CN104506515A - Firmware protection method and firmware protection device - Google Patents
Firmware protection method and firmware protection device Download PDFInfo
- Publication number
- CN104506515A CN104506515A CN201410789754.XA CN201410789754A CN104506515A CN 104506515 A CN104506515 A CN 104506515A CN 201410789754 A CN201410789754 A CN 201410789754A CN 104506515 A CN104506515 A CN 104506515A
- Authority
- CN
- China
- Prior art keywords
- firmware
- hash value
- digital signature
- module
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000012795 verification Methods 0.000 claims description 25
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 206010033799 Paralysis Diseases 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000001680 brushing effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the field of network equipment safety and discloses a firmware protection method and a firmware protection device. The firmware protection method comprises the following steps: carrying out Hash on firmware through a Hash algorithm to obtain a Hash value of the firmware; encrypting the Hash value of the firmware by using a private key of an asymmetric encryption algorithm to obtain a digital signature of the firmware; sending the firmware and the digital signature to software of a router; carrying out Hash on the firmware by the Hash algorithm to obtain the Hash value of the firmware; decrypting the digital signature by using a public key of the asymmetric encryption algorithm to obtain an decrypted Hash value; comparing the Hash value of the firmware and the decrypted Hash value, wherein if the Hash value of the firmware is equal to the decrypted Hash value, the updating of the router can be finished. According to the firmware protection method and the firmware protection device, the firmware can be subjected to digital signature so as to ensure the origination safety and the data integrity of the firmware, and meanwhile, data are protected from faking.
Description
Technical Field
The invention relates to the field of network equipment safety, in particular to a firmware protection method.
Background
In recent years, computer networks are rapidly popularized, and the network era is formally coming, so that not only one family needs to install the networks, but also wireless networks are laid in public places including cinemas, buses, large markets and the like. Therefore, routers for network interconnection are very important. In order to prevent the router software of local upgrade or local flashing from being replaced by software constructed by others and finish some illegal operations, such as attacking a server, illegally collecting user information, redirecting a URL (uniform resource locator) of a user and the like, a router manufacturer encrypts firmware in a digital signature mode and prevents the firmware from being intercepted and forged in midway. At present, the main technical solutions for manufacturers to perform digital signatures are:
1. encrypting the firmware by adopting a special format;
2. a hash or other verification algorithm is adopted;
3. a symmetric encryption algorithm, e.g., AES algorithm, encryption,
the firmware is encrypted by using the methods, although the safety of the firmware is ensured to a certain extent, the methods are easy to crack, once the firmware is cracked, the source of the firmware cannot be authenticated, and whether the firmware changes or not cannot be verified and tampered by people, so that the local upgrade or local flashing of the firmware has great network safety problems and even causes network paralysis.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a firmware protection method to solve the problem that a router cannot authenticate and verify whether the source of the firmware changes or not when other people tamper the firmware.
In order to solve the above problems, the present invention provides a firmware protection method, which includes the steps of:
s1, digitally signing the firmware;
and S2, verifying the digital signature.
Preferably, the step S1 includes the steps of:
s101, hashing the firmware through a hashing algorithm to obtain a hash value of the firmware;
s102, encrypting the hash value by using a private key of an asymmetric encryption algorithm to obtain the digital signature;
s103, storing the digital signature in the firmware.
Preferably, the step S2 includes the steps of:
s201, hashing the firmware through the hashing algorithm to obtain a hash value of the firmware;
s202, decrypting the digital signature by using a public key of an asymmetric encryption algorithm to obtain a decrypted hash value;
s203, comparing the hash value of the firmware with the decrypted hash value, and judging the authenticity of the firmware.
Preferably, the step S1 is completed at the server side, and the digital signature and the firmware are sent and saved to the router software; said step S2 is done in said router software.
Preferably, in step S203, if the hash value of the firmware is equal to the decrypted hash value, the digital signature verification passes, and the firmware is upgraded; and if the hash value of the firmware is not equal to the decrypted hash value, the digital signature verification fails, and the firmware is discarded.
