Movatterモバイル変換


[0]ホーム

URL:


CN113676325A - Electronic device - Google Patents

Electronic device
Download PDF

Info

Publication number
CN113676325A
CN113676325ACN202010403523.6ACN202010403523ACN113676325ACN 113676325 ACN113676325 ACN 113676325ACN 202010403523 ACN202010403523 ACN 202010403523ACN 113676325 ACN113676325 ACN 113676325A
Authority
CN
China
Prior art keywords
display screen
authentication
module
information
tddi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010403523.6A
Other languages
Chinese (zh)
Other versions
CN113676325B (en
Inventor
王洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xihua Technology Co Ltd
Original Assignee
Shenzhen Xihua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xihua Technology Co LtdfiledCriticalShenzhen Xihua Technology Co Ltd
Priority to CN202010403523.6ApriorityCriticalpatent/CN113676325B/en
Publication of CN113676325ApublicationCriticalpatent/CN113676325A/en
Application grantedgrantedCritical
Publication of CN113676325BpublicationCriticalpatent/CN113676325B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The application provides an electronic device, the electronic device includes a display screen, the display screen includes a display panel and a touch and display driver integrated TDDI chip. The TDDI chip is connected with the display panel. The display screen is a liquid crystal display screen. The TDDI chip includes: the TDDI module is used for driving the display panel to perform image display and touch sensing; the storage module is used for storing the authentication information of the display screen which is subjected to encryption processing and/or address scrambling processing; a communication interface for connecting the TDDI chip and a processing module of the electronic device; and the display screen authentication module is used for interacting the authentication information of the display screen with the processing module through the communication interface based on a specific encryption algorithm so as to verify whether the display screen is a genuine product.

