[go: up one dir, main page]

CN104506515A - Firmware protection method and firmware protection device - Google Patents

Firmware protection method and firmware protection device Download PDF

Info

Publication number
CN104506515A
CN104506515A CN201410789754.XA CN201410789754A CN104506515A CN 104506515 A CN104506515 A CN 104506515A CN 201410789754 A CN201410789754 A CN 201410789754A CN 104506515 A CN104506515 A CN 104506515A
Authority
CN
China
Prior art keywords
firmware
hash value
digital signature
module
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410789754.XA
Other languages
Chinese (zh)
Inventor
冷优军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING JIKEJIKE TECHNOLOGY Co Ltd
Original Assignee
BEIJING JIKEJIKE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING JIKEJIKE TECHNOLOGY Co Ltd filed Critical BEIJING JIKEJIKE TECHNOLOGY Co Ltd
Priority to CN201410789754.XA priority Critical patent/CN104506515A/en
Publication of CN104506515A publication Critical patent/CN104506515A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of network equipment safety and discloses a firmware protection method and a firmware protection device. The firmware protection method comprises the following steps: carrying out Hash on firmware through a Hash algorithm to obtain a Hash value of the firmware; encrypting the Hash value of the firmware by using a private key of an asymmetric encryption algorithm to obtain a digital signature of the firmware; sending the firmware and the digital signature to software of a router; carrying out Hash on the firmware by the Hash algorithm to obtain the Hash value of the firmware; decrypting the digital signature by using a public key of the asymmetric encryption algorithm to obtain an decrypted Hash value; comparing the Hash value of the firmware and the decrypted Hash value, wherein if the Hash value of the firmware is equal to the decrypted Hash value, the updating of the router can be finished. According to the firmware protection method and the firmware protection device, the firmware can be subjected to digital signature so as to ensure the origination safety and the data integrity of the firmware, and meanwhile, data are protected from faking.

