据更换后的各电子器件的身份标识生成的。Generally, the second verification information of the terminal may be generated according to the identity of the initial electronic device of the terminal during the generation process of the terminal, or may be after the replacement of the electronic device by the terminal. The identity of each electronic device is generated.
若第二校验信息中包括多种电子器件的身份标识的信息,在一种可能的实现方式中,在生成第二校验信息时,可以根据各身份标识、按照预先约定的算法生成一个ID校验码,可以减少终端或云端服务器存储第二校验信息所需的存储空间,简化终端获取第二校验信息的过程。当然,也可以将各电子器件的身份标识分别存储,本申请对此不做限制。If the second verification information includes the information of the identifiers of the plurality of electronic devices, in a possible implementation manner, when generating the second verification information, an ID may be generated according to each identity identifier according to a pre-agreed algorithm. The check code can reduce the storage space required for the terminal or the cloud server to store the second check information, and simplify the process of the terminal acquiring the second check information. Of course, the identity of each electronic device may also be separately stored, which is not limited in this application.
为了减少第二校验信息被非法窃取的情况,可以根据预先约定的加密算法对生成的ID 校验码进行加密,或者对各电子器件的身份标识分别进行加密。约定的加密算法可以是任意的加密算法,本申请对此不做限制。当然,也可以不进行加密。In order to reduce the situation that the second verification information is illegally stolen, the generated ID may be generated according to a pre-agreed encryption algorithm. The check code is encrypted, or the identity of each electronic device is separately encrypted. The agreed encryption algorithm may be any encryption algorithm, which is not limited in this application. Of course, you can also not encrypt.
在一个具体实施例中,在终端的生产过程中,可以由其它能够读取终端电子器件身份标识的设备执行如图2A所示的流程:读取各电子器件的身份标识,具体地,可以读取终端CPU芯片的ID、嵌入式多媒体卡(embedded multi media card,EMMC)芯片的ID、WiFi芯片对应的MAC地址、蓝牙芯片对应的MAC地址以及其他电子器件的身份标识,然后根据上述各身份标识信息、按照预先约定的算法生成一个ID校验码,并对该ID校验码进行加密,将其写入终端的非易失性存储器中;此外,还可以读取该终端的序列号和/或IMEI,然后将该序列号和/或IMEI与生成的ID校验码对应保存在云端。当然上述流程也可以由终端在初次开机时中的处理器执行。In a specific embodiment, in the production process of the terminal, the device shown in FIG. 2A can be executed by other devices capable of reading the identity of the terminal electronic device: reading the identity of each electronic device, specifically, can read Taking the ID of the terminal CPU chip, the ID of the embedded multi media card (EMMC) chip, the MAC address corresponding to the WiFi chip, the MAC address corresponding to the Bluetooth chip, and the identity of other electronic devices, and then according to the above identification Information, generate an ID check code according to a pre-agreed algorithm, encrypt the ID check code, write it into the non-volatile memory of the terminal; in addition, read the serial number of the terminal and / Or IMEI, and then save the serial number and/or IMEI in the cloud corresponding to the generated ID check code. Of course, the above process can also be executed by the processor in the terminal when the terminal is first turned on.
在另外一个具体实施例中,终端在正规维修店更换了EMMC芯片之后,可以由维修人员使用具有上述功能的设备执行如图2B所述的流程:读取CPU芯片的ID、更换后的EMMC芯片的ID、WiFi芯片对应的MAC地址、蓝牙芯片对应的MAC地址,按照同一算法生成一个新的ID校验码,并使用相同的加密算法对ID校验码进行加密,然后将加密后的ID校验码写入终端的非易失性存储器、删除原有的ID校验码;还可以读取该终端的序列号和/或IMEI,将云端中保存的与该序列号和/或IMEI对应的ID校验码替换为新生成的ID校验码。In another specific embodiment, after the terminal replaces the EMMC chip in the regular repair shop, the maintenance agent can perform the process as described in FIG. 2B using the device having the above functions: reading the ID of the CPU chip, and replacing the EMMC chip. The ID, the MAC address corresponding to the WiFi chip, and the MAC address corresponding to the Bluetooth chip, generate a new ID check code according to the same algorithm, and encrypt the ID check code using the same encryption algorithm, and then encrypt the ID. The code is written into the non-volatile memory of the terminal, and the original ID check code is deleted; the serial number and/or IMEI of the terminal may also be read, and the sequence corresponding to the serial number and/or IMEI saved in the cloud may be read. The ID check code is replaced with the newly generated ID check code.
通过上述实施例,实现了在终端存储器和/或云端中保存有用于检测终端合法性的第二校验信息,以便后续能够根据第二校验信息对终端的合法性进行校验。Through the foregoing embodiment, the second verification information for detecting the validity of the terminal is saved in the terminal memory and/or the cloud, so that the validity of the terminal can be verified according to the second verification information.
参见图3,为本申请实施例提供的终端检测方法的流程示意图,如图所示,该方法具体包括以下步骤:FIG. 3 is a schematic flowchart of a method for detecting a terminal according to an embodiment of the present disclosure. As shown in the figure, the method specifically includes the following steps:
步骤301、终端中的处理器读取该终端当前使用的电子器件的身份标识。Step 301: The processor in the terminal reads an identity of an electronic device currently used by the terminal.
在执行上述步骤时,终端中的处理器需要根据用于生成第二校验信息的电子器件的身份标识,相应的读取当前电子器件的身份标识。When performing the above steps, the processor in the terminal needs to read the identity of the current electronic device according to the identity of the electronic device used to generate the second verification information.