Description

Electronic device
Technical Field
The present application relates to the field of information technology, and more particularly, to a TDDI chip, a display screen, an electronic device, and a method of authenticating a genuine product of a display screen.
Background
In the maintenance of the display screen of electronic equipment such as a mobile phone, a situation of using a non-genuine display screen is often encountered. The design of the display screen of the certified product can be accurately matched with other devices in the electronic equipment, and the design of the display screen is fused with system software to jointly create the optimal performance of the electronic equipment.
However, non-authentic displays may cause compatibility or performance problems. For example, installing system software that includes display screen updates may present compatibility issues after the software update is performed. If a display screen maintenance service provider uses a non-genuine display screen, the following may also occur: the problem of multi-point touch, display screen luminance and colour problem, the problem that the ambient light sensor function reduces or loses and leads to the screen to become dark unusually or brighten, and display screen colour calibration is unusual, and luminance is not unified, extra consumption battery power scheduling problem.
Therefore, how to perform the certified product authentication of the display screen to improve the performance of the electronic device is an urgent problem to be solved.
Disclosure of Invention
The application provides a TDDI chip, a display screen, electronic equipment and a display screen certified product authentication method, which can integrate a display screen authentication module in the TDDI chip to authenticate the display screen certified product.
In a first aspect, a touch and display driver integrated TDDI chip is provided for being disposed in a display screen of an electronic device, the display screen further including a display panel, the TDDI chip being connected to the display panel, the TDDI chip including:
the TDDI module is used for driving the display panel to perform image display and touch sensing;
the storage module is used for storing the authentication information of the display screen which is subjected to encryption processing and/or address scrambling processing;
a communication interface for connecting the TDDI chip and a processing module of the electronic device;
and the display screen authentication module is used for interacting the authentication information of the display screen with the processing module through the communication interface based on a specific encryption algorithm so as to verify whether the display screen is a genuine product.
In some possible implementations, the display screen authentication module is specifically configured to:
receiving a display screen authentication request sent by the processing module through the communication interface, wherein the display screen authentication request is used for requesting to acquire authentication information of the display screen;
determining whether the display screen authentication module is attacked;
and under the condition that the display screen authentication module is not attacked, interacting the authentication information of the display screen with the processing module.
In some possible implementation manners, the storage module further stores authentication record information of the display screen, which is subjected to encryption processing and/or address scrambling processing, where the authentication record information of the display screen includes history information of performing certified authentication on the display screen and/or information of currently performing certified authentication on the display screen, and the display screen authentication module is further configured to:
and determining whether the display screen authentication module is attacked or not according to the authentication record information of the display screen.
In some possible implementations, the authentication record information of the display screen includes at least one of:
the total times of the certified products authentication of the display screen, the time of the certified products authentication of the display screen and the total times of the certified products authentication of the display screen are initiated within a current period of time.
In some possible implementations, the display screen authentication module is further to:
and if the times of initiating the certified product authentication on the display screen in the current period of time are larger than a first threshold value and/or the total times of performing the certified product authentication on the display screen are larger than a second threshold value, determining that the TDDI chip is attacked.
In some possible implementation manners, the storage module includes a one-time programmable OTP unit, and a flash memory unit is further externally connected to the TDDI chip, where the flash memory unit is configured to store authentication record information of the display screen subjected to encryption processing and/or address scrambling processing and authentication information of the display screen subjected to encryption processing and/or address scrambling processing, and the OTP unit is configured to store authentication information of the display screen subjected to encryption processing and/or address scrambling processing.
In some possible implementations, the OTP unit is further configured to store a key for encrypting the authentication record information of the display screen and/or a key for address scrambling the authentication information of the display screen.
In some possible implementations, the display screen authentication module further includes at least one physical attack prevention sensor for detecting whether the TDDI chip is physically attacked.
In some possible implementations, the at least one physical attack prevention sensor includes at least one of: the sensor is used for detecting the temperature of the sensor, the temperature attack of the sensor, the voltage attack of the sensor, the burr attack of the sensor, the metal shielding sensor and the frequency detection sensor.
In some possible implementations, the display screen authentication module is further to: and determining whether the TDDI chip is attacked or not according to the detection result of the at least one physical attack prevention sensor.
In some possible implementations, the display screen authentication module is further to: and deleting the authentication information of the display screen stored in the storage module under the condition that the TDDI chip is attacked.
In some possible implementations, the authentication information of the display screen includes at least one of: the identification information of the display screen is used for a key for data interaction between the processing module and the display screen authentication module, the first certificate information of the display screen and the second certificate information of the display screen, wherein the first certificate information of the display screen is used for representing the identity of the display screen, and the second certificate information of the display screen is used for representing the binding relationship between the display screen and the electronic equipment.
In some possible implementations, the identification information of the display screen includes at least one of: supplier information of the display screen, number information of the display screen and production information of the display screen.
In some possible implementations, the TDDI chip further includes:
the power supply module is used for supplying power to the TDDI module and the display screen authentication module; and/or
And the clock module is used for providing clock signals for the TDDI module and the display screen authentication module.
In some possible implementations, the particular encryption algorithm is an asymmetric encryption algorithm.
In a second aspect, a display screen is provided, which includes a display panel and the TDDI chip as in the first aspect or its implementations.
In a third aspect, an electronic device is provided, comprising a display screen as in the second aspect.
In some possible implementations, the display screen is a liquid crystal display screen.
In a fourth aspect, a method for authenticating a genuine product of a display screen is provided, where the method is applied to a touch and display driver integrated TDDI chip in an electronic device, and the TDDI chip is configured in the display screen of the electronic device, and the method includes:
and interacting the authentication information of the display screen with a processing module of the electronic equipment through a communication interface of the TDDI chip based on a specific encryption algorithm to verify whether the display screen is a genuine product, wherein the communication interface is used for connecting the TDDI chip and the processing module of the electronic equipment.
In some possible implementations, the interacting, with the processing module of the electronic device through the communication interface of the TDDI chip, the authentication information of the display screen includes:
receiving a display screen authentication request sent by the processing module through the communication interface, wherein the display screen authentication request is used for requesting to perform genuine authentication on the display screen;
determining whether the TDDI chip is attacked;
and under the condition that the TDDI chip is not attacked, interacting the authentication information of the display screen with the processing module.
In some possible implementations, the TDDI chip further includes a storage module, where the storage module is configured to perform encryption processing and/or address scrambling processing on authentication record information of the display screen, where the authentication record information of the display screen includes history information of performing certified authentication on the display screen and/or information of currently performing certified authentication on the display screen, and the determining whether the TDDI chip is attacked includes:
and determining whether the TDDI chip is attacked or not according to the authentication record information of the display screen.