Description

Firmware protection method and protection device
Technical Field
The invention relates to the field of network equipment safety, in particular to a firmware protection method.
Background
In recent years, computer networks are rapidly popularized, and the network era is formally coming, so that not only one family needs to install the networks, but also wireless networks are laid in public places including cinemas, buses, large markets and the like. Therefore, routers for network interconnection are very important. In order to prevent the router software of local upgrade or local flashing from being replaced by software constructed by others and finish some illegal operations, such as attacking a server, illegally collecting user information, redirecting a URL (uniform resource locator) of a user and the like, a router manufacturer encrypts firmware in a digital signature mode and prevents the firmware from being intercepted and forged in midway. At present, the main technical solutions for manufacturers to perform digital signatures are:
1. encrypting the firmware by adopting a special format;
2. a hash or other verification algorithm is adopted;
3. a symmetric encryption algorithm, e.g., AES algorithm, encryption,
the firmware is encrypted by using the methods, although the safety of the firmware is ensured to a certain extent, the methods are easy to crack, once the firmware is cracked, the source of the firmware cannot be authenticated, and whether the firmware changes or not cannot be verified and tampered by people, so that the local upgrade or local flashing of the firmware has great network safety problems and even causes network paralysis.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a firmware protection method to solve the problem that a router cannot authenticate and verify whether the source of the firmware changes or not when other people tamper the firmware.
In order to solve the above problems, the present invention provides a firmware protection method, which includes the steps of:
s1, digitally signing the firmware;
and S2, verifying the digital signature.
Preferably, the step S1 includes the steps of:
s101, hashing the firmware through a hashing algorithm to obtain a hash value of the firmware;
s102, encrypting the hash value by using a private key of an asymmetric encryption algorithm to obtain the digital signature;
s103, storing the digital signature in the firmware.
Preferably, the step S2 includes the steps of:
s201, hashing the firmware through the hashing algorithm to obtain a hash value of the firmware;
s202, decrypting the digital signature by using a public key of an asymmetric encryption algorithm to obtain a decrypted hash value;
s203, comparing the hash value of the firmware with the decrypted hash value, and judging the authenticity of the firmware.
Preferably, the step S1 is completed at the server side, and the digital signature and the firmware are sent and saved to the router software; said step S2 is done in said router software.
Preferably, in step S203, if the hash value of the firmware is equal to the decrypted hash value, the digital signature verification passes, and the firmware is upgraded; and if the hash value of the firmware is not equal to the decrypted hash value, the digital signature verification fails, and the firmware is discarded.
In order to achieve the above object, according to another aspect of the present invention, there is provided a firmware protection device including:
the digital signature device is used for digitally signing the firmware;
verification means for verifying a digital signature of the firmware;
preferably, the digital signature apparatus includes:
the first hash module is used for hashing the firmware to obtain a hash value of the firmware;
the encryption module is used for encrypting the hash value by using a private key of an asymmetric encryption algorithm to obtain the digital signature;
a storage module for storing the digital signature in the firmware.
Preferably, the authentication device includes:
the second hash module is used for hashing the firmware to obtain a hash value of the firmware;
the decryption module is used for decrypting the digital signature by using a public key of an asymmetric encryption algorithm to obtain a decrypted hash value;
and the judging module is used for comparing the hash value of the firmware with the decrypted hash value and judging the authenticity of the firmware.
Preferably, the digital signature device runs on a server side, and sends and stores the digital signature and the firmware into the router software; the verification device runs at the router software end.
Preferably, the judging module judges the authenticity of the firmware, and if the hash value of the firmware is equal to the decrypted hash value, the digital signature passes verification and the firmware is upgraded; and if not, the digital signature verification fails, and the firmware is discarded.
Drawings
FIG. 1 is a flow chart illustrating a firmware protection method according to a preferred embodiment of the present invention;
FIG. 2 is a flow chart illustrating digital signing of firmware in a preferred embodiment of the present invention;
FIG. 3 is a flow chart illustrating the verification of a digital signature in a preferred embodiment of the present invention;
FIG. 4 is a flow chart illustrating a firmware upgrade of a router according to a preferred embodiment of the present invention;
fig. 5 is a block diagram of a firmware protection device in a preferred embodiment of the present invention.
Detailed Description
The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby. The description which follows is a preferred embodiment of the invention, however, the description is for the purpose of illustrating the general principles of the invention and is not intended to limit the scope of the invention. The scope of the present invention is defined by the appended claims.
Referring to fig. 1, an embodiment of the present invention provides a firmware protection method, including:
s1, digitally signing the firmware;
and S2, verifying the digital signature.
In the invention, the digital signature is carried out on the firmware through the Hash algorithm and the asymmetric encryption algorithm, so that the router software can verify the digital signature after receiving the digital signature, thereby determining whether the firmware source changes, protecting the firmware data, preventing other people from forging the firmware and brushing the router software, and ensuring the network security.