In order to achieve the above object, according to another aspect of the present invention, there is provided a firmware protection device including:
the digital signature device is used for digitally signing the firmware;
verification means for verifying a digital signature of the firmware;
preferably, the digital signature apparatus includes:
the first hash module is used for hashing the firmware to obtain a hash value of the firmware;
the encryption module is used for encrypting the hash value by using a private key of an asymmetric encryption algorithm to obtain the digital signature;
a storage module for storing the digital signature in the firmware.
Preferably, the authentication device includes:
the second hash module is used for hashing the firmware to obtain a hash value of the firmware;
the decryption module is used for decrypting the digital signature by using a public key of an asymmetric encryption algorithm to obtain a decrypted hash value;
and the judging module is used for comparing the hash value of the firmware with the decrypted hash value and judging the authenticity of the firmware.
Preferably, the digital signature device runs on a server side, and sends and stores the digital signature and the firmware into the router software; the verification device runs at the router software end.
Preferably, the judging module judges the authenticity of the firmware, and if the hash value of the firmware is equal to the decrypted hash value, the digital signature passes verification and the firmware is upgraded; and if not, the digital signature verification fails, and the firmware is discarded.
Drawings
FIG. 1 is a flow chart illustrating a firmware protection method according to a preferred embodiment of the present invention;
FIG. 2 is a flow chart illustrating digital signing of firmware in a preferred embodiment of the present invention;
FIG. 3 is a flow chart illustrating the verification of a digital signature in a preferred embodiment of the present invention;
FIG. 4 is a flow chart illustrating a firmware upgrade of a router according to a preferred embodiment of the present invention;
fig. 5 is a block diagram of a firmware protection device in a preferred embodiment of the present invention.
Detailed Description
The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby. The description which follows is a preferred embodiment of the invention, however, the description is for the purpose of illustrating the general principles of the invention and is not intended to limit the scope of the invention. The scope of the present invention is defined by the appended claims.
Referring to fig. 1, an embodiment of the present invention provides a firmware protection method, including:
s1, digitally signing the firmware;
and S2, verifying the digital signature.
In the invention, the digital signature is carried out on the firmware through the Hash algorithm and the asymmetric encryption algorithm, so that the router software can verify the digital signature after receiving the digital signature, thereby determining whether the firmware source changes, protecting the firmware data, preventing other people from forging the firmware and brushing the router software, and ensuring the network security.
In this embodiment, the hash algorithm adopts a secure hash algorithm SHA, which is an algorithm for abstracting input information, and this algorithm can ensure that the abstractions generated by different input information are different;The asymmetric encryption algorithm adopts a public key encryption algorithm RSA, which can ensure that the information encrypted by the RSA cannot be decrypted as long as the secret key is long enough, and in the embodiment, the length of the RSA secret key is 2048 bits.
Further, referring to fig. 2, step S1 includes the steps of:
s101, hashing the firmware through SHA1 to obtain a hash value of the firmware;
s102, encrypting the hash value of the firmware by using an RSA private key to obtain a digital signature;
s103, storing the digital signature in firmware;
step S1 is completed at the server side; and sending the digital signature and the firmware obtained in the step S103 to router software and storing the digital signature and the firmware.
Further, referring to fig. 3, the step S2 includes the steps of:
s201, hashing the firmware through SHA1 to obtain a hash value of the firmware;
s202, decrypting the digital signature by using a public key of RSA to obtain a decrypted hash value;
s203, comparing the hash value of the firmware with the decrypted hash value, and judging the authenticity of the firmware;
step S2 is completed in the router; the method for judging the authenticity of the firmware in the step S203 comprises the following steps: comparing the hash values obtained in the step S201 and the step S202, if the hash values are equal, the digital signature passes verification, and upgrading the router; if the verification result is not equal to the verification result, the digital signature verification fails, the firmware source is wrong or the data is incomplete, the firmware and the digital signature stored in the router software are discarded, and a message is sent to the server side to request the firmware to be sent again.