In some possible implementations, the authentication record information of the display screen includes at least one of: the total times of the certified products authentication of the display screen, the time of the certified products authentication of the display screen and the total times of the certified products authentication of the display screen are initiated within a current period of time.
In some possible implementation manners, the determining whether the TDDI chip is attacked according to the authentication record information of the display screen includes:
and if the total times of initiating the certified product authentication on the display screen within the current period of time is greater than a first threshold value and/or the total times of initiating the certified product authentication on the display screen is greater than a second threshold value, determining that the TDDI chip is attacked.
In some possible implementation manners, the storage module includes a one-time programmable OTP unit, and a flash memory unit is further externally connected to the TDDI chip, where the flash memory unit is configured to store authentication record information of the display screen subjected to encryption processing and/or address scrambling processing and authentication information of the display screen subjected to encryption processing and/or address scrambling processing, and the OTP unit is configured to store authentication information of the display screen subjected to encryption processing and/or address scrambling processing.
In some possible implementations, the OTP unit is further configured to store a key for encrypting the authentication record information of the display screen and/or a key for address scrambling the authentication information of the display screen.
In some possible implementations, the TDDI chip further includes at least one physical attack prevention sensor for detecting whether the TDDI chip is physically attacked.
In some possible implementations, the at least one physical attack prevention sensor includes at least one of: the sensor is used for detecting the temperature of the sensor, the temperature attack of the sensor, the voltage attack of the sensor, the burr attack of the sensor, the metal shielding sensor and the frequency detection sensor.
In some possible implementations, the determining whether the TDDI chip is attacked includes:
and determining whether the TDDI chip is attacked or not according to the detection result of the at least one physical attack prevention sensor.
In some possible implementations, the method further includes:
and deleting the authentication information of the display screen stored in the storage module under the condition that the TDDI chip is attacked.
In some possible implementations, the authentication information of the display screen includes at least one of: the identification information of the display screen is used for a key for data interaction between the processing module and the display screen authentication module, the first certificate information of the display screen and the second certificate information of the display screen, wherein the first certificate information of the display screen is used for representing the identity of the display screen, and the second certificate information of the display screen is used for representing the binding relationship between the display screen and the electronic equipment.
In some possible implementations, the identification information of the display screen includes at least one of: supplier information of the display screen, number information of the display screen and production information of the display screen.
In some possible implementations, the display screen further includes a display panel, and the method further includes: the TDDI chip drives the display panel to perform image display and touch sensing.
In some possible implementations, the particular encryption algorithm is an asymmetric encryption algorithm.
In a fifth aspect, a chip is provided for implementing the method of the fourth aspect or its implementation manners.
Specifically, the chip includes: a processor for calling and running the computer program from the memory so that the device on which the chip is installed performs the method of the fourth aspect or its implementations.
In a sixth aspect, a computer-readable storage medium is provided for storing a computer program, which causes a computer to execute the method of the fourth aspect or its implementations.
In a seventh aspect, a computer program product is provided, which includes computer program instructions for causing a computer to execute the method of the fourth aspect or its implementations.
In an eighth aspect, there is provided a computer program which, when run on a computer, causes the computer to perform the method of the fourth aspect or its implementations.
Based on above-mentioned technical scheme, this application is through integrateing display screen authentication function in the TDDI chip, and is further display screen authentication module passes through TDDI chip and electronic equipment's processing module have the interface with electronic equipment's processing module carries out the data interaction and verifies whether the display screen is genuine, can reduce the cost of chip to can guarantee to increase display screen authentication function's TDDI chip and traditional TDDI chip's compatibility in encapsulation and application.
Drawings
Fig. 1 is a schematic configuration diagram of an electronic apparatus to which the present application can be applied.
Fig. 2 is a schematic structural diagram of a TDDI chip according to an embodiment of the present application.
Fig. 3 is a schematic composition diagram of a memory module according to an embodiment of the present application.
Fig. 4 is a flow chart of display screen authentication according to an embodiment of the present application.
Fig. 5 is a schematic structural diagram of a display screen according to an embodiment of the present application.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Fig. 7 is a schematic diagram of an authentication method of a display screen according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
Fig. 1 is a schematic structural diagram of an embodiment of an electronic device according to the present application. Theelectronic device 100 is, for example, a portable electronic product, an intelligent home electronic product, a vehicle-mounted electronic product, and other suitable types of products, and the authorization is not limited thereto. The portable electronic product is, for example, a mobile phone, a tablet computer, a notebook computer, a wearable device, and the like. The intelligent household electronic product is, for example, a desktop computer, a refrigerator, a washing machine, a television and the like. Such as a navigator, a DVD on board, etc. Theelectronic device 100 comprises a display screen 1. The display screen 1 is used for realizing image display and touch sensing. The display screen 1 is for example, but not limited to, an In-Cell (In-Cell or In-Cell) type display screen. The display screen 1 is, for example, a liquid crystal display screen. Alternatively, the Display screen 1 may be other suitable types of screens, such as an Electronic Paper Display (EPD) screen, an Organic Light Emitting Diode (OLED) Display screen, and the like.
The Display screen 1 includes aTouch Display panel 10 and a Touch and Display Driver Integration (TDDI)chip 20. TheTDDI chip 20 is used to drive thetouch display panel 10 to perform image display and touch sensing.
Theelectronic device 100 further includes themain control chip 3. Themain control chip 3 is connected with theTDDI chip 20 in the display screen 1. Specifically, themain control chip 3 includes acommunication interface 31, theTDDI chip 20 includes acommunication interface 23, and thecommunication interface 31 is connected to thecommunication interface 23. Themain control chip 3 and theTDDI chip 10 can perform data communication through respective communication interfaces. For example, themain control chip 3 provides, for example, display data and related control signals to theTDDI chip 20, and theTDDI chip 20 drives thetouch display panel 10 to perform corresponding image display according to the signals provided by themain control chip 3.
Optionally, themain control chip 3 may be a single chip or a chip set. Themain control chip 3 may be, for example, an Application Processor (AP), a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component. A general purpose processor may be, for example, a microprocessor, or the processor may be any conventional processor or the like.
In some cases, compatibility and performance issues may arise when a non-genuine display screen 1 is used in theelectronic device 100, affecting the user experience.
In the related art, an independent security authentication chip may be added to the display screen 1 of theelectronic device 100, and whether the display screen 1 is a genuine product is determined through security authentication of the security authentication chip, but by adopting this scheme, an additional chip is required, which increases the cost and design overhead of the display screen 1, and moreover, by adopting the independent security authentication chip to perform security authentication, the risk of cracking the chip is high, and the security is low.
In view of this, the present application provides a solution, which can implement the certified product authentication function of the display screen in theTDDI chip 20 of the display screen 1, and is beneficial to reducing the cost of the display screen 1, and implement this function by using a dedicated display screen driver chip, so as to reduce the risk of being cracked and improve the security of theelectronic device 100.
Fig. 2 is a schematic structural diagram of aTDDI chip 20 according to an embodiment of the present disclosure, where theTDDI chip 20 may be, for example, theTDDI chip 20 in theelectronic device 100 of fig. 1, theTDDI chip 20 is disposed in a display screen 1 (see fig. 1), the display screen 1 further includes a display panel 10 (i.e., thetouch display panel 10 in fig. 1), and theTDDI chip 20 is connected to thedisplay panel 10. As shown in fig. 2, theTDDI chip 20 includes:
a TDDI module 21 for driving thedisplay panel 10 to perform image display and touch sensing;
thestorage module 22 is used for storing the authentication information of the display screen 1 which is subjected to encryption processing and/or address scrambling processing;