In this embodiment, the hash algorithm adopts a secure hash algorithm SHA, which is an algorithm for abstracting input information, and this algorithm can ensure that the abstractions generated by different input information are differentThe asymmetric encryption algorithm adopts a public key encryption algorithm RSA, which can ensure that the information encrypted by the RSA cannot be decrypted as long as the secret key is long enough, and in the embodiment, the length of the RSA secret key is 2048 bits.
Further, referring to fig. 2, step S1 includes the steps of:
s101, hashing the firmware through SHA1 to obtain a hash value of the firmware;
s102, encrypting the hash value of the firmware by using an RSA private key to obtain a digital signature;
s103, storing the digital signature in firmware;
step S1 is completed at the server side; and sending the digital signature and the firmware obtained in the step S103 to router software and storing the digital signature and the firmware.
Further, referring to fig. 3, the step S2 includes the steps of:
s201, hashing the firmware through SHA1 to obtain a hash value of the firmware;
s202, decrypting the digital signature by using a public key of RSA to obtain a decrypted hash value;
s203, comparing the hash value of the firmware with the decrypted hash value, and judging the authenticity of the firmware;
step S2 is completed in the router; the method for judging the authenticity of the firmware in the step S203 comprises the following steps: comparing the hash values obtained in the step S201 and the step S202, if the hash values are equal, the digital signature passes verification, and upgrading the router; if the verification result is not equal to the verification result, the digital signature verification fails, the firmware source is wrong or the data is incomplete, the firmware and the digital signature stored in the router software are discarded, and a message is sent to the server side to request the firmware to be sent again.
In the invention, the step S1 and the step S2 realize the requirements of digitally signing and verifying the firmware, and the safety of the firmware source and the integrity of data can be verified due to the irreversibility of SHA and the indecomposability of RSA algorithm, thereby completely avoiding the possibility that the firmware is artificially tampered or replaced and ensuring the safety of a user network.
Further, referring to fig. 4, a method for upgrading a router is disclosed, after power is on, a router reset key is pressed, a digitally signed firmware is downloaded from a server, a digital signature of the firmware is verified, if the digital signature passes the verification, the router is booted, and the router is normally restarted to complete upgrading; if the digital signature is not verified, the downloaded firmware is discarded, and a reset key is pressed to download the firmware again. Therefore, the digital signature obtained by SHA hash and RSA encryption cannot be cracked, and when the router is refreshed and upgraded locally, the authenticity and integrity of the firmware source and data can be verified easily by verifying the digital signature, so that the real and complete firmware is obtained, and the upgrade is completed.
Fig. 5 is a block diagram of a firmware protection apparatus in the present embodiment, and as shown in fig. 5, the apparatus includes: a digital signature device 110 and a verification device 120; wherein,
the digital signature device 110 includes a first hash module 111, an encryption module 112, and a storage module 113;
the verification device 120 includes a second hash module 121, a decryption module 122, and a judgment module 123;
the digital signature device 110 operates on the server side and is used for digitally signing the firmware; the verification means 120 operates at the router side for verifying the digital signature of the firmware.
The first hash module 111 hashes the firmware with SHA to obtain a hash value of the firmware, and transmits the hash value to the encryption module 112; the encryption module 112 encrypts the hash value by using the private key of RSA to obtain a digital signature, and the digital signature is transmitted to and stored in the storage module 113.
The second hash module 121 hashes the SHA firmware to obtain a hash value of the firmware, and transmits the hash value to the judgment module 123; the decryption module 122 decrypts the digital signature by using the public key of RSA, obtains a decrypted hash value, and transmits the hash value to the judgment module 123.
The determining module 123 compares the hash value of the firmware with the decrypted hash value, so as to determine the authenticity of the router-side firmware. If the hash value of the firmware is equal to the decrypted hash value, the digital signature passes verification, and the firmware is upgraded; and if not, the digital signature verification fails, and the firmware is discarded.
In this embodiment, the digital signature device performs digital signature on the firmware through the cooperation of the first hash module, the encryption module and the storage module and stores the digital signature; the firmware and the digital signature thereof are sent to the router end, the second hash module and the decryption module respectively process the firmware and the digital signature to obtain corresponding hash values, and the hash values are compared in the judgment module to determine the security of the firmware source and the integrity of data, so that malicious upgrading or malicious flash can be prevented, and the internet surfing safety of a user is improved.
Compared with the prior art, the invention provides a firmware protection method, which is characterized in that a digital signature is obtained by encrypting firmware by using a Hash algorithm and an asymmetric encryption algorithm at a server end, so that the firmware data can not be cracked by others and the firmware information is tampered even if the firmware data is intercepted midway; the digital signature is verified at the router end, so that the authenticity of the firmware information can be verified at the router end even if the firmware information is intercepted and tampered midway, the possibility of using unsafe firmware to upgrade or refresh the router is completely eradicated, the safety of a firmware source and the integrity of data are ensured, the router which is locally upgraded or locally refreshed is prevented from being easily cracked, and the user can surf the internet more safely.
Although the present invention has been described in connection with preferred embodiments, it will be understood by those skilled in the art that the methods and systems of the present invention are not limited to the embodiments described in the detailed description, and various modifications, additions, and substitutions are possible, without departing from the spirit and scope of the invention as defined in the accompanying claims.