In the invention, the step S1 and the step S2 realize the requirements of digitally signing and verifying the firmware, and the safety of the firmware source and the integrity of data can be verified due to the irreversibility of SHA and the indecomposability of RSA algorithm, thereby completely avoiding the possibility that the firmware is artificially tampered or replaced and ensuring the safety of a user network.
Further, referring to fig. 4, a method for upgrading a router is disclosed, after power is on, a router reset key is pressed, a digitally signed firmware is downloaded from a server, a digital signature of the firmware is verified, if the digital signature passes the verification, the router is booted, and the router is normally restarted to complete upgrading; if the digital signature is not verified, the downloaded firmware is discarded, and a reset key is pressed to download the firmware again. Therefore, the digital signature obtained by SHA hash and RSA encryption cannot be cracked, and when the router is refreshed and upgraded locally, the authenticity and integrity of the firmware source and data can be verified easily by verifying the digital signature, so that the real and complete firmware is obtained, and the upgrade is completed.
Fig. 5 is a block diagram of a firmware protection apparatus in the present embodiment, and as shown in fig. 5, the apparatus includes: a digital signature device 110 and a verification device 120; wherein,
the digital signature device 110 includes a first hash module 111, an encryption module 112, and a storage module 113;
the verification device 120 includes a second hash module 121, a decryption module 122, and a judgment module 123;
the digital signature device 110 operates on the server side and is used for digitally signing the firmware; the verification means 120 operates at the router side for verifying the digital signature of the firmware.
The first hash module 111 hashes the firmware with SHA to obtain a hash value of the firmware, and transmits the hash value to the encryption module 112; the encryption module 112 encrypts the hash value by using the private key of RSA to obtain a digital signature, and the digital signature is transmitted to and stored in the storage module 113.
The second hash module 121 hashes the SHA firmware to obtain a hash value of the firmware, and transmits the hash value to the judgment module 123; the decryption module 122 decrypts the digital signature by using the public key of RSA, obtains a decrypted hash value, and transmits the hash value to the judgment module 123.
The determining module 123 compares the hash value of the firmware with the decrypted hash value, so as to determine the authenticity of the router-side firmware. If the hash value of the firmware is equal to the decrypted hash value, the digital signature passes verification, and the firmware is upgraded; and if not, the digital signature verification fails, and the firmware is discarded.
In this embodiment, the digital signature device performs digital signature on the firmware through the cooperation of the first hash module, the encryption module and the storage module and stores the digital signature; the firmware and the digital signature thereof are sent to the router end, the second hash module and the decryption module respectively process the firmware and the digital signature to obtain corresponding hash values, and the hash values are compared in the judgment module to determine the security of the firmware source and the integrity of data, so that malicious upgrading or malicious flash can be prevented, and the internet surfing safety of a user is improved.
Compared with the prior art, the invention provides a firmware protection method, which is characterized in that a digital signature is obtained by encrypting firmware by using a Hash algorithm and an asymmetric encryption algorithm at a server end, so that the firmware data can not be cracked by others and the firmware information is tampered even if the firmware data is intercepted midway; the digital signature is verified at the router end, so that the authenticity of the firmware information can be verified at the router end even if the firmware information is intercepted and tampered midway, the possibility of using unsafe firmware to upgrade or refresh the router is completely eradicated, the safety of a firmware source and the integrity of data are ensured, the router which is locally upgraded or locally refreshed is prevented from being easily cracked, and the user can surf the internet more safely.
Although the present invention has been described in connection with preferred embodiments, it will be understood by those skilled in the art that the methods and systems of the present invention are not limited to the embodiments described in the detailed description, and various modifications, additions, and substitutions are possible, without departing from the spirit and scope of the invention as defined in the accompanying claims.
Claims (10)
1. A firmware protection method is characterized by comprising the following steps:
s1, digitally signing the firmware;
and S2, verifying the digital signature.
2. The firmware protection method of claim 1, wherein the step S1 includes the steps of:
s101, hashing the firmware through a hashing algorithm to obtain a hash value of the firmware;
s102, encrypting the hash value by using a private key of an asymmetric encryption algorithm to obtain the digital signature;
s103, storing the digital signature in the firmware.