acommunication interface 23, configured to connect theTDDI chip 20 and theprocessing module 3 of the electronic device 100 (see fig. 1), corresponding to themain control chip 3 in fig. 1, and the related implementation regarding themain control chip 3 is also applicable to theprocessing module 3;
the display screen authentication module 24 is configured to interact authentication information of the display screen 1 with theprocessing module 3 through thecommunication interface 23 based on a specific encryption algorithm to verify whether the display screen 1 is a genuine product.
Specifically, the TDDI module 21 may include a display driving circuit and a touch sensing driving circuit, which are respectively used to drive the display screen 1 to perform image display and touch sensing, and for concrete implementation, reference is made to related technologies, and details are not repeated here for brevity.
In the embodiment of the present application, theTDDI chip 20 and theprocessing module 3 are communicatively connected, for example, theprocessing module 3 may interactively display or sense a control signal related to touch sensing with theTDDI chip 20 through the communicative connection, and the present application is not limited to a specific connection manner.
In one implementation, thecommunication interface 23 of theTDDI chip 20 is connected to thecommunication interface 31 of theprocessing module 3. It should be understood that the connection may be a direct connection or an indirect connection, and the present application is not limited thereto. It should also be understood that thecommunication interface 23 and thecommunication interface 31 may be physical ports that actually exist, or may also be virtual ports that are simulated, as long as the communication between theTDDI chip 20 and theprocessing module 3 can be realized, which is not limited in this application.
In a specific implementation, thecommunication interface 23 of theTDDI chip 20 may include an external communication interface and an internal communication interface. The external communication Interface is used for communication between theTDDI chip 20 and other modules in the electronic device, such as theprocessing module 3, and the external communication Interface is not limited to an Inter-Integrated Circuit (I2C) Interface, a Serial Peripheral Interface (SPI) Interface, a Universal Asynchronous Receiver/Transmitter (UART) Interface. The internal communication interface is used for communication between modules in theTDDI chip 20, such as the display screen authentication module 24 and thestorage module 22, and is not limited to, for example, an SPI-M interface.
In the embodiment of the present application, the TDDI module 21 may communicate with theprocessing module 3 of the electronic device through thecommunication interface 23, for example, the TDDI module 21 may receive a control signal related to image display of theprocessing module 3 of the electronic device through thecommunication interface 23, and further perform corresponding image display based on the control signal, or receive a control signal related to touch sensing sent by theprocessing module 3, and further perform touch sensing based on the control signal.
Further, as shown in fig. 2, theTDDI chip 20 further includes a display screen authentication module 24, and the display screen authentication module 24 may also perform data interaction with theprocessing module 3 through thecommunication interface 23 of theTDDI chip 20 to determine whether the display screen 1 is genuine.
Alternatively, thecommunication interface 23 may be an existing interface in an existing TDDI chip, such as an I2C interface or an SPI interface. The display screen authentication module 24 multiplexes the existing interface in the existing TDDI chip and theprocessing module 3 of the electronic device to perform data interaction, which is beneficial to ensuring that theTDDI chip 20 with the display screen authentication function is compatible with the traditional TDDI chip in packaging and application.
Furthermore, because theTDDI chip 20 is a dedicated driver chip for the display screen 1, for the display screen authentication performed by a newly added independent security authentication chip, theTDDI chip 20 is added with a display screen authentication function, which is equivalent to hiding the security authentication chip in theTDDI chip 20, thereby being beneficial to reducing the risks of attack and cracking and increasing the security of the electronic device.
In some embodiments of the present application, the display screen authentication module 24 may interact with theprocessing module 3 to determine whether the display screen 1 is genuine based on a specific encryption algorithm. That is to say, the data interacted between the display screen authentication module 24 and theprocessing module 3 is encrypted through a specific encryption algorithm, so that the security of data transmission is further ensured, and the accuracy of display screen authentication is further ensured.
It should be understood that, in the embodiment of the present application, other functional modules may also be added to theTDDI chip 20, and the other functional modules may also interact with theprocessing module 3 of the electronic device through thecommunication interface 23 to perform other corresponding functions, which is not limited in this application, and the authentication of the display screen by interacting with the authentication information of the display screen 1 is merely taken as an example to illustrate, but the present application is not limited in this application.
It should be understood that the specific encryption algorithm may be any encryption algorithm, and the embodiment of the present application is not limited thereto. Alternatively, the specific encryption algorithm may be, for example, an asymmetric encryption algorithm, such as but not limited to, an Elliptic Curve Cryptography (ECC) algorithm or an RAS algorithm. Of course, in other embodiments, the particular encryption algorithm may be a symmetric encryption algorithm.
For asymmetric encryption algorithms, a pair of keys is required: a public key and a private key, which can be used for encryption and decryption with each other, e.g. if the display screen authentication module 24 encrypts the authentication information of the display screen 1 with the private key, theprocessing module 3 can decrypt the data with the public key, and vice versa. The asymmetric encryption algorithm is adopted, and due to the asymmetry of the secret key, the safety of data transmission is improved.
It should be understood that in a specific implementation, each chip may correspond to a unique private key, for example, theTDDI chip 20 or the display screen 1 may correspond to a private key, and the private key of theTDDI chip 20 or the display screen 1 cannot be known by other chips. In a specific implementation, theTDDI chip 20 is integrated in the display screen 1, and cannot be separated from the physical package or the electrical driving, so that the validity of theTDDI chip 20 is authenticated, i.e. the validity of the display screen 1 is authenticated, in other words, theTDDI chip 20 is an authentic product and the display screen 1 is an authentic product.
Optionally, in some embodiments, the authentication information of the display screen 1 is, for example and without limitation, at least one of the following:
identification information of the display screen 1;
a key for data interaction between theprocessing module 3 and the display screen authentication module 24, such as but not limited to a public key for data interaction;
the first certificate information of the display screen 1, wherein the first certificate information of the display screen 1 is used for representing the identity of the display screen 1. Alternatively, the first Certificate information may be issued by a Certificate Authority (CA);
second certificate information of the display screen 1, where the second certificate information is used to represent a binding relationship between the display screen 1 and theelectronic device 100. That is, it may be determined whether theelectronic device 100 installed on the display screen 1 is a bound electronic device, or whether the display screen 1 installed on theelectronic device 100 is a bound display screen 1, according to the second certificate information.
Alternatively, the second certificate information may be generated according to a unique identifier (e.g., ID) of the display screen 1 and a unique identifier (e.g., ID) of theelectronic device 100. As an example, the hash operation may be performed according to the ID of the display screen 1 and the ID of theelectronic device 100, and then the hash operation is encrypted by using a private key of the display screen 1, which is not limited in this application.
Optionally, in some embodiments, the identification information of the display screen 1 includes, for example and without limitation, at least one of:
the vendor information of the display screen 1. Information such as the name, address, etc. of the supplier;
the number information of the display screen 1. For example, the product customization number of the display screen 1;
production information of the display screen 1. For example, the date of manufacture of the display screen 1, the number of batches of manufacture, etc.
It should be understood that the authentication information of the display screen 1 is merely an example, and of course, in other embodiments, the authentication information of the display screen 1 may also include other information, or may also be a combination of other information and some or all of the above information, and the like, and the present application is not limited thereto.
Optionally, the display screen authentication module 24 may include an algorithm module, configured to perform data interaction with theprocessing module 3 based on the above specific encryption algorithm to determine whether the display screen 1 is genuine.
Optionally, when the specific encryption algorithm is an ECC algorithm, the algorithm module may be an ECC algorithm module 241, and with reference to fig. 3, taking the specific encryption algorithm as the ECC algorithm as an example, a process of performing interaction between theprocessing module 3 and the ECC algorithm module 241 to authenticate the display screen 1 is described, but the application is not limited thereto.
The ECC algorithm module 241 first selects an elliptic curve, selects a point on the elliptic curve as a base point G, selects a large number Ak as a public key, and generates a private key Ak, for example, Ak being AkG.