Claims (10)

1. A firmware protection method is characterized by comprising the following steps:
s1, digitally signing the firmware;
and S2, verifying the digital signature.
2. The firmware protection method of claim 1, wherein the step S1 includes the steps of:
s101, hashing the firmware through a hashing algorithm to obtain a hash value of the firmware;
s102, encrypting the hash value by using a private key of an asymmetric encryption algorithm to obtain the digital signature;
s103, storing the digital signature in the firmware.
3. The firmware protection method of claim 1, wherein the step S2 includes the steps of:
s201, hashing the firmware through the hashing algorithm to obtain a hash value of the firmware;
s202, decrypting the digital signature by using a public key of an asymmetric encryption algorithm to obtain a decrypted hash value;
s203, comparing the hash value of the firmware with the decrypted hash value, and judging the authenticity of the firmware.
4. The firmware protection method according to claim 1, wherein the step S1 is completed at a server side, and the digital signature and the firmware are sent and saved to the router software; said step S2 is done in said router software.
5. The firmware protection method according to claim 3, wherein in the step S203, if the hash value of the firmware and the decrypted hash value are equal, the digital signature verification passes, and the firmware is upgraded; and if the hash value of the firmware is not equal to the decrypted hash value, the digital signature verification fails, and the firmware is discarded.
6. A firmware protection device, comprising:
the digital signature device is used for digitally signing the firmware;
and the verification device is used for verifying the digital signature of the firmware.
7. The firmware protection device of claim 6, wherein the digital signature device comprises:
the first hash module is used for hashing the firmware to obtain a hash value of the firmware;
the encryption module is used for encrypting the hash value by using a private key of an asymmetric encryption algorithm to obtain the digital signature;
a storage module for storing the digital signature in the firmware.
8. The firmware protection device of claim 6, wherein the verification device comprises:
the second hash module is used for hashing the firmware to obtain a hash value of the firmware;
the decryption module is used for decrypting the digital signature by using a public key of an asymmetric encryption algorithm to obtain a decrypted hash value;
and the judging module is used for comparing the hash value of the firmware with the decrypted hash value and judging the authenticity of the firmware.
9. The firmware protection device of claim 6, wherein the digital signature device runs on a server side, and sends and saves the digital signature and the firmware into the router software; the verification device runs at the router software end.
10. The firmware protection device of claim 8, wherein the determining module determines authenticity of the firmware, and if the hash value of the firmware is equal to the decrypted hash value, the digital signature verification is passed, and the firmware is upgraded; and if not, the digital signature verification fails, and the firmware is discarded.
CN201410789754.XA 2014-12-17 2014-12-17 Firmware protection method and firmware protection device Pending CN104506515A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410789754.XA CN104506515A (en) 2014-12-17 2014-12-17 Firmware protection method and firmware protection device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410789754.XA CN104506515A (en) 2014-12-17 2014-12-17 Firmware protection method and firmware protection device

Publications (1)

Publication Number Publication Date
CN104506515A true CN104506515A (en) 2015-04-08

Family

ID=52948230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410789754.XA Pending CN104506515A (en) 2014-12-17 2014-12-17 Firmware protection method and firmware protection device

Country Status (1)