例如,若用于生成第二校验信息的电子器件的身份标识包括CPU芯片的ID、存储芯片的ID、WiFi芯片的MAC地址和蓝牙芯片对应的MAC地址,那么终端中的处理器在执行上述步骤时,相应的读取当前CPU芯片的ID、当前存储芯片的ID、当前WiFi芯片的MAC地址和当前蓝牙芯片对应的MAC地址For example, if the identity of the electronic device for generating the second verification information includes the ID of the CPU chip, the ID of the memory chip, the MAC address of the WiFi chip, and the MAC address corresponding to the Bluetooth chip, the processor in the terminal performs the above. In the step, the ID of the current CPU chip, the ID of the current storage chip, the MAC address of the current WiFi chip, and the MAC address corresponding to the current Bluetooth chip are correspondingly read.
步骤302、终端中的处理器根据读取的身份标识生成第一校验信息。Step 302: The processor in the terminal generates first verification information according to the read identity.
终端中的处理器根据读取的身份标识、按照预先约定的算法生成第一校验信息。具体地,预先约定的算法与生成第二校验信息时采用的算法一致。The processor in the terminal generates the first verification information according to the read identity and according to a pre-agreed algorithm. Specifically, the pre-agreed algorithm is consistent with the algorithm used when generating the second check information.
例如,在生成第二校验信息时,若采用A算法将多种电子器件的身份标识生成一个ID校验码,在终端中的处理器也采用A算法将读取的当前使用的多种电子器件的身份标识生成新ID校验码。又例如,在生成第二校验信息时,采用B算法对ID校验码进行加密,在终端中的处理器也采用B算法对新生成的ID校验码进行加密,以得到第一校验信息。For example, when generating the second verification information, if the A algorithm is used to generate an ID verification code for the identifiers of the plurality of electronic devices, the processor in the terminal also uses the A algorithm to read the currently used plurality of electrons. The device's identity generates a new ID check code. For another example, when generating the second check information, the B check algorithm is used to encrypt the ID check code, and the processor in the terminal also uses the B algorithm to encrypt the newly generated ID check code to obtain the first check. information.
步骤303、终端中的处理器获取第二校验信息,第二校验信息为根据该终端的合法电子器件的身份标识预先生成的校验信息。Step 303: The processor in the terminal acquires second verification information, where the second verification information is pre-generated verification information according to the identity of the legal electronic device of the terminal.
如前所述,第二校验信息可以被存储在终端的存储器中,也可以被存储在云端,那么终端中的处理器获取第二校验信息时,可以从终端的存储器中读取第二校验信息,也可以请求从云端获取第二校验信息。 As described above, the second verification information may be stored in the memory of the terminal, or may be stored in the cloud, and when the processor in the terminal acquires the second verification information, the second verification information may be read from the memory of the terminal. The verification information may also request to obtain the second verification information from the cloud.
具体地,当终端需要从云端获取第二校验信息时,终端可以向云端发送获取第二校验信息的请求,该请求中包括终端的身份标识。如前所述,在云端中,若第二校验信息与终端的序列号对应存储,那么请求中包括的身份标识应为终端的序列号;若第二校验信息与终端的IMEI对应存储,那么请求中包括的身份标识应为终端的IMEI;若第二校验信息与终端的序列号和IMEI对应存储,那么根据预先约定,获取第二校验信息的请求中可以仅包括终端的序列号或IMEI,或者需要同时包含序列号和IMEI才能够从云端获取第二校验信息。云端接收到获取第二校验信息的请求后,根据请求中包含的终端的身份标识,对应查找该终端的第二校验信息,并将第二校验信息发送给终端。Specifically, when the terminal needs to obtain the second verification information from the cloud, the terminal may send a request for acquiring the second verification information to the cloud, where the request includes the identity of the terminal. As described above, in the cloud, if the second check information is stored corresponding to the serial number of the terminal, the identity identifier included in the request should be the serial number of the terminal; if the second check information is stored corresponding to the IMEI of the terminal, Then, the identifier included in the request should be the IMEI of the terminal; if the second verification information is stored in association with the serial number of the terminal and the IMEI, the request for acquiring the second verification information may include only the serial number of the terminal according to a predetermined agreement. Or IMEI, or need to include both the serial number and the IMEI to obtain the second verification information from the cloud. After receiving the request for acquiring the second verification information, the cloud device searches for the second verification information of the terminal according to the identity identifier of the terminal included in the request, and sends the second verification information to the terminal.
在一些实施例中,由于仿造的终端的存储器中没有保存有第二校验信息,而云端中也没有保存有仿造终端的第二校验信息,因此该仿造的终端中的处理器无法从存储器或云端中读取到第二校验信息,即获取第二校验信息失败,此时,可以判断该终端为非法终端。In some embodiments, since the second verification information is not stored in the memory of the counterfeit terminal, and the second verification information of the counterfeit terminal is not stored in the cloud, the processor in the counterfeit terminal cannot be from the memory. Or the second check information is read in the cloud, that is, the second check information fails to be obtained. At this time, the terminal can be determined to be an illegal terminal.
在一种可能的实现方式,上述获取第二校验信息的步骤也可以在步骤301和步骤302之前执行,即先获取预先生成的第二校验信息,再读取终端当前的电子器件的身份标识并生成第一校验信息,本申请对此不做限制。In a possible implementation manner, the step of acquiring the second verification information may also be performed before step 301 and step 302, that is, acquiring the second verification information generated in advance, and then reading the identity of the current electronic device of the terminal. The first verification information is identified and generated, and the application does not limit this.
步骤304、终端中的处理器将第一校验信息与第二校验信息进行匹配校验,在第一校验信息与第二校验信息不匹配时,判断该终端为非法终端。Step 304: The processor in the terminal performs matching check on the first check information and the second check information. When the first check information does not match the second check information, the terminal determines that the terminal is an illegal terminal.
在一些实施例中,不法分子对回收的旧终端进行非法翻新,即对旧终端中的老旧或者已损坏的电子器件进行更换,并对旧终端的外壳进行翻新,使其看起来与新终端无异并当作新终端进行售卖。通常情况下,不法分子并不知晓终端的存储器中存储有根据终端合法电子器件的身份标识生成的第二校验信息,没有对第二校验信息进行修改,此时第一校验信息与第二校验不匹配,即可判定终端为非法终端。In some embodiments, the criminal illegitimate refurbishment of the old terminal that was recovered, ie, replacing the old or damaged electronic device in the old terminal, and refurbishing the outer casing of the old terminal to make it look like the new terminal No different and sold as a new terminal. Normally, the criminal is not aware that the second verification information generated according to the identity of the legal electronic device of the terminal is stored in the memory of the terminal, and the second verification information is not modified. If the two checks do not match, the terminal can be determined to be an illegal terminal.
在另外一些情况下,第二校验信息被存储到终端的非易失性存储器中,而对终端中的非易失性存储器进行读写需要非常专业的技术人员及设备,增加了不法分子对第二校验信息进行篡改的难度。In other cases, the second verification information is stored in the non-volatile memory of the terminal, and the reading and writing of the non-volatile memory in the terminal requires very professional technicians and equipment, which increases the number of criminals. The difficulty of tampering with the second verification information.
此外,第二校验信息可以是根据多种电子器件的身份标识生成的一个ID校验码,第二校验信息还可以被加密,若不法分子想要篡改终端存储器中存储的第二校验信息,需要知道生成ID校验码的算法以及加密时所使用的算法,这也给不法分子篡改第二校验信息增加了难度。In addition, the second verification information may be an ID verification code generated according to the identity of the plurality of electronic devices, and the second verification information may also be encrypted if the criminal wants to tamper with the second verification stored in the terminal memory. Information needs to know the algorithm for generating the ID check code and the algorithm used for encryption, which also makes it difficult for the criminal to tamper with the second check information.
在一种可能的实现方式中,为了避免由于终端存储器中存储的第二校验信息被篡改而使得校验结果不正确,终端可以从终端的存储器和云端分别获取第二校验信息,并对获取的两个第二校验信息进行匹配,若不匹配,也可以判定该终端为非法终端。In a possible implementation manner, in order to prevent the verification result from being incorrect due to the falsification of the second verification information stored in the terminal memory, the terminal may separately obtain the second verification information from the memory and the cloud of the terminal, and The obtained two second check information are matched, and if they do not match, the terminal may be determined to be an illegal terminal.
进一步地,在判断该终端为非法终端后,该终端中的处理器还可以输出判断信息,将判定信息通过显示器展示给用户,以提示用户该终端为非法终端。Further, after determining that the terminal is an illegal terminal, the processor in the terminal may further output the determination information, and display the determination information to the user through the display to prompt the user that the terminal is an illegal terminal.
此外,在一种可能的实现方式中,上述对终端进行合法性校验的过程,可以在终端开机时自动进行。如图4所示,在开机后自动执行本申请实施例提供的对终端电子器件进行检测的过程,若判定该终端为非法终端,可以将判定信息展示给用户,若判定结构为该终端为合法终端,可以正常开机不显示判定信息,当然也可以将判定信息展示给用户。In addition, in a possible implementation manner, the foregoing process of verifying the validity of the terminal may be automatically performed when the terminal is powered on. As shown in FIG. 4, after the power-on, the process of detecting the terminal electronic device provided by the embodiment of the present application is automatically performed. If the terminal is determined to be an illegal terminal, the determination information may be displayed to the user, and if the structure is determined to be legal, the terminal is legal. The terminal can be turned on normally without displaying the determination information, and of course, the determination information can also be displayed to the user.
在另外一种可能的实现方式中,上述对终端进行合法性校验的过程,也可以在该终端接收到合法性验证指示之后再执行。例如,终端中可以设置有开启合法性验证的控件,当该控件被触发时,终端按照如前所述的方法进行验证。 In another possible implementation manner, the foregoing process of verifying the validity of the terminal may also be performed after the terminal receives the legality verification indication. For example, a control for enabling legality verification may be set in the terminal. When the control is triggered, the terminal performs verification according to the method described above.
在一些实施例中,用于实现上述对终端进行合法性校验的程序,可以被写入终端的操作系统中,即终端运行该操作系统即可实现上述合法性验证的功能。通常情况下,仿造的终端或被非法翻新后的终端为了仿冒知名品牌的终端,会使用与知名品牌的终端相同的操作系统,因此,即使仿造的终端或被非法翻新的终端在正常运行操作系统时,也可以实现上述功能。在另外一些实施例中,也可以通过在终端上安装应用程序(application,App)以实现上述方法实施例。In some embodiments, the program for implementing the above-mentioned legality verification on the terminal may be written into the operating system of the terminal, that is, the function of the above-mentioned legality verification may be implemented by the terminal running the operating system. Usually, a fake terminal or an illegally refurbished terminal uses the same operating system as a well-known brand terminal in order to counterfeit a well-known brand terminal. Therefore, even a fake terminal or an illegally refurbished terminal is operating normally. The above functions can also be implemented. In other embodiments, the above method embodiments may also be implemented by installing an application (application) on the terminal.