S1, the ECC algorithm module 241 receives, through thecommunication interface 23, the display screen authentication request sent by theprocessing module 3, where the display screen authentication request is used to request to obtain authentication information of the display screen 1.
S2, the ECC algorithm module 241 replies the authentication information of the display screen 1 to theprocessing module 3. For example, the authentication information of the display screen 1 may include an Identification (ID) of the display screen 1, a public key Ak for data interaction, a first certificate S of the display screen 1, and the like.
S3, theprocessing module 3 verifies whether the first certificate S of the display screen is legal according to the public key Ak and the ID of the display screen. Specifically, the method may include the following steps S4 to S9.
S4, theprocessing module 3 generates a random message r, and determines C according to the random message r and the base point G. For example, C — r.G, where r.G represents a factorial of r G.
S5, theprocessing module 3 sends a display screen authentication command to the ECC algorithm module 241, where the display screen authentication command includes C.
S6, the ECC algorithm module 241 determines R according to the private key ak and the received C in the display screen authentication command. For example, R ═ ak ═ C.
S7, the ECC algorithm module 241 sends the R to theprocessing module 3.
S8, theprocessing module 3 determines R' according to the random message R and the public key Ak, for example, R ═ Ak;
s9, theprocessing module 3 checks the certificate S of the display screen 1 according to whether the determined R' is equal to R sent by the display screen authentication module 24.
It should be understood that the display screen authentication process illustrated in fig. 3 is only an example, and may also be adjusted according to a specific algorithm, for example, some steps are omitted, some steps are added, or a calculation manner of data is modified, and the application is not limited thereto.
Optionally, if R 'and R are not equal, it is determined that the authentication information of the display screen 1 has been tampered, and it is further determined that the display screen 1 may be an unauthorized product, or, if R' and R are equal, it is determined that the authentication information of the display screen 1 has not been tampered, in other words, the authentication information of the display screen 1 is actually sent by the display screen 1. Further, theprocessing module 3 determines whether the display screen 1 is a genuine product according to the identification information of the display screen 1 in the authentication information of the display screen 1. For example, theprocessing module 3 may determine whether the display screen 1 is a genuine product according to whether the identification information of the display screen 1 is in an identification information base of a genuine product display screen. For example, if the identification information of the display screen 1 is in the identification information base of the genuine product display screen, it is determined that the display screen 1 is the genuine product, otherwise, it is determined that the display screen 1 is not the genuine product. Optionally, the identification information base of the genuine product display screen may be obtained from a third party server (e.g., a supplier database), or may be pre-stored in thestorage module 22 of the electronic device, and the application is not limited thereto.
In the case that the display screen 1 is not genuine, further, theprocessing module 3 may also prompt the user that the display screen 1 is not genuine, and a specific prompting manner is not limited, for example, but not limited to, a light-on prompt, a voice prompt, or a subtitle display.
In the embodiment of the present application, the authentication information of the display screen 1 is stored in thestorage module 22, and the authentication information of the display screen 1 stored in thestorage module 22 is encrypted and/or scrambled by an address. It can be understood that the data after encryption processing needs a key to analyze the data, the data after address scrambling processing is stored in thestorage module 22 out of order, and the data processing method can further ensure the security of data storage, so that the data in theTDDI chip 20 is not easily exposed even when theTDDI chip 20 is attacked.
Optionally, thestorage module 22 is implemented by using existing storage resources in an existing TDDI chip, but in an actual product, the existing TDDI chip is often configured with only a single or a small number of times of programming memories, such as a One Time Programmable (OTP) unit, that is, the existing TDDI chip cannot support multiple times of repeated programming of data, in other words, data on the OTP unit cannot be repeatedly modified.
Further, in the embodiment of the present application, as shown in fig. 4, thestorage module 22 includes anOTP unit 221 and aflash unit 222, where theOTP unit 221 is configured to store data that does not need to be rewritten or rewritten for multiple times, and theflash unit 222 is configured to store data that needs to be rewritten for multiple times, so that secure storage of data can be achieved through the data irreversible function of theOTP unit 221, and multiple burning of data can be achieved through theflash unit 222.
Optionally, theflash memory unit 222 may be any memory unit that can perform data writing for multiple times, such as but not limited to flash. In a specific implementation, theflash memory unit 222 may be a plug-in flash of theTDDI chip 20, and may be better compatible with an existing TDDI chip.
Optionally, in some embodiments, theOTP unit 221 may be configured to store one or more of the authentication information of the display screen 1 that is subjected to the encryption process and/or the address scrambling process, a key for encrypting the authentication information of the display screen 1, a key for performing the address scrambling process on the authentication information of the display screen 1, and the like.
Theflash memory unit 222 may be used to store data that needs to be rewritten many times, and of course, may also be used to store authentication information of the display screen 1. The authentication information of the display screen 1 stored in theflash memory unit 222 may also be subjected to encryption processing and/or address scrambling processing. By encrypting and/or scrambling the data in theflash memory unit 222, the secure storage capable of being repeatedly programmed can be realized.
Optionally, a key for performing encryption processing and/or address scrambling processing on the authentication information of the display screen 1 is stored in theOTP unit 221, so as to ensure the storage security of the key. Optionally, in some embodiments, the key may be an IP key (denoted as IP _ key). Optionally, the IP _ key may be generated by the secure server when the chip is personalized, so as to ensure that the IP _ key of each chip is different. As an implementation, the IP key may be generated by multiplying ID information of the chip and a set of random numbers generated by the security server. For example, the display screen authentication module 24 may include a data processing unit for performing encryption and decryption processing on data and scrambling processing on a storage address of the data. In some implementations, the data processing unit may obtain a key for data encryption and a key for address scrambling from theOTP unit 221, then perform encryption processing and address scrambling processing on the authentication information of the display screen 1 according to the above keys, and further store the processed authentication information of the display screen 1 in theflash memory unit 222, so as to ensure the security of data storage.
It should be understood that, in the embodiment of the present application, the key for encrypting the authentication information of the display screen 1 and the key for performing the address scrambling process on the authentication information of the display screen 1 may be the same key or different keys, which is not limited in this application. For example, the key for encrypting the authentication information of the display screen 1 may be a private key of theTDDI chip 20, and the key for performing address scrambling processing on the authentication information of the display screen 1 may be an IP key of theTDDI chip 20, or the like
Optionally, in this embodiment of the present application, a key for encrypting data and a key for performing address scrambling processing on data may also be stored in theOTP unit 221 by way of encryption and/or address scrambling processing. For example, the root key (or the initial key) of theTDDI chip 20 may be used, or the private information of theTDDI chip 20 may be used to encrypt and/or scramble the address of the key, and further stored in theOTP unit 221, so as to further ensure the security of data storage. In some implementations, the private information of theTDDI chip 20 may be private identity information generated by a physically unclonable function module (PUF module) and used to uniquely identify theTDDI chip 20, or may also be other private information capable of uniquely identifying the chip, which is not limited in this application.
Optionally, in some embodiments of the present application, the display screen authentication module 24 may, under the condition that the display screen authentication request of theprocessing module 3 is received, first determine whether the display screen authentication module 24 is attacked, and further interact with theprocessing module 3 to the authentication information of the display screen under the condition that the display screen authentication module 24 is not attacked, so as to ensure security of data interaction. Optionally, in the case that the display screen authentication module 24 is attacked, the display screen authentication module 24 may adopt corresponding measures to protect data security, for example, chip self-destruction, or delete confidential data, such as, but not limited to, authentication information of the display screen that is subjected to encryption processing and/or address scrambling processing.