Country Link
CN (1) CN104506515A (en)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072616A (en) * 2015-08-31 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Verification method of flash ROM and verification apparatus of flash ROM
CN105303094A (en) * 2015-05-07 2016-02-03 同方计算机有限公司 Safety self-verification system of USB main control chip and safety self-verification method of USB main control chip
CN106227503A (en) * 2016-07-29 2016-12-14 苏州国芯科技有限公司 Safety chip COS firmware update, service end, terminal and system
CN106412121A (en) * 2016-11-21 2017-02-15 四川长虹电器股份有限公司 System security upgrade method applied to intelligent refrigerators
CN106506163A (en) * 2016-10-21 2017-03-15 北京小米移动软件有限公司 ROM packet processing methods and device
CN106534083A (en) * 2016-10-31 2017-03-22 北京小米移动软件有限公司 Root tool verification method and apparatus
CN106685653A (en) * 2016-12-29 2017-05-17 同济大学 A vehicle remote firmware update method and device based on information security technology
CN107359999A (en) * 2017-07-04 2017-11-17 深圳市智联物联科技有限公司 A kind of uboot firmwares guard method
CN107798255A (en) * 2015-10-19 2018-03-13 广东欧珀移动通信有限公司 A kind of endorsement method and device of brush machine system image
CN107888577A (en) * 2017-10-31 2018-04-06 美的智慧家居科技有限公司 Upgrade method, door lock, server, system and the storage medium of door lock firmware
CN108111425A (en) * 2018-02-24 2018-06-01 上海康斐信息技术有限公司 A kind of method and system of the anti-brush machine of router
CN108306970A (en) * 2018-02-02 2018-07-20 浙江德景电子科技有限公司 A kind of download of firmware safety and calibration equipment and method based on safety chip
CN108491215A (en) * 2018-02-11 2018-09-04 苏州光之翼智能科技有限公司 A kind of unmanned plane firmware protection system
CN108491289A (en) * 2018-03-22 2018-09-04 北京顶象技术有限公司 Firmware guard method and device
CN108762788A (en) * 2018-05-31 2018-11-06 四川斐讯信息技术有限公司 A kind of embedded device firmware encrypting method and system based on server
CN108920962A (en) * 2018-06-26 2018-11-30 百富计算机技术(深圳)有限公司 Firmware downloads sign test method, firmware dissemination method, mobile terminal and server
CN108958768A (en) * 2018-06-26 2018-12-07 浪潮(北京)电子信息产业有限公司 A kind of GPU firmware update, device, equipment and computer readable storage medium
CN109144552A (en) * 2018-09-10 2019-01-04 郑州云海信息技术有限公司 A kind of boot firmware method for refreshing and device
CN109345665A (en) * 2018-09-18 2019-02-15 金邦达有限公司 A kind of separate type novel intelligent door-locking system and its working method
CN109472132A (en) * 2018-11-12 2019-03-15 深圳市腾瑞丰科技有限公司 Anti- brush machine guard method and device
CN109862099A (en) * 2019-01-15 2019-06-07 浙江吉利汽车研究院有限公司 An upgrade verification method, device, terminal and system
CN110365723A (en) * 2018-03-26 2019-10-22 广东神马搜索科技有限公司 Asymmetric services find method and apparatus
CN110532735A (en) * 2018-05-23 2019-12-03 霍尼韦尔环境自控产品(天津)有限公司 Firmware upgrade method
CN110784302A (en) * 2018-07-31 2020-02-11 株式会社东芝 Encrypted data generating device, digital signature generating device, data generating device with digital signature and system
CN111241522A (en) * 2020-01-07 2020-06-05 杭州涂鸦信息技术有限公司 Firmware signature method and device and storage medium
CN111240709A (en) * 2019-12-26 2020-06-05 深圳市优博讯科技股份有限公司 Firmware upgrading method and system of POS equipment based on android system
CN112714507A (en) * 2021-01-15 2021-04-27 江苏正赫通信息科技有限公司 Method for data security transmission between wireless ad hoc networks
CN112929871A (en) * 2019-12-05 2021-06-08 上海艾拉比智能科技有限公司 OTA upgrade package acquisition method, electronic device and storage medium
CN112948838A (en) * 2021-02-24 2021-06-11 长沙海格北斗信息技术有限公司 Chip encryption starting method, navigation chip and receiver thereof
CN113688399A (en) * 2021-08-25 2021-11-23 深圳忆联信息系统有限公司 Firmware digital signature protection method and device, computer equipment and storage medium
CN113810198A (en) * 2021-09-18 2021-12-17 深圳忆联信息系统有限公司 Method, device, computer device and storage medium for digital signature of SSD firmware
CN114386112A (en) * 2022-01-18 2022-04-22 苏州忆联信息系统有限公司 Method and device for realizing SSD digital signature authentication, computer equipment and storage medium
CN114430336A (en) * 2021-12-21 2022-05-03 成都鲁易科技有限公司 Decrypted data display method and device, storage medium and computer equipment
CN115147967A (en) * 2022-06-02 2022-10-04 福建新大陆通信科技股份有限公司 Information verification method and system based on CTID and super SIM card
CN116418511A (en) * 2021-12-31 2023-07-11 科大国盾量子技术股份有限公司 A firmware integrity verification method and system for QKD equipment based on national secret algorithm

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0849657A1 (en) * 1996-12-18 1998-06-24 NCR International, Inc. Secure data processing method and system
CN101145906A (en) * 2006-09-13 2008-03-19 北京邦天科技有限公司 Method and system for authenticating legality of receiving terminal in unidirectional network
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing
CN102082784A (en) * 2010-11-11 2011-06-01 广东欧珀电子工业有限公司 A method for online software upgrade

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0849657A1 (en) * 1996-12-18 1998-06-24 NCR International, Inc. Secure data processing method and system
CN101145906A (en) * 2006-09-13 2008-03-19 北京邦天科技有限公司 Method and system for authenticating legality of receiving terminal in unidirectional network
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing
CN102082784A (en) * 2010-11-11 2011-06-01 广东欧珀电子工业有限公司 A method for online software upgrade

Cited By (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303094A (en) * 2015-05-07 2016-02-03 同方计算机有限公司 Safety self-verification system of USB main control chip and safety self-verification method of USB main control chip
CN105303094B (en) * 2015-05-07 2016-11-09 同方计算机有限公司 A security self-inspection system and self-inspection method for a USB main control chip
CN105072616A (en) * 2015-08-31 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Verification method of flash ROM and verification apparatus of flash ROM
CN105072616B (en) * 2015-08-31 2019-10-11 宇龙计算机通信科技(深圳)有限公司 The verification method of brush machine ROM and the verifying device of brush machine ROM
CN107798255A (en) * 2015-10-19 2018-03-13 广东欧珀移动通信有限公司 A kind of endorsement method and device of brush machine system image
CN107798255B (en) * 2015-10-19 2020-04-17 Oppo广东移动通信有限公司 Signature method and device for flash system mirror image
CN106227503A (en) * 2016-07-29 2016-12-14 苏州国芯科技有限公司 Safety chip COS firmware update, service end, terminal and system
CN106506163A (en) * 2016-10-21 2017-03-15 北京小米移动软件有限公司 ROM packet processing methods and device
CN106506163B (en) * 2016-10-21 2019-11-15 北京小米移动软件有限公司 ROM packet processing method and device
CN106534083A (en) * 2016-10-31 2017-03-22 北京小米移动软件有限公司 Root tool verification method and apparatus
CN106534083B (en) * 2016-10-31 2019-07-23 北京小米移动软件有限公司 Brush machine Tool validation method and device
CN106412121A (en) * 2016-11-21 2017-02-15 四川长虹电器股份有限公司 System security upgrade method applied to intelligent refrigerators
CN106685653A (en) * 2016-12-29 2017-05-17 同济大学 A vehicle remote firmware update method and device based on information security technology
CN106685653B (en) * 2016-12-29 2020-07-07 同济大学 Vehicle remote firmware updating method and device based on information security technology
CN107359999A (en) * 2017-07-04 2017-11-17 深圳市智联物联科技有限公司 A kind of uboot firmwares guard method
CN107888577A (en) * 2017-10-31 2018-04-06 美的智慧家居科技有限公司 Upgrade method, door lock, server, system and the storage medium of door lock firmware
CN107888577B (en) * 2017-10-31 2021-03-19 美智光电科技股份有限公司 Door lock firmware upgrading method, door lock, server, system and storage medium
CN108306970A (en) * 2018-02-02 2018-07-20 浙江德景电子科技有限公司 A kind of download of firmware safety and calibration equipment and method based on safety chip
CN108491215A (en) * 2018-02-11 2018-09-04 苏州光之翼智能科技有限公司 A kind of unmanned plane firmware protection system
CN108111425A (en) * 2018-02-24 2018-06-01 上海康斐信息技术有限公司 A kind of method and system of the anti-brush machine of router
CN108491289A (en) * 2018-03-22 2018-09-04 北京顶象技术有限公司 Firmware guard method and device
CN110365723A (en) * 2018-03-26 2019-10-22 广东神马搜索科技有限公司 Asymmetric services find method and apparatus
CN110365723B (en) * 2018-03-26 2022-02-11 阿里巴巴(中国)有限公司 Asymmetric service discovery method and device
CN110532735A (en) * 2018-05-23 2019-12-03 霍尼韦尔环境自控产品(天津)有限公司 Firmware upgrade method
CN110532735B (en) * 2018-05-23 2023-04-18 霍尼韦尔环境自控产品(天津)有限公司 Firmware upgrading method
CN108762788A (en) * 2018-05-31 2018-11-06 四川斐讯信息技术有限公司 A kind of embedded device firmware encrypting method and system based on server
CN108958768A (en) * 2018-06-26 2018-12-07 浪潮(北京)电子信息产业有限公司 A kind of GPU firmware update, device, equipment and computer readable storage medium
CN108920962A (en) * 2018-06-26 2018-11-30 百富计算机技术(深圳)有限公司 Firmware downloads sign test method, firmware dissemination method, mobile terminal and server
CN110784302A (en) * 2018-07-31 2020-02-11 株式会社东芝 Encrypted data generating device, digital signature generating device, data generating device with digital signature and system
CN109144552A (en) * 2018-09-10 2019-01-04 郑州云海信息技术有限公司 A kind of boot firmware method for refreshing and device
CN109345665A (en) * 2018-09-18 2019-02-15 金邦达有限公司 A kind of separate type novel intelligent door-locking system and its working method
CN109472132A (en) * 2018-11-12 2019-03-15 深圳市腾瑞丰科技有限公司 Anti- brush machine guard method and device
CN109862099A (en) * 2019-01-15 2019-06-07 浙江吉利汽车研究院有限公司 An upgrade verification method, device, terminal and system
CN109862099B (en) * 2019-01-15 2022-07-12 浙江吉利汽车研究院有限公司 An upgrade verification method, device, terminal and system
CN112929871A (en) * 2019-12-05 2021-06-08 上海艾拉比智能科技有限公司 OTA upgrade package acquisition method, electronic device and storage medium
CN112929871B (en) * 2019-12-05 2024-10-29 上海艾拉比智能科技有限公司 OTA upgrade package acquisition method, electronic equipment and storage medium
CN111240709A (en) * 2019-12-26 2020-06-05 深圳市优博讯科技股份有限公司 Firmware upgrading method and system of POS equipment based on android system
CN111241522A (en) * 2020-01-07 2020-06-05 杭州涂鸦信息技术有限公司 Firmware signature method and device and storage medium
CN112714507A (en) * 2021-01-15 2021-04-27 江苏正赫通信息科技有限公司 Method for data security transmission between wireless ad hoc networks
CN112714507B (en) * 2021-01-15 2024-03-01 江苏正赫通信息科技有限公司 Method for data security transmission between wireless ad hoc networks
CN112948838A (en) * 2021-02-24 2021-06-11 长沙海格北斗信息技术有限公司 Chip encryption starting method, navigation chip and receiver thereof
CN113688399A (en) * 2021-08-25 2021-11-23 深圳忆联信息系统有限公司 Firmware digital signature protection method and device, computer equipment and storage medium
CN113810198A (en) * 2021-09-18 2021-12-17 深圳忆联信息系统有限公司 Method, device, computer device and storage medium for digital signature of SSD firmware
CN114430336A (en) * 2021-12-21 2022-05-03 成都鲁易科技有限公司 Decrypted data display method and device, storage medium and computer equipment
CN114430336B (en) * 2021-12-21 2023-10-03 成都鲁易科技有限公司 Method and device for displaying decrypted data, storage medium and computer equipment
CN116418511A (en) * 2021-12-31 2023-07-11 科大国盾量子技术股份有限公司 A firmware integrity verification method and system for QKD equipment based on national secret algorithm
CN114386112A (en) * 2022-01-18 2022-04-22 苏州忆联信息系统有限公司 Method and device for realizing SSD digital signature authentication, computer equipment and storage medium
CN115147967A (en) * 2022-06-02 2022-10-04 福建新大陆通信科技股份有限公司 Information verification method and system based on CTID and super SIM card
CN115147967B (en) * 2022-06-02 2023-12-15 福建新大陆通信科技股份有限公司 Information verification method and system based on CTID and super SIM card

Similar Documents

Publication Publication Date Title
CN104506515A (en) Firmware protection method and firmware protection device
CN110597538B (en) Software upgrading method and OTA upgrading system based on OTA upgrading system
CN109309565B (en) Security authentication method and device
CN103995991B (en) Method for binding hardware information and secret keys in software copyright protection
EP2659373B1 (en) System and method for secure software update
KR101754308B1 (en) Method for management sensitive data of mobile and escrow server for performing the method
CN101145906B (en) Method and system for authenticating legality of receiving terminal in unidirectional network
KR102028197B1 (en) Hardware secure module, method for updating integrity check value stored in the hardware secure module and program stored in terminal by the hardware secure module
WO2014044170A1 (en) Method for local service unit authenticating application of android client
CN104639506B (en) Method, system and the terminal for carrying out management and control are installed to application program
JP5613596B2 (en) Authentication system, terminal device, authentication server, and program
WO2016019790A1 (en) Verification method, client, server and system for installation package
CN114244522B (en) Information protection method, device, electronic equipment and computer readable storage medium
WO2013185724A2 (en) Mobile terminal and software upgrade method thereof
CN113114668A (en) Information transmission method, mobile terminal, storage medium and electronic equipment
KR101314751B1 (en) Apparatus for managing installation of DRM and method thereof
KR20130008939A (en) Apparatus and method for preventing a copy of terminal's unique information in a mobile terminal
CN105099705A (en) A secure communication method and system based on USB protocol
CN104394467B (en) Method for downloading set-top box application program and set-top box
CN115242397A (en) OTA upgrade security verification method and readable storage medium for vehicle EUC
CN105871858A (en) Method and system for ensuring high data safety
WO2021259310A1 (en) Over-the-air updating method, update server, terminal device, and internet of things system
CN105100030B (en) Access control method, system and device
JP2009199147A (en) Communication control method and communication control program
CN117828561B (en) Method, device, system and storage medium for secure burning of chip firmware data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150408