在上述实施例中,在终端的生产过程可以根据终端所使用的合法电子器件的身份标识生成第二校验信息,或者在终端正规维修后修改第二校验信息。终端在校验终端合法性时,可以根据当前使用的电子器件的身份标识生成第一校验信息,并将第一校验信息与第二校验信息进行匹配校验,以实现检测终端是否为非法翻新的终端或者仿造的终端。In the above embodiment, the second verification information may be generated according to the identity identifier of the legal electronic device used by the terminal in the production process of the terminal, or the second verification information may be modified after the terminal is regularly repaired. When verifying the validity of the terminal, the terminal may generate the first verification information according to the identity identifier of the currently used electronic device, and perform matching verification on the first verification information and the second verification information, so as to implement whether the detection terminal is An illegally refurbished terminal or a fake terminal.
基于相同的技术构思,本申请实施例还提供了一种终端,用以实现上述方法实施例。该终端的结构示意图如图5所示,包括:读取单元501、生成单元502、获取单元503、校验单元504以及判定单元505。Based on the same technical concept, the embodiment of the present application further provides a terminal for implementing the foregoing method embodiments. As shown in FIG. 5, the schematic diagram of the terminal includes a reading unit 501, a generating unit 502, an obtaining unit 503, a checking unit 504, and a determining unit 505.
具体地,读取单元501,用于读取所述终端当前使用的电子器件的身份标识。Specifically, the reading unit 501 is configured to read an identity of an electronic device currently used by the terminal.
生成单元502,用于根据所述身份标识生成第一校验信息。The generating unit 502 is configured to generate first verification information according to the identity identifier.
获取单元503,用于获取预设的第二校验信息,所述第二校验信息为根据所述终端的合法电子器件的身份标识预先生成的校验信息。The obtaining unit 503 is configured to obtain preset second verification information, where the second verification information is pre-generated verification information according to the identity of the legal electronic device of the terminal.
校验单元504,用于将第一校验信息与第二校验信息进行匹配校验。The verification unit 504 is configured to perform matching verification on the first verification information and the second verification information.
判定单元505,用于在所述第一校验信息与所述第二校验信息不匹配时,则判定所述终端为非法终端。The determining unit 505 is configured to determine that the terminal is an illegal terminal when the first check information does not match the second check information.
在一种可能的实现方式中,获取单元503在获取预设的第二校验信息时,具体用于:从所述终端的存储器中获取预设的第二校验信息;和/或,向云端发送获取所述第二校验信息的请求,所述请求中包括所述终端的身份标识,并接收云端发送的对应所述终端的身份标识的第二校验信息。In a possible implementation manner, when acquiring the preset second verification information, the acquiring unit 503 is specifically configured to: obtain preset second verification information from a memory of the terminal; and/or The cloud sends a request for acquiring the second verification information, where the request includes the identity identifier of the terminal, and receives second verification information that is sent by the cloud and is corresponding to the identity identifier of the terminal.
在一种可能的实现方式中,该终端还包括非易失性存储器,用于存储第二校验信息。In a possible implementation manner, the terminal further includes a non-volatile memory for storing the second verification information.
在一种可能的实现方式中,该终端还包括输出单元,用于在所述判断单元判定所述终端为非法终端之后,输出判定信息,以提示用户所述终端为非法终端。In a possible implementation manner, the terminal further includes an output unit, configured to: after the determining unit determines that the terminal is an illegal terminal, outputting the determination information to prompt the user that the terminal is an illegal terminal.
在一种可能的实现方式中,该终端还包括接收单元506,用于在读取单元501读取所述终端当前使用的电子器件的身份标识之前,接收合法性验证指示。In a possible implementation, the terminal further includes a receiving unit 506, configured to receive a legality verification indication before the reading unit 501 reads the identity of the electronic device currently used by the terminal.
在一种可能的实现方式中,上述电子器件的身份标识,包括以下之一或组合:In a possible implementation manner, the identifier of the foregoing electronic device includes one or a combination of the following:
CPU芯片的身份标识,存储器芯片的身份标识,WiFi芯片的身份标识,蓝牙芯片的身份标识,导航芯片的身份标识,FM芯片的身份标识,WiFi芯片对应的MAC地址,蓝牙芯片对应的MAC地址。The identity of the CPU chip, the identity of the memory chip, the identity of the WiFi chip, the identity of the Bluetooth chip, the identity of the navigation chip, the identity of the FM chip, the MAC address corresponding to the WiFi chip, and the MAC address corresponding to the Bluetooth chip.
基于相同的技术构思,本申请实施例还提供了一种终端,用以实现上述方法实施例。本申请实施例提供的终端的结构示意图可以如图1所示,但不限于图1所示的终端。该终端包括:处理器,与所述处理器连接的存储器。Based on the same technical concept, the embodiment of the present application further provides a terminal for implementing the foregoing method embodiments. A schematic structural diagram of a terminal provided by an embodiment of the present application may be as shown in FIG. 1, but is not limited to the terminal shown in FIG. 1. The terminal includes a processor, a memory coupled to the processor.
其中,处理器,用于调用存储器中预先存储的计算机程序执行:The processor is configured to execute a computer program pre-stored in the memory to execute:
读取终端当前使用的电子器件的身份标识;根据身份标识生成第一校验信息;获取预设的第二校验信息,第二校验信息为根据终端的合法电子器件的身份标识预先生成的校验信息;将第一校验信息与第二校验信息进行匹配校验,在第一校验信息与第二校验信息不 匹配时,则判定终端为非法终端。Reading the identity of the electronic device currently used by the terminal; generating the first verification information according to the identity identifier; acquiring the preset second verification information, where the second verification information is pre-generated according to the identity of the legal electronic device of the terminal Checking the information; matching and verifying the first check information and the second check information, where the first check information and the second check information are not When matching, it is determined that the terminal is an illegal terminal.
在一种可能的实现方式中,所述处理器在获取预设的第二校验信息时,具体用于:从所述终端的存储器中获取预设的第二校验信息;和/或,所述终端还包括收发器,所述处理器在获取预设的第二校验信息时,具体用于:通过所述收发器向云端发送获取所述第二校验信息的请求,所述请求中包括所述终端的身份标识,并接收云端发送的对应所述终端的身份标识的第二校验信息。In a possible implementation manner, when acquiring the preset second verification information, the processor is specifically configured to: obtain preset second verification information from a memory of the terminal; and/or, The terminal further includes a transceiver, where the processor, when acquiring the preset second verification information, is specifically configured to: send, by using the transceiver, a request for acquiring the second verification information to the cloud, the request The identifier of the terminal is included, and the second verification information corresponding to the identity of the terminal sent by the cloud is received.
在一种可能的实现方式中,所述处理器还用于:若获取第二校验信息失败,则判断所述终端为非法终端。In a possible implementation manner, the processor is further configured to: if the second verification information fails to be obtained, determine that the terminal is an illegal terminal.
在一种可能的实现方式中,存储第二校验信息的存储器为非易失性存储器。In a possible implementation, the memory storing the second verification information is a non-volatile memory.
在一种可能的实现方式中,所述终端还包括输出设备。所述处理器,在判定所述终端为非法终端之后,还用于:通过所述输出设备输出判定信息,以提示用户所述终端为非法终端。In a possible implementation manner, the terminal further includes an output device. After determining that the terminal is an illegal terminal, the processor is further configured to: output, by using the output device, determination information, to prompt the user that the terminal is an illegal terminal.
可选地,输出设备可以是图1所示的显示器,也可以是扬声器,或者图中未示出的其他部件。Alternatively, the output device may be the display shown in Figure 1, or it may be a speaker, or other components not shown.
在一种可能的实现方式中,所述处理器,在读取所述终端当前使用的电子器件的身份标识之前,还用于:接收合法性验证指示。In a possible implementation, the processor is further configured to: receive a validity verification indication before reading the identity of the electronic device currently used by the terminal.
在一种可能的实现方式中,所述电子器件的身份标识,包括以下之一或组合:In a possible implementation manner, the identifier of the electronic device includes one or a combination of the following:
CPU芯片的身份标识,存储器芯片的身份标识,WiFi芯片的身份标识,蓝牙芯片的身份标识,导航芯片的身份标识,FM芯片的身份标识,WiFi芯片对应的MAC地址,蓝牙芯片对应的MAC地址。The identity of the CPU chip, the identity of the memory chip, the identity of the WiFi chip, the identity of the Bluetooth chip, the identity of the navigation chip, the identity of the FM chip, the MAC address corresponding to the WiFi chip, and the MAC address corresponding to the Bluetooth chip.
本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机指令,当这些计算机指令在计算机上运行时,使得计算机有能力执行上述方法实施例中的任一实施例所描述的方案。The embodiment of the present application further provides a computer readable storage medium, where the computer readable storage medium stores computer instructions, when the computer instructions are run on a computer, enabling the computer to perform any of the foregoing method embodiments. The solution described in one embodiment.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present application can be provided as a method, system, or computer program product. Thus, the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware. Moreover, the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算 机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device so that the calculation Performing a series of operational steps on a machine or other programmable device to produce computer-implemented processing such that instructions executed on a computer or other programmable device are provided for implementation in one or more processes and/or block diagrams of the flowchart The steps of the function specified in the box or in multiple boxes.
显然,本领域的技术人员可以对本申请实施例进行各种改动和变型而不脱离本申请实施例的精神和范围。这样,倘若本申请实施例的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。 It is apparent that those skilled in the art can make various changes and modifications to the embodiments of the present application without departing from the spirit and scope of the embodiments of the present application. Thus, it is intended that the present invention cover the modifications and variations of the embodiments of the present invention.

Claims (15)

  1. 一种终端检测方法,其特征在于,包括:A terminal detection method, comprising:
    终端读取所述终端当前使用的电子器件的身份标识;The terminal reads an identity of an electronic device currently used by the terminal;
    所述终端根据所述身份标识生成第一校验信息;The terminal generates first verification information according to the identity identifier;
    所述终端获取预设的第二校验信息,所述第二校验信息为根据所述终端的合法电子器件的身份标识预先生成的校验信息;The terminal acquires preset second verification information, where the second verification information is pre-generated verification information according to the identity of the legal electronic device of the terminal;
    所述终端将第一校验信息与第二校验信息进行匹配校验,在所述第一校验信息与所述第二校验信息不匹配时,则判定所述终端为非法终端。The terminal performs matching check on the first check information and the second check information. When the first check information does not match the second check information, the terminal determines that the terminal is an illegal terminal.
  2. 如权利要求1所述的方法,其特征在于,所述终端获取第二校验信息,包括:The method of claim 1, wherein the acquiring, by the terminal, the second verification information comprises:
    所述终端从所述终端的存储器中获取预设的第二校验信息;和/或The terminal acquires preset second verification information from a memory of the terminal; and/or
    所述终端向云端发送获取所述第二校验信息的请求,所述请求中包括所述终端的身份标识,并接收云端发送的对应所述终端的身份标识的第二校验信息。The terminal sends a request for acquiring the second verification information to the cloud, where the request includes the identity identifier of the terminal, and receives the second verification information that is sent by the cloud and is corresponding to the identity identifier of the terminal.
  3. 如权利要求1或2所的方法,其特征在于,还包括:The method of claim 1 or 2, further comprising:
    若所述终端获取第二校验信息失败,则判断所述终端为非法终端。If the terminal fails to obtain the second verification information, it is determined that the terminal is an illegal terminal.
  4. 如权利要求2所述的方法,其特征在于,所述存储器为非易失性存储器。The method of claim 2 wherein said memory is a non-volatile memory.
  5. 如权利要求1-4中任一项所述的方法,其特征在于,在判定所述终端为非法终端之后,还包括:The method according to any one of claims 1 to 4, further comprising: after determining that the terminal is an illegal terminal,
    所述终端输出判定信息,以提示用户所述终端为非法终端。The terminal outputs the determination information to prompt the user that the terminal is an illegal terminal.
  6. 如权利要求1-5中任一项所述的方法,其特征在于,在终端读取所述终端当前使用的电子器件的身份标识之前,还包括:The method according to any one of claims 1 to 5, further comprising: before the terminal reads the identity of the electronic device currently used by the terminal, the method further comprising:
    所述终端接收合法性验证指示。The terminal receives a legality verification indication.
  7. 如权利要求1-6中任一项所述的方法,其特征在于,所述电子器件的身份标识,包括以下之一或组合:The method of any of claims 1-6, wherein the identity of the electronic device comprises one or a combination of the following:
    中央处理器CPU芯片的身份标识,存储器芯片的身份标识,无线保真WiFi芯片的身份标识,蓝牙芯片的身份标识,导航芯片的身份标识,频率调制FM芯片的身份标识,WiFi芯片对应的媒体介入控制层MAC地址,蓝牙芯片对应的MAC地址。The identity of the CPU chip of the central processing unit, the identity of the memory chip, the identity of the wireless fidelity WiFi chip, the identity of the Bluetooth chip, the identity of the navigation chip, the identity of the frequency modulated FM chip, and the media intervention of the WiFi chip Control layer MAC address, the MAC address corresponding to the Bluetooth chip.
  8. 一种终端,其特征在于,包括:处理器,与所述处理器连接的存储器;A terminal, comprising: a processor, a memory connected to the processor;
    所述处理器,用于调用所述存储器中预先存储的计算机程序执行:The processor is configured to invoke a computer program pre-stored in the memory to execute:
    读取所述终端当前使用的电子器件的身份标识;Reading an identity of an electronic device currently used by the terminal;
    根据所述身份标识生成第一校验信息;Generating first verification information according to the identity identifier;
    获取预设的第二校验信息,所述第二校验信息为根据所述终端的合法电子器件的身份标识预先生成的校验信息;Acquiring a preset second verification information, where the second verification information is pre-generated verification information according to an identity of the legal electronic device of the terminal;
    将第一校验信息与第二校验信息进行匹配校验,在所述第一校验信息与所述第二校验信息不匹配时,则判定所述终端为非法终端。And performing matching check on the first check information and the second check information. When the first check information does not match the second check information, determining that the terminal is an illegal terminal.
  9. 如权利要求8所述的终端,其特征在于,所述处理器在获取预设的第二校验信息时,具体用于:从所述终端的存储器中获取预设的第二校验信息;和/或The terminal according to claim 8, wherein the processor is configured to: obtain preset second verification information from a memory of the terminal when acquiring the preset second verification information; and / or
    所述终端还包括收发器,所述处理器在获取预设的第二校验信息时,具体用于:通过所述收发器向云端发送获取所述第二校验信息的请求,所述请求中包括所述终端的身份标识,并接收云端发送的对应所述终端的身份标识的第二校验信息。 The terminal further includes a transceiver, where the processor, when acquiring the preset second verification information, is specifically configured to: send, by using the transceiver, a request for acquiring the second verification information to the cloud, the request The identifier of the terminal is included, and the second verification information corresponding to the identity of the terminal sent by the cloud is received.
  10. 如权利要求8或9所述的终端,其特征在于,所述处理器还用于:The terminal according to claim 8 or 9, wherein the processor is further configured to:
    若获取第二校验信息失败,则判断所述终端为非法终端。If the second verification information fails to be obtained, it is determined that the terminal is an illegal terminal.
  11. 如权利要求9所述的终端,其特征在于,所述存储器为非易失性存储器。The terminal of claim 9 wherein said memory is a non-volatile memory.
  12. 如权利要求8-11中任一项所述的终端,其特征在于,所述终端还包括输出设备;The terminal according to any one of claims 8 to 11, wherein the terminal further comprises an output device;
    所述处理器,在判定所述终端为非法终端之后,还用于:The processor is further configured to: after determining that the terminal is an illegal terminal:
    通过所述输出设备输出判定信息,以提示用户所述终端为非法终端。The determination information is outputted by the output device to prompt the user that the terminal is an illegal terminal.
  13. 如权利要求8-12中任一项所述的终端,其特征在于,所述处理器,在读取所述终端当前使用的电子器件的身份标识之前,还用于:The terminal according to any one of claims 8 to 12, wherein the processor is further configured to: before reading the identity of the electronic device currently used by the terminal:
    接收合法性验证指示。Receive legality verification instructions.
  14. 如权利要求8-13中任一项所述的终端,其特征在于,所述电子器件的身份标识,包括以下之一或组合:The terminal according to any one of claims 8 to 13, wherein the identity of the electronic device comprises one or a combination of the following:
    中央处理器CPU芯片的身份标识,存储器芯片的身份标识,无线保真WiFi芯片的身份标识,蓝牙芯片的身份标识,导航芯片的身份标识,频率调制FM芯片的身份标识,WiFi芯片对应的媒体介入控制层MAC地址,蓝牙芯片对应的MAC地址。The identity of the CPU chip of the central processing unit, the identity of the memory chip, the identity of the wireless fidelity WiFi chip, the identity of the Bluetooth chip, the identity of the navigation chip, the identity of the frequency modulated FM chip, and the media intervention of the WiFi chip Control layer MAC address, the MAC address corresponding to the Bluetooth chip.
  15. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机指令,当所述指令在计算机上运行时,使得计算机执行如权利要求1-7任一所述的方法。 A computer readable storage medium, wherein the computer readable storage medium stores computer instructions that, when executed on a computer, cause the computer to perform the method of any of claims 1-7 .
PCT/CN2017/091045 2017-03-13 2017-06-30 Terminal test method, and terminal WO2018166109A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201780047023.XA CN109564598B (en) 2017-03-13 2017-06-30 Terminal detection method and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710147619 2017-03-13
CN201710147619.9 2017-03-13

Publications (1)

Publication Number Publication Date
WO2018166109A1 true WO2018166109A1 (en) 2018-09-20

Family

ID=63521626

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/091045 WO2018166109A1 (en) 2017-03-13 2017-06-30 Terminal test method, and terminal

Country Status (2)

Country Link
CN (1) CN109564598B (en)
WO (1) WO2018166109A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110457117A (en) * 2019-07-05 2019-11-15 中国平安人寿保险股份有限公司 Data processing method, device, computer equipment and storage medium
CN112630618A (en) * 2020-11-20 2021-04-09 深圳市国微电子有限公司 Chip testing method and device
CN112636402A (en) * 2019-09-24 2021-04-09 北京小米移动软件有限公司 Charging method and device and electronic equipment
CN113344598A (en) * 2021-06-30 2021-09-03 中国电信股份有限公司 Data verification method, device, medium and electronic equipment
CN113468007A (en) * 2021-06-30 2021-10-01 完美世界(北京)软件科技发展有限公司 Equipment identification information verification method, device, equipment and storage medium
CN115437661A (en) * 2021-09-18 2022-12-06 北京车和家信息技术有限公司 Method and device for processing application configuration content
CN116341011A (en) * 2023-05-11 2023-06-27 上海芯联芯智能科技有限公司 Detection system and method