Optionally, in other embodiments, the display screen authentication module 24 may further determine whether the life cycle of theTDDI chip 20 is reached under the condition that the display screen authentication module 24 is not attacked, and interact with theprocessing module 3 to interact with the authentication information of the display screen under the condition that the life cycle of theTDDI chip 20 is not reached, so as to ensure security of data interaction.
Or, in other embodiments, the display screen authentication module 24 may also first determine whether the life cycle of theTDDI chip 20 is reached, further determine whether the display screen authentication module 24 is attacked under the condition that the life cycle of theTDDI chip 20 is not reached, and interact with theprocessing module 3 to interact with the authentication information of the display screen under the condition that the display screen authentication module 24 is not attacked, so as to ensure the security of data interaction.
There are a variety of attack approaches to the chip, with error injection attacks being the most effective. The purpose of the fault injection attack is to force the chip to perform an abnormal operation, thereby exposing the security information (e.g., the authentication information of the display screen) in the chip. At this time, an attacker can easily acquire confidential data in the chip by using a failure analysis technique. The attack of the error injection can be performed in various ways, such as voltage attack, temperature attack, laser attack, electromagnetic attack, glitch attack, clock attack, and the like.
It should be understood that the present application is not limited to the manner of determining whether the display screen authentication module 24 is attacked or not. Whether the display screen authentication module 24 is attacked can be determined, for example, from data in thestorage module 22 or from auxiliary sensors.
In some embodiments of the present application, the display screen authentication module 24 may determine whether the display screen authentication module 24 is attacked according to the reference data in thestorage module 22. Such as but not limited to authentication log information of the display screen 1. The authentication record information of the display screen 1 is used for indicating the relevant information for performing the genuine authentication on the display screen 1. Optionally, in some embodiments, the authentication record information of the display screen 1 may include history information of performing genuine authentication on the display screen 1 and/or information of currently performing genuine authentication on the display screen 1.
Optionally, the historical information of performing the genuine product authentication on the display screen 1 includes, for example, at least one of the total number of times of performing the genuine product authentication on the display screen 1 and the time of performing the genuine product authentication on the display screen 1. The information of currently executing the certified authentication for the display screen 1 is, for example, but not limited to, the total number of times of initiating the certified authentication for the display screen within a current period of time. Optionally, in some embodiments, the total number of times of initiating the genuine authentication on the display screen in the current period of time may be counted by the number of times of receiving the display screen authentication request sent by theprocessing module 3.
Optionally, the authentication record information of the display screen 1 may also be stored in thestorage module 22 after being encrypted and/or scrambled. Further, since the authentication record information of the display screen 1 is data that needs to be modified a plurality of times, it is preferable that the authentication record information of the display screen 1 that is subjected to the encryption process and/or the address scrambling process is stored in theflash memory unit 222.
Optionally, in some embodiments, the authentication record information of the display screen 1 may be counted by a counter, and the count value of the counter is further encrypted and/or address scrambled and then stored in thestorage module 22. When the display screen authentication module 24 is attacked, the count value is decrypted and/or descrambled to cause an abnormality, and further an alarm can be triggered, so that an attack alarm function is realized.
Optionally, the display screen authentication module 24 may determine whether the display screen authentication module 24 is attacked by performing Cyclic Redundancy Check (CRC) on the authentication record information of the display screen 1. For example, if the verification of the authentication record information of the display screen 1 fails, it is determined that the display screen authentication module 24 is attacked, or if the verification of the authentication record information of the display screen 1 succeeds, it may further be determined whether the display screen authentication module 24 is attacked according to whether the authentication record information of the display screen 1 is within a reasonable range. For example, if the number of times of initiating the certified authentication on the display screen 1 in the current period of time is greater than a first threshold, and/or the total number of times of performing the certified authentication on the display screen 1 is greater than a second threshold, it is determined that the display screen authentication module 24 is attacked.
Optionally, the first threshold and the second threshold may be determined according to specific requirements and user settings. By way of example and not limitation, the first threshold may be 1000 and the second threshold may be 10000.
To sum up, after receiving the display screen authentication request from theprocessing module 3, the display screen authentication module 24 may obtain the encrypted authentication record information of the display screen 1 from theflash memory unit 222, further decrypt the authentication record information into plaintext data, then verify information contents such as the total number of times of authentication performed on the display screen 1 in the plaintext data (for example, perform CRC value verification on the total number of times, determine whether the total number of times is reasonable, and the like), and determine whether theTDDI chip 20 is attacked according to a verification result.
Further, after the display screen authentication module 24 performs the display screen authentication, it may further perform an addition operation on the total number of times, perform encryption processing and/or address scrambling processing on the added total number of times, and further write the total number of times into theflash memory unit 222.
In other embodiments of the present application, as shown in fig. 2, the display screen authentication module 24 further includes at least one physical attack prevention sensor 242, where the at least one physical attack prevention sensor 242 is configured to detect whether the display screen authentication module 24 is attacked by a fault injection, such as a temperature attack, a voltage attack, a glitch attack, a light attack, a clock attack, and the like. The display screen authentication module 24 determines whether the display screen authentication module 24 is attacked or not according to the detection result of the at least one physical attack prevention sensor 242.
Optionally, after the at least one physical attack prevention sensor 242 detects an attack, an alarm signal may be sent to the display screen authentication module 24, and the display screen authentication module 24 may take corresponding measures to protect data security, for example, self-destruction of a chip, or deletion of confidential data.
Optionally, the at least one physical attack prevention sensor 242 includes, for example and without limitation, at least one of: the sensor comprises a metal shielding sensor, a light attack prevention sensor, a temperature attack prevention sensor, a voltage attack prevention sensor, a burr attack prevention sensor and a frequency detection sensor.
The metal shielding sensor is used for preventing attacks of modifying circuit physical connection through chip uncovering, and the frequency detection sensor is used for preventing clock attacks.
Taking voltage attack as an example, the power supply voltage of the power domain of theTDDI chip 20 is changed, so that the circuit inside the chip is abnormal, and theTDDI chip 20 is triggered to enter an error state, so that the processing module (such as the TDDI module 21 or the display screen authentication module 24) in theTDDI chip 20 skips or executes an error operation, so that the confidential data in theTDDI chip 20 is exposed.
Optionally, when the voltage attack prevention sensor detects that the reference voltage of the power domain of theTDDI chip 20 is abnormal, for example, exceeds a certain threshold, the voltage attack prevention sensor may output an alarm signal to the display screen authentication module 24, and the display screen authentication module 24 may take corresponding measures to protect the security of data, for example, self-destruction of the chip, or deletion of confidential data, and the like.
It should be understood that, in the embodiment of the present application, the at least one physical attack prevention sensor 242 may be kept in an on state during the authentication operation performed by the display screen authentication module 24, so as to ensure that the data in thestorage module 22 is in a safe environment and prevent the data from being attacked.
In some embodiments of the present application, as shown in fig. 2, theTDDI chip 20 further includes:
a power module 25 for supplying power to the TDDI module 21 and the display screen authentication module 24; and/or
Aclock module 26, configured to provide a clock signal to the TDDI module 21 and the display screen authentication module 24.
Optionally, the power module 25 and theclock module 26 may be existing power modules and clock modules in existing TDDI chips, so that corresponding power modules and clock modules do not need to be added to the display screen authentication module 24, which is beneficial to reducing chip cost.
In summary, theTDDI chip 20 of the embodiment of the present application may have the following beneficial effects:
first, by integrating the display screen authentication module 24 into theTDDI chip 20, the security is higher and the attack resistance is stronger than that of separately providing an additional security authentication chip.