3. The firmware protection method of claim 1, wherein the step S2 includes the steps of:
s201, hashing the firmware through the hashing algorithm to obtain a hash value of the firmware;
s202, decrypting the digital signature by using a public key of an asymmetric encryption algorithm to obtain a decrypted hash value;
s203, comparing the hash value of the firmware with the decrypted hash value, and judging the authenticity of the firmware.
4. The firmware protection method according to claim 1, wherein the step S1 is completed at a server side, and the digital signature and the firmware are sent and saved to the router software; said step S2 is done in said router software.
5. The firmware protection method according to claim 3, wherein in the step S203, if the hash value of the firmware and the decrypted hash value are equal, the digital signature verification passes, and the firmware is upgraded; and if the hash value of the firmware is not equal to the decrypted hash value, the digital signature verification fails, and the firmware is discarded.
6. A firmware protection device, comprising:
the digital signature device is used for digitally signing the firmware;
and the verification device is used for verifying the digital signature of the firmware.
7. The firmware protection device of claim 6, wherein the digital signature device comprises:
the first hash module is used for hashing the firmware to obtain a hash value of the firmware;
the encryption module is used for encrypting the hash value by using a private key of an asymmetric encryption algorithm to obtain the digital signature;
a storage module for storing the digital signature in the firmware.
8. The firmware protection device of claim 6, wherein the verification device comprises:
the second hash module is used for hashing the firmware to obtain a hash value of the firmware;
the decryption module is used for decrypting the digital signature by using a public key of an asymmetric encryption algorithm to obtain a decrypted hash value;
and the judging module is used for comparing the hash value of the firmware with the decrypted hash value and judging the authenticity of the firmware.
9. The firmware protection device of claim 6, wherein the digital signature device runs on a server side, and sends and saves the digital signature and the firmware into the router software; the verification device runs at the router software end.
10. The firmware protection device of claim 8, wherein the determining module determines authenticity of the firmware, and if the hash value of the firmware is equal to the decrypted hash value, the digital signature verification is passed, and the firmware is upgraded; and if not, the digital signature verification fails, and the firmware is discarded.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410789754.XA CN104506515A (en) | 2014-12-17 | 2014-12-17 | Firmware protection method and firmware protection device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410789754.XA CN104506515A (en) | 2014-12-17 | 2014-12-17 | Firmware protection method and firmware protection device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104506515A true CN104506515A (en) | 2015-04-08 |
Family
ID=52948230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410789754.XA Pending CN104506515A (en) | 2014-12-17 | 2014-12-17 | Firmware protection method and firmware protection device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104506515A (en) |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072616A (en) * | 2015-08-31 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Verification method of flash ROM and verification apparatus of flash ROM |
CN105303094A (en) * | 2015-05-07 | 2016-02-03 | 同方计算机有限公司 | Safety self-verification system of USB main control chip and safety self-verification method of USB main control chip |