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110928730A (en) * 2019-06-25 2020-03-27 康骏阳 Verification method and verification device of intelligent terminal
CN111061701B (en) * 2019-11-27 2023-08-29 Oppo(重庆)智能科技有限公司 Information processing method, device, server and computer readable medium
CN111177669A (en) * 2019-12-11 2020-05-19 宇龙计算机通信科技(深圳)有限公司 Terminal identification method and device, terminal and storage medium
CN113572716B (en) * 2020-04-29 2023-08-08 青岛海尔洗涤电器有限公司 Equipment detection method and system
CN112910886B (en) * 2021-01-29 2024-09-24 中国电力科学研究院有限公司 A method and system for verifying the identity of a lock
CN114238929B (en) * 2021-12-20 2022-09-13 深圳市德仪电子科技有限公司 MCU chip with built-in operational amplifier and application thereof in frequency conversion system
CN114462104B (en) * 2021-12-30 2023-11-14 苏州浪潮智能科技有限公司 Client SN confirmation method and device and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500405A (en) * 2013-09-26 2014-01-08 北京奇虎科技有限公司 Method and device for identifying nominal model of target terminal
CN103606086A (en) * 2013-11-05 2014-02-26 上海优思通信科技有限公司 Anti-counterfeit method of mobile intelligent terminal
CN104966002A (en) * 2015-07-03 2015-10-07 北京数字联盟网络科技有限公司 False mobile terminal identification method and apparatus
CN105631678A (en) * 2014-10-28 2016-06-01 杭州华三通信技术有限公司 Component anti-counterfeiting method and component anti-counterfeiting device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004126765A (en) * 2002-09-30 2004-04-22 Nec Corp Portable information device, authentication method and its program
CN100515134C (en) * 2006-07-10 2009-07-15 王磊 Mobile phone software encryption and verification method
US8850543B2 (en) * 2012-12-23 2014-09-30 Mcafee, Inc. Hardware-based device authentication
CN104134020A (en) * 2013-05-03 2014-11-05 杨高赟 Intelligent terminal software anti-piracy method and intelligent terminal software anti-piracy system based on network database
CN103646044A (en) * 2013-11-19 2014-03-19 北京奇虎科技有限公司 Mobile terminal identification method and device
CN105512583A (en) * 2014-09-23 2016-04-20 深圳富泰宏精密工业有限公司 System and method for concealed photography antitheft
CN104331797B (en) * 2014-11-28 2017-09-22 山东鲁能智能技术有限公司 A kind of method of payment of the offline charging equipment based on mobile terminal
CN105391696B (en) * 2015-10-20 2019-01-25 山东泰信电子股份有限公司 Terminal registration and verification method and terminal registration and verification system
CN105391695B (en) * 2015-10-20 2018-12-14 山东泰信电子股份有限公司 A kind of terminal registration method and method of calibration

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500405A (en) * 2013-09-26 2014-01-08 北京奇虎科技有限公司 Method and device for identifying nominal model of target terminal
CN103606086A (en) * 2013-11-05 2014-02-26 上海优思通信科技有限公司 Anti-counterfeit method of mobile intelligent terminal
CN105631678A (en) * 2014-10-28 2016-06-01 杭州华三通信技术有限公司 Component anti-counterfeiting method and component anti-counterfeiting device
CN104966002A (en) * 2015-07-03 2015-10-07 北京数字联盟网络科技有限公司 False mobile terminal identification method and apparatus

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110457117A (en) * 2019-07-05 2019-11-15 中国平安人寿保险股份有限公司 Data processing method, device, computer equipment and storage medium
CN112636402A (en) * 2019-09-24 2021-04-09 北京小米移动软件有限公司 Charging method and device and electronic equipment
CN112630618A (en) * 2020-11-20 2021-04-09 深圳市国微电子有限公司 Chip testing method and device
CN113344598A (en) * 2021-06-30 2021-09-03 中国电信股份有限公司 Data verification method, device, medium and electronic equipment
CN113468007A (en) * 2021-06-30 2021-10-01 完美世界(北京)软件科技发展有限公司 Equipment identification information verification method, device, equipment and storage medium
CN113344598B (en) * 2021-06-30 2025-05-23 中国电信股份有限公司 Data verification method, device, medium and electronic equipment
CN115437661A (en) * 2021-09-18 2022-12-06 北京车和家信息技术有限公司 Method and device for processing application configuration content
CN116341011A (en) * 2023-05-11 2023-06-27 上海芯联芯智能科技有限公司 Detection system and method
CN116341011B (en) * 2023-05-11 2023-08-11 上海芯联芯智能科技有限公司 Detection system and method

Also Published As

Publication number Publication date
CN109564598B (en) 2022-04-22
CN109564598A (en) 2019-04-02

Similar Documents

Publication Publication Date Title
WO2018166109A1 (en) Terminal test method, and terminal
CN109472166B (en) Electronic signature method, device, equipment and medium
TWI713855B (en) Certificate management method and system
CN107786504B (en) ELF file release method, ELF file verification method, server and terminal
US9843569B2 (en) Method and apparatus for access credential provisioning
US8683213B2 (en) Progressive boot for a wireless device
US8589667B2 (en) Booting and configuring a subsystem securely from non-local storage
WO2020042778A1 (en) Firmware upgrade method and device
WO2017041599A1 (en) Service processing method and electronic device
US20170201378A1 (en) Electronic device and method for authenticating identification information thereof
US20170093586A1 (en) Techniques for managing certificates on a computing device
CN107154935B (en) Service request method and device
US11843947B2 (en) Electronic device and authentication method in electronic device
CN106792637B (en) International mobile equipment identification number wiring method, device and mobile terminal
CN106255102B (en) Terminal equipment identification method and related equipment
Roth et al. Airtag of the clones: Shenanigans with liberated item finders
CN103502991B (en) Equipment configuration and the determination of programming data
CN112073414A (en) Industrial Internet equipment secure access method and related device
US8621191B2 (en) Methods, apparatuses, and computer program products for providing a secure predefined boot sequence
CN114675865A (en) Method and device for upgrading over-the-air technology, storage medium and terminal equipment
KR20190108888A (en) Electronic device and certification method in electronic device
CN104679785B (en) Method and device for distinguishing software types
CN119718352A (en) Firmware security deployment method, device, equipment, medium and program product
CN117032567A (en) Port opening method and device, electronic equipment and storage medium
CN117555623A (en) Call request processing methods, devices and electronic equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17900774

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17900774

Country of ref document: EP

Kind code of ref document: A1