Secondly, the display screen authentication module 24 can reuse the existing communication interface, power supply, clock, and storage resource in the existingTDDI chip 20, so that it is not necessary to additionally add an independent communication interface, power supply, clock, and storage resource, which is beneficial to reducing the cost of the TDDI chip, and is compatible with the conventional TDDI chip in chip packaging and application.
Thirdly, the data can be securely stored and the attack prevention function can be realized by encrypting and/or scrambling the data in an address scrambling manner and matching the existingOTP unit 221 and the plug-inflash memory unit 222 in theTDDI chip 20.
Fourthly, by embedding the physical attack prevention sensor 242 in theTDDI chip 20, external physical attacks can be effectively prevented, and the security of data storage and data interaction can be ensured.
As shown in fig. 5, the display screen 50 may include a display panel 51 and a TDDI chip 52, where the display panel 51 is thedisplay panel 10 or thetouch display panel 10 in the foregoing embodiment, and the TDDI chip 52 may be theTDDI chip 20 in the foregoing embodiment, and specific implementation refers to relevant descriptions in the foregoing embodiment, and is not described herein again.
As shown in fig. 6, the electronic device 60 may include a display screen 61 and a processing module 62, where the display screen 61 is the display screen 50 in the foregoing embodiment, and the processing module 62 may be theprocessing module 3 or themain control chip 3 in the foregoing embodiment, and specific implementation refers to relevant descriptions in the foregoing embodiment, and is not described herein again.
The device embodiment of the present application is described in detail above with reference to fig. 2 to 6, and the method embodiment according to the embodiment of the present application is described below with reference to fig. 7, and technical features described in the device embodiment are applicable to the following method embodiment, and are not described again here for brevity.
Fig. 7 is a schematic flowchart of an authentication method of a display screen according to an embodiment of the present application, where theauthentication method 70 may be performed by a TDDI chip in an electronic device, the TDDI chip being disposed in the display screen, and the display screen further including a display panel. Optionally, the TDDI chip may be theTDDI chip 20 in the foregoing embodiment, as shown in fig. 7, theauthentication method 70 includes at least part of the following:
s71, interacting the authentication information of the display screen with the processing module of the electronic device through the communication interface of the TDDI chip based on a specific encryption algorithm to verify whether the display screen is genuine, wherein the communication interface is used for connecting the TDDI chip and the processing module of the electronic device.
Optionally, in some embodiments of the present application, the interacting, with the processing module of the electronic device through the communication interface of the TDDI chip, the authentication information of the display screen includes:
receiving a display screen authentication request sent by the processing module through the communication interface, wherein the display screen authentication request is used for requesting to perform genuine authentication on the display screen;
determining whether the TDDI chip is attacked;
and under the condition that the TDDI chip is not attacked, interacting the authentication information of the display screen with the processing module.
Optionally, in some embodiments of the present application, the TDDI chip further includes a storage module, where the storage module is configured to perform encryption processing and/or address scrambling processing on authentication record information of the display screen, where the authentication record information of the display screen includes history information of performing certified authentication on the display screen and/or information of currently performing certified authentication on the display screen, and the determining whether the TDDI chip is attacked includes:
and determining whether the TDDI chip is attacked or not according to the authentication record information of the display screen.
Optionally, in some embodiments of the present application, the authentication record information of the display screen includes at least one of the following:
the total times of the certified products authentication of the display screen, the time of the certified products authentication of the display screen and the total times of the certified products authentication of the display screen are initiated within a current period of time.
Optionally, in some embodiments of the present application, the determining whether the TDDI chip is attacked according to the authentication record information of the display screen includes:
and if the total times of initiating the certified product authentication on the display screen within the current period of time is greater than a first threshold value and/or the total times of initiating the certified product authentication on the display screen is greater than a second threshold value, determining that the TDDI chip is attacked.
Optionally, in some embodiments of the present application, the storage module includes a one-time programming OTP unit, and a flash memory unit is further connected to the TDDI chip externally, where the flash memory unit is configured to store the authentication record information of the display screen subjected to encryption processing and/or address scrambling processing and the authentication information of the display screen subjected to encryption processing and/or address scrambling processing, and the OTP unit is configured to store the authentication information of the display screen subjected to encryption processing and/or address scrambling processing.
Optionally, in some embodiments of the present application, the OTP unit is further configured to store a key for encrypting the authentication record information of the display screen and/or a key for address scrambling the authentication information of the display screen.
Optionally, in some embodiments of the present application, the TDDI chip further includes at least one physical attack prevention sensor for detecting whether the TDDI chip is physically attacked.
Optionally, in some embodiments of the present application, the at least one physical attack prevention sensor includes at least one of:
the sensor is used for detecting the temperature of the sensor, the temperature attack of the sensor, the voltage attack of the sensor, the burr attack of the sensor, the metal shielding sensor and the frequency detection sensor.
Optionally, in some embodiments of the present application, the determining whether the TDDI chip is attacked includes:
and determining whether the TDDI chip is attacked or not according to the detection result of the at least one physical attack prevention sensor.
Optionally, in some embodiments of the present application, themethod 70 further includes:
and deleting the authentication information of the display screen stored in the storage module under the condition that the TDDI chip is attacked.
Optionally, in some embodiments of the present application, the authentication information of the display screen includes at least one of: the identification information of the display screen is used for a key for data interaction between the processing module and the display screen authentication module, the first certificate information of the display screen and the second certificate information of the display screen, wherein the first certificate information of the display screen is used for representing the identity of the display screen, and the second certificate information of the display screen is used for representing the binding relationship between the display screen and the electronic equipment.
Optionally, in some embodiments of the present application, the identification information of the display screen includes at least one of:
supplier information of the display screen, number information of the display screen and production information of the display screen.
Optionally, in some embodiments of the present application, the display screen further includes a display panel, and the method further includes: the TDDI chip drives the display panel to perform image display and touch sensing.
Optionally, in some embodiments of the present application, the specific encryption algorithm is an asymmetric encryption algorithm.
The embodiment of the application also provides a computer readable storage medium for storing the computer program. The computer-readable storage medium can be applied to the apparatus in the embodiment of the present application, and the computer program enables a computer to execute corresponding processes implemented by the TDDI chip in the methods in the embodiment of the present application, which are not described again for brevity.
Embodiments of the present application also provide a computer program product comprising computer program instructions. The computer program product can be applied to the apparatus in the embodiment of the present application, and the computer program instructions enable the computer to execute the corresponding processes implemented by the TDDI chip in the methods in the embodiment of the present application, which are not described herein again for brevity.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the embodiments of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the elements can be selected according to actual needs to achieve the purpose of the embodiments of the present application.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
If implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or make a contribution to the prior art, or may be implemented in the form of a software product stored in a storage medium and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
The above description is only a specific implementation of the embodiments of the present application, but the scope of the embodiments of the present application is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the embodiments of the present application, and all the changes or substitutions should be covered by the scope of the embodiments of the present application. Therefore, the protection scope of the embodiments of the present application shall be subject to the protection scope of the claims.