CN106227503A (en) * | 2016-07-29 | 2016-12-14 | 苏州国芯科技有限公司 | Safety chip COS firmware update, service end, terminal and system |
CN106412121A (en) * | 2016-11-21 | 2017-02-15 | 四川长虹电器股份有限公司 | System security upgrade method applied to intelligent refrigerators |
CN106506163A (en) * | 2016-10-21 | 2017-03-15 | 北京小米移动软件有限公司 | ROM packet processing methods and device |
CN106534083A (en) * | 2016-10-31 | 2017-03-22 | 北京小米移动软件有限公司 | Root tool verification method and apparatus |
CN106685653A (en) * | 2016-12-29 | 2017-05-17 | 同济大学 | A vehicle remote firmware update method and device based on information security technology |
CN107359999A (en) * | 2017-07-04 | 2017-11-17 | 深圳市智联物联科技有限公司 | A kind of uboot firmwares guard method |
CN107798255A (en) * | 2015-10-19 | 2018-03-13 | 广东欧珀移动通信有限公司 | A kind of endorsement method and device of brush machine system image |
CN107888577A (en) * | 2017-10-31 | 2018-04-06 | 美的智慧家居科技有限公司 | Upgrade method, door lock, server, system and the storage medium of door lock firmware |
CN108111425A (en) * | 2018-02-24 | 2018-06-01 | 上海康斐信息技术有限公司 | A kind of method and system of the anti-brush machine of router |
CN108306970A (en) * | 2018-02-02 | 2018-07-20 | 浙江德景电子科技有限公司 | A kind of download of firmware safety and calibration equipment and method based on safety chip |
CN108491215A (en) * | 2018-02-11 | 2018-09-04 | 苏州光之翼智能科技有限公司 | A kind of unmanned plane firmware protection system |
CN108491289A (en) * | 2018-03-22 | 2018-09-04 | 北京顶象技术有限公司 | Firmware guard method and device |
CN108762788A (en) * | 2018-05-31 | 2018-11-06 | 四川斐讯信息技术有限公司 | A kind of embedded device firmware encrypting method and system based on server |
CN108920962A (en) * | 2018-06-26 | 2018-11-30 | 百富计算机技术(深圳)有限公司 | Firmware downloads sign test method, firmware dissemination method, mobile terminal and server |
CN108958768A (en) * | 2018-06-26 | 2018-12-07 | 浪潮(北京)电子信息产业有限公司 | A kind of GPU firmware update, device, equipment and computer readable storage medium |
CN109144552A (en) * | 2018-09-10 | 2019-01-04 | 郑州云海信息技术有限公司 | A kind of boot firmware method for refreshing and device |
CN109345665A (en) * | 2018-09-18 | 2019-02-15 | 金邦达有限公司 | A kind of separate type novel intelligent door-locking system and its working method |
CN109472132A (en) * | 2018-11-12 | 2019-03-15 | 深圳市腾瑞丰科技有限公司 | Anti- brush machine guard method and device |
CN109862099A (en) * | 2019-01-15 | 2019-06-07 | 浙江吉利汽车研究院有限公司 | An upgrade verification method, device, terminal and system |
CN110365723A (en) * | 2018-03-26 | 2019-10-22 | 广东神马搜索科技有限公司 | Asymmetric services find method and apparatus |
CN110532735A (en) * | 2018-05-23 | 2019-12-03 | 霍尼韦尔环境自控产品(天津)有限公司 | Firmware upgrade method |
CN110784302A (en) * | 2018-07-31 | 2020-02-11 | 株式会社东芝 | Encrypted data generating device, digital signature generating device, data generating device with digital signature and system |
CN111241522A (en) * | 2020-01-07 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Firmware signature method and device and storage medium |
CN111240709A (en) * | 2019-12-26 | 2020-06-05 | 深圳市优博讯科技股份有限公司 | Firmware upgrading method and system of POS equipment based on android system |
CN112714507A (en) * | 2021-01-15 | 2021-04-27 | 江苏正赫通信息科技有限公司 | Method for data security transmission between wireless ad hoc networks |
CN112929871A (en) * | 2019-12-05 | 2021-06-08 | 上海艾拉比智能科技有限公司 | OTA upgrade package acquisition method, electronic device and storage medium |
CN112948838A (en) * | 2021-02-24 | 2021-06-11 | 长沙海格北斗信息技术有限公司 | Chip encryption starting method, navigation chip and receiver thereof |
CN113688399A (en) * | 2021-08-25 | 2021-11-23 | 深圳忆联信息系统有限公司 | Firmware digital signature protection method and device, computer equipment and storage medium |
CN113810198A (en) * | 2021-09-18 | 2021-12-17 | 深圳忆联信息系统有限公司 | Method, device, computer device and storage medium for digital signature of SSD firmware |
CN114386112A (en) * | 2022-01-18 | 2022-04-22 | 苏州忆联信息系统有限公司 | Method and device for realizing SSD digital signature authentication, computer equipment and storage medium |
CN114430336A (en) * | 2021-12-21 | 2022-05-03 | 成都鲁易科技有限公司 | Decrypted data display method and device, storage medium and computer equipment |
CN115147967A (en) * | 2022-06-02 | 2022-10-04 | 福建新大陆通信科技股份有限公司 | Information verification method and system based on CTID and super SIM card |
CN116418511A (en) * | 2021-12-31 | 2023-07-11 | 科大国盾量子技术股份有限公司 | A firmware integrity verification method and system for QKD equipment based on national secret algorithm |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0849657A1 (en) * | 1996-12-18 | 1998-06-24 | NCR International, Inc. | Secure data processing method and system |
CN101145906A (en) * | 2006-09-13 | 2008-03-19 | 北京邦天科技有限公司 | Method and system for authenticating legality of receiving terminal in unidirectional network |
CN101436141A (en) * | 2008-11-21 | 2009-05-20 | 深圳创维数字技术股份有限公司 | Firmware upgrading and encapsulating method and device based on digital signing |
CN102082784A (en) * | 2010-11-11 | 2011-06-01 | 广东欧珀电子工业有限公司 | A method for online software upgrade |
-
2014
- 2014-12-17 CN CN201410789754.XA patent/CN104506515A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0849657A1 (en) * | 1996-12-18 | 1998-06-24 | NCR International, Inc. | Secure data processing method and system |
CN101145906A (en) * | 2006-09-13 | 2008-03-19 | 北京邦天科技有限公司 | Method and system for authenticating legality of receiving terminal in unidirectional network |
CN101436141A (en) * | 2008-11-21 | 2009-05-20 | 深圳创维数字技术股份有限公司 | Firmware upgrading and encapsulating method and device based on digital signing |
CN102082784A (en) * | 2010-11-11 | 2011-06-01 | 广东欧珀电子工业有限公司 | A method for online software upgrade |
Cited By (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105303094A (en) * | 2015-05-07 | 2016-02-03 | 同方计算机有限公司 | Safety self-verification system of USB main control chip and safety self-verification method of USB main control chip |
CN105303094B (en) * | 2015-05-07 | 2016-11-09 | 同方计算机有限公司 | A security self-inspection system and self-inspection method for a USB main control chip |
CN105072616A (en) * | 2015-08-31 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Verification method of flash ROM and verification apparatus of flash ROM |
CN105072616B (en) * | 2015-08-31 | 2019-10-11 | 宇龙计算机通信科技(深圳)有限公司 | The verification method of brush machine ROM and the verifying device of brush machine ROM |
CN107798255A (en) * | 2015-10-19 | 2018-03-13 | 广东欧珀移动通信有限公司 | A kind of endorsement method and device of brush machine system image |
CN107798255B (en) * | 2015-10-19 | 2020-04-17 | Oppo广东移动通信有限公司 | Signature method and device for flash system mirror image |
CN106227503A (en) * | 2016-07-29 | 2016-12-14 | 苏州国芯科技有限公司 | Safety chip COS firmware update, service end, terminal and system |
CN106506163A (en) * | 2016-10-21 | 2017-03-15 | 北京小米移动软件有限公司 | ROM packet processing methods and device |
CN106506163B (en) * | 2016-10-21 | 2019-11-15 | 北京小米移动软件有限公司 | ROM packet processing method and device |
CN106534083A (en) * | 2016-10-31 | 2017-03-22 | 北京小米移动软件有限公司 | Root tool verification method and apparatus |
CN106534083B (en) * | 2016-10-31 | 2019-07-23 | 北京小米移动软件有限公司 | Brush machine Tool validation method and device |
CN106412121A (en) * | 2016-11-21 | 2017-02-15 | 四川长虹电器股份有限公司 | System security upgrade method applied to intelligent refrigerators |
CN106685653A (en) * | 2016-12-29 | 2017-05-17 | 同济大学 | A vehicle remote firmware update method and device based on information security technology |
CN106685653B (en) * | 2016-12-29 | 2020-07-07 | 同济大学 | Vehicle remote firmware updating method and device based on information security technology |
CN107359999A (en) * | 2017-07-04 | 2017-11-17 | 深圳市智联物联科技有限公司 | A kind of uboot firmwares guard method |
CN107888577A (en) * | 2017-10-31 | 2018-04-06 | 美的智慧家居科技有限公司 | Upgrade method, door lock, server, system and the storage medium of door lock firmware |
CN107888577B (en) * | 2017-10-31 | 2021-03-19 | 美智光电科技股份有限公司 | Door lock firmware upgrading method, door lock, server, system and storage medium |
CN108306970A (en) * | 2018-02-02 | 2018-07-20 | 浙江德景电子科技有限公司 | A kind of download of firmware safety and calibration equipment and method based on safety chip |
CN108491215A (en) * | 2018-02-11 | 2018-09-04 | 苏州光之翼智能科技有限公司 | A kind of unmanned plane firmware protection system |
CN108111425A (en) * | 2018-02-24 | 2018-06-01 | 上海康斐信息技术有限公司 | A kind of method and system of the anti-brush machine of router |
CN108491289A (en) * | 2018-03-22 | 2018-09-04 | 北京顶象技术有限公司 | Firmware guard method and device |
CN110365723A (en) * | 2018-03-26 | 2019-10-22 | 广东神马搜索科技有限公司 | Asymmetric services find method and apparatus |
CN110365723B (en) * | 2018-03-26 | 2022-02-11 | 阿里巴巴(中国)有限公司 | Asymmetric service discovery method and device |
CN110532735A (en) * | 2018-05-23 | 2019-12-03 | 霍尼韦尔环境自控产品(天津)有限公司 | Firmware upgrade method |
CN110532735B (en) * | 2018-05-23 | 2023-04-18 | 霍尼韦尔环境自控产品(天津)有限公司 | Firmware upgrading method |
CN108762788A (en) * | 2018-05-31 | 2018-11-06 | 四川斐讯信息技术有限公司 | A kind of embedded device firmware encrypting method and system based on server |
CN108958768A (en) * | 2018-06-26 | 2018-12-07 | 浪潮(北京)电子信息产业有限公司 | A kind of GPU firmware update, device, equipment and computer readable storage medium |
CN108920962A (en) * | 2018-06-26 | 2018-11-30 | 百富计算机技术(深圳)有限公司 | Firmware downloads sign test method, firmware dissemination method, mobile terminal and server |
CN110784302A (en) * | 2018-07-31 | 2020-02-11 | 株式会社东芝 | Encrypted data generating device, digital signature generating device, data generating device with digital signature and system |
CN109144552A (en) * | 2018-09-10 | 2019-01-04 | 郑州云海信息技术有限公司 | A kind of boot firmware method for refreshing and device |
CN109345665A (en) * | 2018-09-18 | 2019-02-15 | 金邦达有限公司 | A kind of separate type novel intelligent door-locking system and its working method |
CN109472132A (en) * | 2018-11-12 | 2019-03-15 | 深圳市腾瑞丰科技有限公司 | Anti- brush machine guard method and device |
CN109862099A (en) * | 2019-01-15 | 2019-06-07 | 浙江吉利汽车研究院有限公司 | An upgrade verification method, device, terminal and system |
CN109862099B (en) * | 2019-01-15 | 2022-07-12 | 浙江吉利汽车研究院有限公司 | An upgrade verification method, device, terminal and system |
CN112929871A (en) * | 2019-12-05 | 2021-06-08 | 上海艾拉比智能科技有限公司 | OTA upgrade package acquisition method, electronic device and storage medium |
CN112929871B (en) * | 2019-12-05 | 2024-10-29 | 上海艾拉比智能科技有限公司 | OTA upgrade package acquisition method, electronic equipment and storage medium |
CN111240709A (en) * | 2019-12-26 | 2020-06-05 | 深圳市优博讯科技股份有限公司 | Firmware upgrading method and system of POS equipment based on android system |
CN111241522A (en) * | 2020-01-07 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Firmware signature method and device and storage medium |
CN112714507A (en) * | 2021-01-15 | 2021-04-27 | 江苏正赫通信息科技有限公司 | Method for data security transmission between wireless ad hoc networks |
CN112714507B (en) * | 2021-01-15 | 2024-03-01 | 江苏正赫通信息科技有限公司 | Method for data security transmission between wireless ad hoc networks |
CN112948838A (en) * | 2021-02-24 | 2021-06-11 | 长沙海格北斗信息技术有限公司 | Chip encryption starting method, navigation chip and receiver thereof |
CN113688399A (en) * | 2021-08-25 | 2021-11-23 | 深圳忆联信息系统有限公司 | Firmware digital signature protection method and device, computer equipment and storage medium |
CN113810198A (en) * | 2021-09-18 | 2021-12-17 | 深圳忆联信息系统有限公司 | Method, device, computer device and storage medium for digital signature of SSD firmware |
CN114430336A (en) * | 2021-12-21 | 2022-05-03 | 成都鲁易科技有限公司 | Decrypted data display method and device, storage medium and computer equipment |
CN114430336B (en) * | 2021-12-21 | 2023-10-03 | 成都鲁易科技有限公司 | Method and device for displaying decrypted data, storage medium and computer equipment |
CN116418511A (en) * | 2021-12-31 | 2023-07-11 | 科大国盾量子技术股份有限公司 | A firmware integrity verification method and system for QKD equipment based on national secret algorithm |
CN114386112A (en) * | 2022-01-18 | 2022-04-22 | 苏州忆联信息系统有限公司 | Method and device for realizing SSD digital signature authentication, computer equipment and storage medium |
CN115147967A (en) * | 2022-06-02 | 2022-10-04 | 福建新大陆通信科技股份有限公司 | Information verification method and system based on CTID and super SIM card |
CN115147967B (en) * | 2022-06-02 | 2023-12-15 | 福建新大陆通信科技股份有限公司 | Information verification method and system based on CTID and super SIM card |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104506515A (en) | Firmware protection method and firmware protection device | |
CN110597538B (en) | Software upgrading method and OTA upgrading system based on OTA upgrading system | |
CN109309565B (en) | Security authentication method and device | |
CN103995991B (en) | Method for binding hardware information and secret keys in software copyright protection | |
EP2659373B1 (en) | System and method for secure software update | |
KR101754308B1 (en) | Method for management sensitive data of mobile and escrow server for performing the method | |
CN101145906B (en) | Method and system for authenticating legality of receiving terminal in unidirectional network | |
KR102028197B1 (en) | Hardware secure module, method for updating integrity check value stored in the hardware secure module and program stored in terminal by the hardware secure module | |
WO2014044170A1 (en) | Method for local service unit authenticating application of android client | |
CN104639506B (en) | Method, system and the terminal for carrying out management and control are installed to application program | |
JP5613596B2 (en) | Authentication system, terminal device, authentication server, and program | |
WO2016019790A1 (en) | Verification method, client, server and system for installation package | |
CN114244522B (en) | Information protection method, device, electronic equipment and computer readable storage medium | |
WO2013185724A2 (en) | Mobile terminal and software upgrade method thereof | |
CN113114668A (en) | Information transmission method, mobile terminal, storage medium and electronic equipment | |
KR101314751B1 (en) | Apparatus for managing installation of DRM and method thereof | |
KR20130008939A (en) | Apparatus and method for preventing a copy of terminal's unique information in a mobile terminal | |
CN105099705A (en) | A secure communication method and system based on USB protocol | |
CN104394467B (en) | Method for downloading set-top box application program and set-top box | |
CN115242397A (en) | OTA upgrade security verification method and readable storage medium for vehicle EUC | |
CN105871858A (en) | Method and system for ensuring high data safety | |
WO2021259310A1 (en) | Over-the-air updating method, update server, terminal device, and internet of things system | |
CN105100030B (en) | Access control method, system and device | |
JP2009199147A (en) | Communication control method and communication control program | |
CN117828561B (en) | Method, device, system and storage medium for secure burning of chip firmware data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150408 |