Claims (15)

CN202010403523.6A2020-05-132020-05-13Electronic equipmentActiveCN113676325B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010403523.6ACN113676325B (en)2020-05-132020-05-13Electronic equipment

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010403523.6ACN113676325B (en)2020-05-132020-05-13Electronic equipment

Publications (2)

Publication NumberPublication Date
CN113676325Atrue CN113676325A (en)2021-11-19
CN113676325B CN113676325B (en)2023-12-01

Family

ID=78536977

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010403523.6AActiveCN113676325B (en)2020-05-132020-05-13Electronic equipment

Country Status (1)

CountryLink
CN (1)CN113676325B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102542695A (en)*2012-02-292012-07-04浪潮电子信息产业股份有限公司Tax control liquid crystal USB (universal serial bus) flash disk with functions of identity authentication and fingerprint identification
CN106709537A (en)*2016-11-142017-05-24珠海晶通科技有限公司Dynamic information anti-counterfeiting system with electronic ink technology and anti-counterfeiting method thereof
CN107992736A (en)*2017-11-302018-05-04北京集创北方科技股份有限公司Electronic equipment, display system and its integrated control device, authentication method
CN108082723A (en)*2017-12-122018-05-29华东交通大学A kind of anti-fake bottle lid and its method of work based on CPU crypto chips
CN109117611A (en)*2017-06-222019-01-01杭州沃朴物联科技有限公司A kind of embedded antifalsification label based on dynamic strip-shaped code

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102542695A (en)*2012-02-292012-07-04浪潮电子信息产业股份有限公司Tax control liquid crystal USB (universal serial bus) flash disk with functions of identity authentication and fingerprint identification
CN106709537A (en)*2016-11-142017-05-24珠海晶通科技有限公司Dynamic information anti-counterfeiting system with electronic ink technology and anti-counterfeiting method thereof
CN109117611A (en)*2017-06-222019-01-01杭州沃朴物联科技有限公司A kind of embedded antifalsification label based on dynamic strip-shaped code
CN107992736A (en)*2017-11-302018-05-04北京集创北方科技股份有限公司Electronic equipment, display system and its integrated control device, authentication method
CN108082723A (en)*2017-12-122018-05-29华东交通大学A kind of anti-fake bottle lid and its method of work based on CPU crypto chips

Also Published As

Publication numberPublication date
CN113676325B (en)2023-12-01

Similar Documents

PublicationPublication DateTitle
CN110677418B (en)Trusted voiceprint authentication method and device, electronic equipment and storage medium
US9344275B2 (en)System, device, and method of secure entry and handling of passwords
JP6509197B2 (en) Generating working security key based on security parameters
CN108259497B (en)System and method for fuel dispenser security
EP3700243A1 (en)Security data processing device
US9580295B2 (en)Systems and methods for fuel dispenser security
JP2018500823A (en) Device key protection
JP6387908B2 (en) Authentication system
US9139414B2 (en)Systems and methods for fuel dispenser security
CN103971034A (en)Method and device for protecting Java software
CN114117376A (en)Identity authentication method, method for distributing dynamic password and corresponding equipment
CN113508380B (en) Methods used for end-entity authentication
CN113676326B (en)TDDI chip
EP4058921B1 (en)Device and method for secure communication
CN113676325B (en)Electronic equipment
CN113676327B (en)Genuine product authentication method for display screen, chip and computer readable storage medium
CN113676324B (en)Display screen of electronic equipment and electronic equipment
CN107292172B (en)Method for automatically verifying a target computer file with respect to a reference computer file
CN120188160A (en) Secure configuration of programmable devices
HK40021036A (en)Data encryption and decryption method, device, system, and storage medium
HK40021036B (en)Data encryption and decryption method, device, system, and storage medium
CN119788322A (en) A method and system for downloading secure chip firmware
CN118886028A (en) Data processing method, system, terminal and storage medium for sharing files
JP2016072747A (en)Data provision device, data introduction receiving device, data transmission/reception system, portable recording medium, data provision method, data introduction receiving method, data transmission/reception method, data provision program, and data introduction receiving program
ParisienSecurity by Design

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp