[go: up one dir, main page]

CN105190637A - Software security detection method, apparatus and device - Google Patents

Software security detection method, apparatus and device Download PDF

Info

Publication number
CN105190637A
CN105190637A CN201480000117.8A CN201480000117A CN105190637A CN 105190637 A CN105190637 A CN 105190637A CN 201480000117 A CN201480000117 A CN 201480000117A CN 105190637 A CN105190637 A CN 105190637A
Authority
CN
China
Prior art keywords
software code
network element
element device
network management
summary info
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201480000117.8A
Other languages
Chinese (zh)
Inventor
谭平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN105190637A publication Critical patent/CN105190637A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

软件安全性检测方法、装置及设备,所述方法包括:网管设备从网元设备获得原始摘要信息,原始摘要信息是网元设备为加载在内存中的软件代码生成的摘要信息;网管设备接收网元设备发送的验证摘要信息,验证摘要信息是网元设备在软件代码运行过程中生成的摘要信息;网管设备比较验证摘要信息与原始摘要信息是否一致,若否,则确定软件代码不安全,若是,则确定软件代码安全。应用本发明实施例,由于网元设备可以通过向网管设备发送软件运行过程中的摘要信息,因此可以检测出软件在运行过程中是否受到恶意攻击,从而可以对网元设备上运行过程中的软件的安全性进行保护,提高了软件的动态安全性。

A software security detection method, device, and device, the method comprising: the network management device obtains original abstract information from the network element device, and the original abstract information is the summary information generated by the network element device for the software code loaded in the memory; the network management device receives the network The verification summary information sent by the element device. The verification summary information is the summary information generated by the network element device during the software code operation; the network management device compares whether the verification summary information is consistent with the original summary information. If not, it determines that the software code is not safe. If it is , it is determined that the software code is safe. Applying the embodiment of the present invention, since the network element device can send the summary information of the software running process to the network management device, it can detect whether the software is maliciously attacked during the running process, so that the software during the running process on the network element device can be The security of the system is protected, which improves the dynamic security of the software.

Description

软件安全性柃测方法、 装置及设备 Software security monitoring method, device and equipment

技术领域 technical field

[01] 本发明涉及信息安全技术领域, 特别涉及软件安全性检测方法、 装置及设备。 背景技术 [01] The present invention relates to the technical field of information security, in particular to a software security detection method, device and equipment. Background technique

[02] 恶意软件可以通过修改、 替换某些网元设备上的软件, 入侵网元设备的系统, 并对系统进行破坏, 或者窃取网元设备上的信息。现有技术中, 通常可以采用数字签 名的方式对网元设备上软件的完整性进行验证,即网管设备可以在发布软件或者进行 软件升级时, 生成软件的数字签名, 并将数字签名打包在软件中, 然后发送给网元设 备, 网元设备在加载软件之前, 根据数字签名对软件的安全性进行验证, 验证通过后 对软件进行加载。 [02] Malicious software can modify and replace the software on some network element devices, invade the system of the network element devices, and destroy the system, or steal information on the network element devices. In the prior art, digital signatures are usually used to verify the integrity of the software on the network element device, that is, the network management device can generate a digital signature of the software when releasing the software or performing a software upgrade, and package the digital signature in the software and then send it to the network element device. Before loading the software, the network element device verifies the security of the software according to the digital signature, and loads the software after passing the verification.

[03] 发明人在对现有技术的研究过程中发现, 在对网元设备上软件的完整性和可信 性进行保护时,通常只能在软件加载之前进行验证,这种验证方式是一种静态的验证 方式,当软件在加载完成后的运行过程中受到恶意攻击时,由于难以对软件进行验证, 因此降低了网元设备上软件运行过程中的动态安全性。 发明内容 [03] The inventor found in the research process of the prior art that when protecting the integrity and credibility of the software on the network element device, it is usually only verified before the software is loaded. This verification method is a A static verification method, when the software is maliciously attacked during the running process after the loading is completed, it is difficult to verify the software, thus reducing the dynamic security of the software running process on the network element device. Contents of the invention

[04] 本发明实施例提供了软件安全性检测方法、 装置及设备, 以解决现有技术中的 网元设备难以保护软件运行过程中的动态安全性的问题。 [04] Embodiments of the present invention provide a software security detection method, device, and equipment to solve the problem that it is difficult for network element equipment in the prior art to protect dynamic security during software operation.

[05] 为了解决上述技术问题, 本发明实施例公开了如下技术方案: [06] 第一方面, 提供一种软件安全性检测方法, 所述方法包括: [07] 网管设备从网元设备获得原始摘要信息, 所述原始摘要信息是所述网元设备为 加载在内存中的软件代码生成的摘要信息; [05] In order to solve the above technical problems, the embodiment of the present invention discloses the following technical solutions: [06] In the first aspect, a software security detection method is provided, the method includes: [07] The network management device obtains from the network element device original summary information, where the original summary information is summary information generated by the network element device for the software code loaded in the memory;

[08] 所述网管设备接收所述网元设备发送的验证摘要信息, 所述验证摘要信息是所 述网元设备在所述软件代码运行过程中生成的摘要信息; [09] 所述网管设备比较所述验证摘要信息与所述原始摘要信息是否一致, 若否, 则 确定所述软件代码不安全, 若是, 则确定所述软件代码安全。 [08] The network management device receives the verification summary information sent by the network element device, and the verification summary information is summary information generated by the network element device during the operation of the software code; [09] The network management device compares whether the verification summary information is consistent with the original summary information, and if not, determines that the software code is not safe, and if so, determines that the software code is safe.

[10] 结合第一方面, 在第一方面的第一种可能的实现方式中, 所述网管设备从网元 设备获得原始摘要信息, 包括: [11] 所述网管设备向所述网元设备发送原始摘要信息的请求消息, 并接收所述网元 设备根据所述原始摘要信息的请求消息返回的所述原始摘要信息; 或者, [10] With reference to the first aspect, in a first possible implementation manner of the first aspect, the network management device obtains original summary information from the network element device, including: [11] The network management device sends the network element device sending a request message for original summary information, and receiving the original summary information returned by the network element device according to the request message for original summary information; or,

[12] 所述网管设备接收所述网元设备在内存中加载完所述软件代码时, 向所述网管 设备上报的所述原始摘要信息。 [12] The network management device receives the original summary information reported to the network management device when the network element device finishes loading the software code in memory.

[13] 结合第一方面, 或第一方面的第一种可能的实现方式, 在第一方面的第二种可 能的实现方式中, 所述网管设备接收所述网元设备发送的验证摘要信息, 包括: [13] With reference to the first aspect, or the first possible implementation of the first aspect, in the second possible implementation of the first aspect, the network management device receives the verification summary information sent by the network element device , include:

[14] 所述网管设备接收所述网元设备按照设置的时间周期上报的所述验证摘要信 息; 或者, [14] The network management device receives the verification summary information reported by the network element device according to the set time period; or,

[15] 所述网管设备向所述网元设备发送验证摘要信息的上报请求消息, 并接收所述 网元设备根据所述验证摘要信息的上报请求消息返回的所述验证摘要信息。 [16] 第二方面, 提供一种软件安全性检测方法, 所述方法包括: [15] The network management device sends a report request message of verification summary information to the network element device, and receives the verification summary information returned by the network element device according to the report request message of the verification summary information. [16] In the second aspect, a software security detection method is provided, the method comprising:

[17] 网元设备将原始摘要信息发送给网管设备, 所述原始摘要信息是所述网元设备 为加载在内存中的软件代码生成的摘要信息; [17] The network element device sends the original summary information to the network management device, and the original summary information is the summary information generated by the network element device for the software code loaded in the memory;

[18] 所述网元设备在所述软件代码运行过程中向所述网管设备发送所述软件代码的 验证摘要信息,以使所述网管设备通过比较所述验证摘要信息与所述原始摘要信息确 定所述软件代码是否安全。 [18] The network element device sends the verification summary information of the software code to the network management device during the operation of the software code, so that the network management device compares the verification summary information with the original summary information It is determined whether the software code is secure.

[19] 结合第二方面, 在第二方面的第一种可能的实现方式中, 所述网元设备将所述 原始摘要信息发送给网管设备, 包括: [19] With reference to the second aspect, in a first possible implementation manner of the second aspect, the network element device sends the original summary information to the network management device, including:

[20] 所述网元设备接收所述网管设备发送的原始摘要信息的请求消息, 根据所述原 始摘要信息的请求消息为加载在内存中的软件代码生成所述原始摘要信息,并将所述 原始摘要信息发送给所述网管设备; 或者, [21] 所述网元设备在内存中加载完所述软件代码时, 为所述软件代码生成所述原始 摘要信息, 并向所述网管设备上报所述原始摘要信息。 [20] The network element device receives the request message of the original summary information sent by the network management device, generates the original summary information for the software code loaded in the memory according to the request message of the original summary information, and sends the sending the original summary information to the network management device; or, [21] When the network element device finishes loading the software code in the memory, generate the original summary information for the software code, and report the original summary information to the network management device.

[22] 结合第二方面, 或第二方面的第一种可能的实现方式, 在第二方面的第二种可 能的实现方式中,所述网元设备在所述软件代码运行过程中向所述网管设备发送所述 软件代码的验证摘要信息, 包括: [22] With reference to the second aspect, or the first possible implementation manner of the second aspect, in the second possible implementation manner of the second aspect, the network element device sends The network management device sends the verification summary information of the software code, including:

[23] 所述网元设备在所述软件代码运行过程中, 按照设置的时间周期生成所述软件 代码的验证摘要信息, 并向所述网管设备发送所述验证摘要信息; 或者, [23] During the running process of the software code, the network element device generates verification summary information of the software code according to a set time period, and sends the verification summary information to the network management device; or,

[24] 所述网元设备在所述软件代码运行过程中接收所述网管设备发送的验证摘要信 息的上报请求消息,根据所述验证摘要信息的上报请求消息生成所述软件代码的验证 摘要信息, 并将所述验证摘要信息发送给所述网管设备。 [24] The network element device receives the report request message of the verification summary information sent by the network management device during the operation of the software code, and generates the verification summary information of the software code according to the report request message of the verification summary information , and send the verification summary information to the network management device.

[25] 第三方面, 提供一种软件安全性检测装置, 所述装置包括: [25] In the third aspect, a software security detection device is provided, and the device includes:

[26] 获得单元, 用于从网元设备获得原始摘要信息, 所述原始摘要信息是所述网元 设备为加载在内存中的软件代码生成的摘要信息; [26] An obtaining unit, configured to obtain original summary information from the network element device, where the original summary information is summary information generated by the network element device for the software code loaded in the memory;

[27] 接收单元, 用于接收所述网元设备发送的验证摘要信息, 所述验证摘要信息是 所述网元设备在所述软件代码运行过程中生成的摘要信息; [27] a receiving unit, configured to receive the verification summary information sent by the network element device, where the verification summary information is summary information generated by the network element device during the running of the software code;

[28] 检测单元, 用于比较所述接收单元接收的所述验证摘要信息与所述获得单元获 得的所述原始摘要信息是否一致, 若否, 则确定所述软件代码不安全, 若是, 则确定 所述软件代码安全。 [28] A detection unit, configured to compare whether the verification summary information received by the receiving unit is consistent with the original summary information obtained by the obtaining unit, if not, determine that the software code is not safe, and if so, then The software code is determined to be secure.

[29] 结合第三方面, 在第三方面的第一种可能的实现方式中, [30] 所述获得单元包括: 请求消息发送子单元和第一原始摘要接收子单元; [29] With reference to the third aspect, in a first possible implementation manner of the third aspect, [30] the obtaining unit includes: a request message sending subunit and a first original abstract receiving subunit;

[31] 所述请求消息发送子单元,用于向所述网元设备发送原始摘要信息的请求消息; [31] The request message sending subunit is configured to send a request message of original summary information to the network element device;

[32] 所述第一原始摘要接收子单元, 用于接收所述网元设备根据所述请求消息发送 子单元发送的所述原始摘要信息的请求消息返回的所述原始摘要信息; [32] The first original summary receiving subunit is configured to receive the original summary information returned by the network element device according to the request message of the original summary information sent by the request message sending subunit;

[33] 或者, 所述获得单元包括: 第二原始摘要接收子单元; [34] 所述第二原始摘要接收子单元, 用于接收所述网元设备在内存中加载完所述软 件代码时上报的所述原始摘要信息。 [33] Alternatively, the obtaining unit includes: a second original abstract receiving subunit; [34] The second original summary receiving subunit is configured to receive the original summary information reported by the network element device after loading the software code in memory.

[35] 结合第三方面, 或第三方面的第一种可能的实现方式, 在第三方面的第二种可 能的实现方式中, [36] 所述接收单元包括: 第一验证摘要接收子单元; [35] In combination with the third aspect, or the first possible implementation manner of the third aspect, in the second possible implementation manner of the third aspect, [36] the receiving unit includes: a first verification digest receiving unit unit;

[37] 所述第一验证摘要接收子单元, 用于接收所述网元设备按照设置的时间周期上 报的所述验证摘要信息; [37] The first verification summary receiving subunit is configured to receive the verification summary information reported by the network element device according to a set time period;

[38] 或者, 所述接收单元包括: 上报请求发送子单元和第二验证摘要接收子单元; [38] Alternatively, the receiving unit includes: a report request sending subunit and a second verification summary receiving subunit;

[39] 所述上报请求发送子单元, 用于向所述网元设备发送验证摘要信息的上报请求 消息; [39] The report request sending subunit is configured to send a report request message of verification summary information to the network element device;

[40] 所述第二验证摘要接收子单元, 用于接收所述网元设备根据所述上报请求发送 子单元发送的验证摘要信息的上报请求消息返回的所述验证摘要信息。 [40] The second verification summary receiving subunit is configured to receive the verification summary information returned by the network element device according to the report request message of the verification summary information sent by the report request sending subunit.

[41] 第四方面, 提供一种软件安全性检测装置, 所述装置包括: [41] In the fourth aspect, a software security detection device is provided, and the device includes:

[42] 第一发送单元, 用于将原始摘要信息发送给网管设备, 所述原始摘要信息是为 加载在内存中的软件代码生成的摘要信息; [42] a first sending unit, configured to send the original summary information to the network management device, where the original summary information is summary information generated for the software code loaded in the memory;

[43] 第二发送单元, 用于在所述软件代码运行过程中向所述网管设备发送所述软件 代码的验证摘要信息,以使所述网管设备通过比较所述第二发送单元发送的验证摘要 信息与所述第一发送单元发送的原始摘要信息确定所述软件代码是否安全。 [43] The second sending unit is configured to send the verification summary information of the software code to the network management device during the running of the software code, so that the network management device can compare the verification information sent by the second sending unit. The summary information and the original summary information sent by the first sending unit determine whether the software code is safe.

[44] 结合第四方面, 在第四方面的第一种可能的实现方式中, [45] 所述第一发送单元包括: 请求消息接收子单元, 第一原始摘要生成子单元和第 一原始摘要发送子单元; [44] With reference to the fourth aspect, in the first possible implementation manner of the fourth aspect, [45] the first sending unit includes: a request message receiving subunit, a first original digest generating subunit and a first original Summary sending subunit;

[46] 所述请求消息接收子单元, 用于接收所述网管设备发送的原始摘要信息的请求 消息; [46] The request message receiving subunit is configured to receive the request message of the original summary information sent by the network management device;

[47] 所述第一原始摘要生成子单元, 用于根据所述请求消息接收子单元接收的原始 摘要信息的请求消息为加载在内存中的软件代码生成所述原始摘要信息; [47] The first original digest generating subunit is configured to receive the original digest received by the request message receiving subunit A request message for summary information generates said original summary information for software code loaded in memory;

[48] 所述第一原始摘要发送子单元, 用于将所述第一原始摘要生成子单元生成的原 始摘要信息发送给所述网管设备; [48] The first original digest sending subunit is configured to send the original digest information generated by the first original digest generating subunit to the network management device;

[49] 或者, 所述第一发送单元包括: 第二原始摘要生成子单元和第二原始摘要发送 子单元; [49] Alternatively, the first sending unit includes: a second original digest generating subunit and a second original digest sending subunit;

[50] 所述第二原始摘要生成子单元, 用于在内存中加载完所述软件代码时, 为所述 软件代码生成所述原始摘要信息; [50] The second original abstract generating subunit is configured to generate the original abstract information for the software code when the software code is loaded in the memory;

[51] 所述第二原始摘要发送子单元, 用于向所述网管设备上报所述第二原始摘要生 成子单元生成的原始摘要信息。 [51] The second original digest sending subunit is configured to report the original digest information generated by the second original digest generating subunit to the network management device.

[52] 结合第四方面, 或第四方面的第一种可能的实现方式, 在第四方面的第二种可 能的实现方式中, [52] In combination with the fourth aspect, or the first possible implementation of the fourth aspect, in the second possible implementation of the fourth aspect,

[53] 所述第二发送单元包括: 第一验证摘要生成单元和第一验证摘要发送子单元; [53] The second sending unit includes: a first verification digest generation unit and a first verification digest sending subunit;

[54] 所述第一验证摘要生成单元, 用于在所述软件代码运行过程中, 按照设置的时 间周期生成所述软件代码的验证摘要信息; [54] The first verification summary generating unit is configured to generate verification summary information of the software code according to a set time period during the running of the software code;

[55] 所述第一验证摘要发送子单元, 用于向所述网管设备发送所述第一验证摘要生 成单元生成的验证摘要信息; [55] The first verification summary sending subunit is configured to send the verification summary information generated by the first verification summary generation unit to the network management device;

[56] 或者, 所述第二发送单元包括: 上报请求接收子单元、 第二验证摘要生成子单 元和第二验证摘要发送子单元; [56] Alternatively, the second sending unit includes: a report request receiving subunit, a second verification summary generation subunit, and a second verification summary sending subunit;

[57] 所述上报请求接收子单元, 用于在所述软件代码运行过程中接收所述网管设备 发送的验证摘要信息的上报请求消息; [57] The report request receiving subunit is configured to receive a report request message of verification summary information sent by the network management device during the operation of the software code;

[58] 所述第二验证摘要生成子单元, 用于根据所述上报请求接收子单元接收的验证 摘要信息的上报请求消息生成所述软件代码的验证摘要信息; [58] The second verification summary generating subunit is configured to generate the verification summary information of the software code according to the report request message of the verification summary information received by the report request receiving subunit;

[59] 所述第二验证摘要发送子单元, 用于将所述第二验证摘要生成子单元生成的验 证摘要信息发送给所述网管设备。 [60] 第五方面, 提供一种网管设备, 所述网管设备包括: 网络接口和处理器, 其中, [59] The second verification summary sending subunit is configured to send the verification summary information generated by the second verification summary generation subunit to the network management device. [60] In the fifth aspect, a network management device is provided, and the network management device includes: a network interface and a processor, wherein,

[61] 所述网络接口, 用于从网元设备获得原始摘要信息, 所述原始摘要信息是所述 网元设备为加载在内存中的软件代码生成的摘要信息,以及接收所述网元设备发送的 验证摘要信息,所述验证摘要信息是所述网元设备在所述软件代码运行过程中生成的 摘要信息; [61] The network interface is configured to obtain original summary information from the network element device, where the original summary information is summary information generated by the network element device for the software code loaded in the memory, and receive the network element device The verification summary information sent, the verification summary information is the summary information generated by the network element device during the operation of the software code;

[62] 所述处理器, 用于比较所述验证摘要信息与所述原始摘要信息是否一致, 若否, 则确定所述软件代码不安全, 若是, 则确定所述软件代码安全。 [62] The processor is configured to compare whether the verification summary information is consistent with the original summary information, if not, determine that the software code is not safe, and if so, determine that the software code is safe.

[63] 结合第五方面, 在第五方面的第一种可能的实现方式中, 所述网络接口, 具体 用于向所述网元设备发送原始摘要信息的请求消息,并接收所述网元设备根据所述原 始摘要信息的请求消息返回的所述原始摘要信息; 或者,接收所述网元设备在内存中 加载完所述软件代码时, 向所述网管设备上报的所述原始摘要信息。 [63] With reference to the fifth aspect, in a first possible implementation manner of the fifth aspect, the network interface is specifically configured to send a request message of original summary information to the network element device, and receive the network element The original summary information returned by the device according to the request message of the original summary information; or, receiving the original summary information reported to the network management device when the network element device finishes loading the software code in the memory.

[64] 结合第五方面, 或第五方面的第一种可能的实现方式, 在第五方面的第二种可 能的实现方式中,所述网络接口, 具体用于接收所述网元设备按照设置的时间周期上 报的所述验证摘要信息; 或者, 向所述网元设备发送验证摘要信息的上报请求消息, 并接收所述网元设备根据所述验证摘要信息的上报请求消息返回的所述验证摘要信 息。 [64] With reference to the fifth aspect, or the first possible implementation manner of the fifth aspect, in the second possible implementation manner of the fifth aspect, the network interface is specifically configured to receive the network element device according to The verification summary information reported at a set time period; or, sending a report request message of verification summary information to the network element device, and receiving the report request message returned by the network element device according to the verification summary information report request message Verify summary information.

[65] 第六方面, 提供一种网元设备, 所述网元设备包括: 网络接口和处理器, 其中, [65] In a sixth aspect, a network element device is provided, and the network element device includes: a network interface and a processor, wherein,

[66] 所述处理器, 用于通过所述网络接口将原始摘要信息发送给网管设备, 所述原 始摘要信息是所述网元设备为加载在内存中的软件代码生成的摘要信息, 以及,在所 述软件代码运行过程中通过所述网络接口向所述网管设备发送所述软件代码的验证 摘要信息,以使所述网管设备通过比较所述验证摘要信息与所述原始摘要信息确定所 述软件代码是否安全。 [66] The processor is configured to send original summary information to the network management device through the network interface, where the original summary information is summary information generated by the network element device for the software code loaded in the memory, and, During the running process of the software code, the verification summary information of the software code is sent to the network management device through the network interface, so that the network management device determines the Whether the software code is secure.

[67] 结合第六方面, 在第六方面的第一种可能的实现方式中, 所述处理器, 具体用 于当所述网络接口接收所述网管设备发送的原始摘要信息的请求消息后,根据所述原 始摘要信息的请求消息为加载在内存中的软件代码生成所述原始摘要信息,并通过所 述网络接口将所述原始摘要信息发送给所述网管设备; 或者,在内存中加载完所述软 件代码时, 为所述软件代码生成所述原始摘要信息, 并通过所述网络接口向所述网管 设备上报所述原始摘要信息。 [67] With reference to the sixth aspect, in a first possible implementation manner of the sixth aspect, the processor is specifically configured to, after the network interface receives the original summary information request message sent by the network management device, Generate the original summary information for the software code loaded in the memory according to the request message of the original summary information, and send the original summary information to the network management device through the network interface; or, after loading in the memory, When the software code is used, the original summary information is generated for the software code and sent to the network management through the network interface The device reports the original summary information.

[68] 结合第六方面, 或第六方面的第一种可能的实现方式, 在第六方面的第二种可 能的实现方式中, 所述处理器, 具体用于在所述软件代码运行过程中, 按照设置的时 间周期生成所述软件代码的验证摘要信息,并通过所述网络接口向所述网管设备发送 所述验证摘要信息; 或者,在所述软件代码运行过程中当所述网络接口接收所述网管 设备发送的验证摘要信息的上报请求消息后,根据所述验证摘要信息的上报请求消息 生成所述软件代码的验证摘要信息,并通过所述网络接口将所述验证摘要信息发送给 所述网管设备。 [68] With reference to the sixth aspect, or the first possible implementation manner of the sixth aspect, in the second possible implementation manner of the sixth aspect, the processor is specifically configured to: , generating the verification summary information of the software code according to the set time period, and sending the verification summary information to the network management device through the network interface; or, when the software code is running, when the network interface After receiving the report request message of the verification summary information sent by the network management device, generating the verification summary information of the software code according to the report request message of the verification summary information, and sending the verification summary information to The network management device.

[69] 本发明实施例中, 网管设备从网元设备获得原始摘要信息, 该原始摘要信息是 网元设备为加载在内存中的软件代码生成的摘要信息,网元设备在软件代码运行过程 中生成验证摘要信息, 网管设备接收网元设备发送的验证摘要信息, 并比较验证摘要 信息与原始摘要信息是否一致, 若否, 则确定软件代码不安全, 若是, 则确定软件代 码安全。应用本发明实施例, 由于网元设备可以通过向网管设备发送软件运行过程中 的摘要信息, 因此可以检测出软件在运行过程中是否受到恶意攻击, 从而可以对网元 设备上运行过程中的软件的安全性进行保护, 提高了软件的动态安全性。 附图说明 [69] In the embodiment of the present invention, the network management device obtains the original summary information from the network element device. The original summary information is the summary information generated by the network element device for the software code loaded in the memory. The verification summary information is generated, and the network management device receives the verification summary information sent by the network element device, and compares whether the verification summary information is consistent with the original summary information. If not, it is determined that the software code is not safe, and if so, it is determined that the software code is safe. By applying the embodiment of the present invention, since the network element device can send the summary information of the software running process to the network management device, it can detect whether the software is maliciously attacked during the running process, so that the software during the running process on the network element device can be The security of the system is protected, which improves the dynamic security of the software. Description of drawings

[70] 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施例或 现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅 仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的 前提下, 还可以根据这些附图获得其他的附图。 [70] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the following descriptions The drawings are only some embodiments of the present invention, and those skilled in the art can obtain other drawings based on these drawings without any creative effort.

[71] 图 1A为本发明软件安全性检测方法的一个实施例流程图; [71] Figure 1A is a flowchart of an embodiment of the software security detection method of the present invention;

[72] 图 1B为本发明软件安全性检测方法的另一个实施例流程图; [72] Figure 1B is a flowchart of another embodiment of the software security detection method of the present invention;

[73] 图 2为本发明软件安全性检测方法的另一个实施例流程图; [73] Figure 2 is a flow chart of another embodiment of the software security detection method of the present invention;

[74] 图 3为本发明软件安全性检测方法的另一个实施例流程图; [75] 图 4为本发明软件安全性检测方法的另一个实施例流程图; [74] FIG. 3 is a flowchart of another embodiment of the software security detection method of the present invention; [75] FIG. 4 is a flowchart of another embodiment of the software security detection method of the present invention;

[76] 图 5为本发明软件安全性检测方法的另一个实施例流程图; [77] 图 6为本发明软件安全性检测装置的一个实施例框图; [76] Figure 5 is a flowchart of another embodiment of the software security detection method of the present invention; [77] Figure 6 is a block diagram of an embodiment of the software security detection device of the present invention;

[78] 图 7为本发明软件安全性检测装置的另一个实施例框图; [78] FIG. 7 is a block diagram of another embodiment of the software security detection device of the present invention;

[79] 图 8为本发明网管设备的实施例框图; [80] 图 9为本发明网元设备的实施例框图。 具体实施方式 [79] FIG. 8 is a block diagram of an embodiment of the network management device of the present invention; [80] FIG. 9 is a block diagram of an embodiment of the network element device of the present invention. Detailed ways

[81] 为了使本技术领域的人员更好地理解本发明实施例中的技术方案, 并使本发明 实施例的上述目的、特征和优点能够更加明显易懂, 下面结合附图对本发明实施例中 技术方案作进一步详细的说明。 [81] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the embodiments of the present invention more obvious and understandable, the following describes the embodiments of the present invention in conjunction with the accompanying drawings The technical scheme in the middle is described in further detail.

[82] 参见图 1A, 为本发明软件安全性检测方法的一个实施例流程图, 该实施例从网 管设备侧描述了软件运行过程中的安全性检测过程: [82] Referring to Figure 1A, it is a flow chart of an embodiment of the software security detection method of the present invention. This embodiment describes the security detection process during software operation from the side of the network management device:

[83] 步骤 101 : 网管设备从网元设备获得原始摘要信息,该原始摘要信息是网元设备 为加载在内存中的软件代码生成的摘要信息。 [83] Step 101: The network management device obtains the original summary information from the network element device, and the original summary information is the summary information generated by the network element device for the software code loaded in the memory.

[84] 可选的, 网管设备可以向网元设备发送原始摘要信息的请求消息, 并接收网元 设备根据原始摘要信息的请求消息返回的原始摘要信息; 或者, 网管设备也可以接收 网元设备在内存中加载完软件代码时, 向网管设备上报的原始摘要信息。 [84] Optionally, the network management device can send a request message for the original summary information to the network element device, and receive the original summary information returned by the network element device according to the original summary information request message; or, the network management device can also receive the network element device The original summary information reported to the network management device when the software code is loaded in the memory.

[85] 步骤 102: 网管设备接收网元设备发送的验证摘要信息,该验证摘要信息是网元 设备在软件代码运行过程中生成的摘要信息。 [85] Step 102: The network management device receives the verification summary information sent by the network element device. The verification summary information is the summary information generated by the network element device during the running of the software code.

[86] 可选的, 网管设备可以接收网元设备按照设置的时间周期上报的验证摘要信息; 或者, 网管设备也可以向网元设备发送验证摘要信息的上报请求消息, 并接收网元设 备根据验证摘要信息的上报请求消息返回的验证摘要信息。 [86] Optionally, the network management device can receive the verification summary information reported by the network element device according to the set time period; or, the network management device can also send a report request message of the verification summary information to the network element device, and receive the network element device according The verification summary information returned by the report request message of the verification summary information.

[87] 步骤 103: 网管设备比较验证摘要信息与原始摘要信息是否一致, 若否, 则确定 软件代码不安全, 若是, 则确定软件代码安全。 [87] Step 103: The network management device compares and verifies whether the summary information is consistent with the original summary information. If not, it is determined that the software code is not safe, and if so, it is determined that the software code is safe.

[88] 由上述实施例可见, 由于网元设备可以通过向网管设备发送软件运行过程中的 摘要信息, 因此可以检测出软件在运行过程中是否受到恶意攻击, 从而可以对网元设 备上运行过程中的软件的安全性进行保护, 提高了软件的动态安全性。 [89] 参见图 1B, 为本发明软件安全性检测方法的另一个实施例流程图, 该实施例从 网元设备侧描述了软件运行过程中的安全性检测过程: [88] It can be seen from the above embodiments that since the network element device can send the summary information of the software running process to the network management device, it can detect whether the software is maliciously attacked during the running process, so that the running process on the network element device can be analyzed The security of the software in the system is protected, and the dynamic security of the software is improved. [89] Referring to FIG. 1B, it is a flow chart of another embodiment of the software security detection method of the present invention. This embodiment describes the security detection process during software operation from the network element device side:

[90] 步骤 111 : 网元设备将原始摘要信息发送给网管设备,原始摘要信息是网元设备 为加载在内存中的软件代码生成的摘要信息。 [91] 可选的, 网元设备可以接收网管设备发送的原始摘要信息的请求消息, 根据原 始摘要信息的请求消息为加载在内存中的软件代码生成原始摘要信息,并将原始摘要 信息发送给网管设备; 或者, 网元设备也可以在内存中加载完软件代码时, 为软件代 码生成原始摘要信息, 并向网管设备上报原始摘要信息。 [90] Step 111: The network element device sends the original summary information to the network management device, and the original summary information is the summary information generated by the network element device for the software code loaded in the memory. [91] Optionally, the network element device can receive the request message of the original summary information sent by the network management device, generate the original summary information for the software code loaded in the memory according to the request message of the original summary information, and send the original summary information to A network management device; or, the network element device may also generate original summary information for the software code when the software code is loaded in the memory, and report the original summary information to the network management device.

[92] 步骤 112:网元设备在软件代码运行过程中向网管设备发送软件代码的验证摘要 信息, 以使网管设备通过比较验证摘要信息与原始摘要信息确定软件代码是否安全。 [92] Step 112: The network element device sends the verification summary information of the software code to the network management device during the software code operation, so that the network management device determines whether the software code is safe by comparing the verification summary information with the original summary information.

[93] 可选的, 网元设备可以在软件代码运行过程中, 按照设置的时间周期生成软件 代码的验证摘要信息, 并向网管设备发送验证摘要信息; 或者, 网元设备也可以在软 件代码运行过程中接收网管设备发送的验证摘要信息的上报请求消息,根据验证摘要 信息的上报请求消息生成软件代码的验证摘要信息,并将验证摘要信息发送给网管设 备。 [93] Optionally, the network element device can generate the verification summary information of the software code according to the set time period during the running of the software code, and send the verification summary information to the network management device; or, the network element device can also be in the software code During operation, the network management device receives the report request message of the verification summary information, generates the verification summary information of the software code according to the report request message of the verification summary information, and sends the verification summary information to the network management device.

[94] 由上述实施例可见, 由于网元设备可以通过向网管设备发送软件运行过程中的 摘要信息, 因此可以检测出软件在运行过程中是否受到恶意攻击, 从而可以对网元设 备上运行过程中的软件的安全性进行保护, 提高了软件的动态安全性。 [94] It can be seen from the above embodiments that since the network element device can send the summary information of the software running process to the network management device, it can detect whether the software is maliciously attacked during the running process, so that the running process on the network element device can be analyzed. The security of the software in the system is protected, and the dynamic security of the software is improved.

[95] 参见图 2, 为本发明软件安全性检测方法的另一个实施例流程图: [96] 步骤 201 : 网元设备将软件加载到内存。 [95] Referring to FIG. 2, it is a flowchart of another embodiment of the software security detection method of the present invention: [96] Step 201: The network element device loads the software into the memory.

[97] 本发明实施例中, 网元设备可以具体为单板等, 网元设备上可以设置有通过总 线连接的片上系统 (System on Chip, SoC) 安全芯片和内存等, 其中, SoC 安全芯 片可以进一步包含中央处理器 (Central Processing Unit, CPU), 现场可编程门阵 列 (Field— Programmable Gate Array, FPGA)、 数字信号处理器 (Digital Signal Processor, DSP)、复杂可编程逻辑器件 ( Complex Programmable Logic Device, CPU)) 等, 内存可以包含随机存储器 (Random Access Memory, RAM), 闪存 (Flash) 等。 [98] 当网管设备发布新的软件, 或者对现有软件进行升级的软件时, 会为这些软件 生成数字签名, 即网管设备计算软件的摘要信息, 并通过私钥加密该摘要信息后生成 数字签名, 将数字签名打包在软件中, 并将该软件包发送给网元设备, 现有技术中, 网元设备接收到软件包后, 获得其中的数字签名,用公钥解密该数字签名得到第一摘 要信息, 并同时按照与网管设备侧一致的方式计算软件的第二摘要信息, 如果第一摘 要信息与第二摘要信息一致, 则说明待加载的软件安全, 如果第一摘要信息与第二摘 要信息不一致, 则说明待加载的软件不安全, 以此保证待加载软件的静态安全性。 [97] In the embodiment of the present invention, the network element device may specifically be a single board, etc., and the network element device may be provided with a system on chip (System on Chip, SoC) security chip and memory connected through a bus, wherein the SoC security chip Can further include a central processing unit (Central Processing Unit, CPU), a field programmable gate array (Field—Programmable Gate Array, FPGA), a digital signal processor (Digital Signal Processor, DSP), a complex programmable logic device (Complex Programmable Logic Device, CPU)) etc. The memory can include random access memory (Random Access Memory, RAM), flash memory (Flash) and so on. [98] When the network management device releases new software or upgrades existing software, it will generate digital signatures for these software, that is, the network management device calculates the summary information of the software, and encrypts the summary information with a private key to generate a digital signature. Signature, package the digital signature in the software, and send the software package to the network element device. In the prior art, after the network element device receives the software package, it obtains the digital signature, and decrypts the digital signature with the public key to obtain the first One summary information, and at the same time calculate the second summary information of the software in a manner consistent with that of the network management device side. If the first summary information is consistent with the second summary information, it means that the software to be loaded is safe. If the first summary information is consistent with the second summary information If the summary information is inconsistent, it indicates that the software to be loaded is not safe, so as to ensure the static security of the software to be loaded.

[99] 当网元设备通过验证数字签名确定待加载的软件安全时, 将该软件加载到内存 中, 加载过程可以包括对软件的解压缩和初始化, 加载完成后, 该软件通常以软件代 码形式在内存中运行, 即待加载的软件与以加载到内存中的软件代码二者的形式不 同。 [99] When the network element device determines that the software to be loaded is safe by verifying the digital signature, the software is loaded into the memory. The loading process may include decompression and initialization of the software. After the loading is completed, the software is usually in the form of software code Running in memory, that is, the software to be loaded is not in the same form as the software code loaded into memory.

[100]步骤 202 : 网管设备向网元设备发送原始摘要信息的请求消息。 [100] Step 202: the network management device sends a request message for original summary information to the network element device.

[101]本实施例中, 网管设备可以具体为操作维护中心 ( Operation and Maintenance Center, OMC) 设备等, 每个网管设备可以实现与多个网元设备之间的通信。 [102]本实施例中, 可以由网管设备主动向网元设备发送原始摘要信息的请求消息, 网管设备可以在向网元设备发送软件包后的预设时间后发送该请求消息,该预设时间 以保证网元设备能够完成在内存中加载软件代码即可。 [101] In this embodiment, the network management device may specifically be an operation and maintenance center (Operation and Maintenance Center, OMC) device, etc., and each network management device may implement communication with multiple network element devices. [102] In this embodiment, the network management device may actively send a request message for the original summary information to the network element device, and the network management device may send the request message after a preset time after sending the software package to the network element device. Time is enough to ensure that the network element device can complete loading the software code in the memory.

[103]步骤 203 :网元设备根据原始摘要信息的请求消息为加载在内存中的软件代码后 生成原始摘要信息。 [104]本实施例中, 网元设备接收到原始摘要信息的请求消息后, 计算已加载在内存 中的软件代码的摘要信息, 将该摘要信息作为原始摘要信息。其中, 摘要信息也可以 称为消息摘要 (Message Digest ) , 或者数字摘要(Digital Digest) , 它是唯一对应 软件代码的固定长度的值, 它可以由一个单向哈希(Hash )加密函数对软件代码进行 作用而产生, 如果软件代码本身发生变化, 则计算出的摘要信息也会发生变化, 因此 通过摘要信息可以验证软件代码的安全性和完整性。 [103] Step 203: the network element device generates the original summary information for the software code loaded in the memory according to the request message of the original summary information. [104] In this embodiment, after receiving the original summary information request message, the network element device calculates the summary information of the software code loaded in the memory, and uses the summary information as the original summary information. Among them, the digest information can also be called a message digest (Message Digest), or a digital digest (Digital Digest), which is a fixed-length value uniquely corresponding to the software code, and it can be encrypted by a one-way hash (Hash) encryption function. If the software code itself changes, the calculated summary information will also change, so the security and integrity of the software code can be verified through the summary information.

[105]步骤 204: 网元设备将原始摘要信息发送给网管设备。 [105] Step 204: The network element device sends the original summary information to the network management device.

[106]步骤 205 : 网管设备保存原始摘要信息。 [107]步骤 206 : 网元设备在软件代码运行过程中,按照设置的时间周期生成软件代码 的验证摘要信息。 [106] Step 205: the network management device saves the original summary information. [107] Step 206: During the software code running process, the network element device generates the verification summary information of the software code according to the set time period.

[108]本实施例中, 为了验证软件代码运行过程中的安全性, 网元设备可以在软件代 码运行过程中, 按照设置的时间周期计算软件代码的摘要信息,将该摘要信息作为验 证摘要信息, 例如, 网元设备可以设置一个定时器, 当定时器的定时周期到达时, 触 发网元设备计算该定时周期的验证摘要信息。本步骤中,验证摘要信息的计算方式和 过程与原始摘要信息一致, 在此不再赘述。 [108] In this embodiment, in order to verify the security of the software code during running, the network element device can calculate the summary information of the software code according to the set time period during the running of the software code, and use the summary information as the verification summary information For example, the network element device may set a timer, and when the timing period of the timer arrives, the network element device is triggered to calculate the verification summary information for the timing period. In this step, the calculation method and process of verifying the summary information are consistent with the original summary information, and will not be repeated here.

[109]步骤 207 : 网元设备向网管设备上报验证摘要信息。 [109] Step 207: The network element device reports the verification summary information to the network management device.

[110]步骤 208 : 网管设备比较验证摘要信息与原始摘要信息是否一致, 当验证摘要信 息与原始摘要信息不一致时,确定软件代码不安全, 当验证摘要信息与原始摘要信息 一致时, 确定软件代码安全。 [110] Step 208: The network management device compares whether the verification summary information is consistent with the original summary information. When the verification summary information is inconsistent with the original summary information, it is determined that the software code is not safe. When the verification summary information is consistent with the original summary information, it is determined that the software code Safety.

[111]当网管设备接收到验证摘要信息后, 可以获取保存的原始摘要信息, 然后比较 验证摘要信息与原始摘要信息是否一致,如果一致则可以确定软件代码运行过程中未 被篡改, 软件代码安全, 如果不一致则可以确定软件代码运行过程中遭到篡改, 因此 软件代码不安全, 此时网管设备可以触发告警, 或者由管理员进行人工干预。 [111] When the network management device receives the verification summary information, it can obtain the saved original summary information, and then compare whether the verification summary information is consistent with the original summary information. If they are consistent, it can be determined that the software code has not been tampered with during operation, and the software code is safe. , if they are inconsistent, it can be determined that the software code has been tampered with during operation, so the software code is not safe. At this time, the network management device can trigger an alarm, or the administrator can perform manual intervention.

[112]由上述实施例可见, 由于网元设备可以通过向网管设备发送软件运行过程中的 摘要信息, 因此可以检测出软件在运行过程中是否受到恶意攻击, 从而可以对网元设 备上运行过程中的软件的安全性进行保护, 提高了软件的动态安全性。 [112] It can be seen from the above embodiments that since the network element device can send the summary information of the software running process to the network management device, it can detect whether the software is maliciously attacked during the running process, so that the running process on the network element device can be analyzed. The security of the software in the system is protected, and the dynamic security of the software is improved.

[113]参见图 3, 为本发明软件安全性检测方法的另一个实施例流程图: [114]步骤 301 : 网元设备将软件加载到内存。 [113] Referring to FIG. 3, it is a flowchart of another embodiment of the software security detection method of the present invention: [114] Step 301: The network element device loads the software into the memory.

[115]本发明实施例中, 网元设备可以具体为单板等, 网元设备上可以设置有通过 SoC 安全芯片和内存等, 其中, SoC安全芯片可以进一步包含 CPU、 FPGA、 DSP、 CPLD等, 内存可以包含 RAM、 Flash等。 [115] In the embodiment of the present invention, the network element device may specifically be a single board, etc., and the network element device may be provided with a SoC security chip and memory, etc., wherein the SoC security chip may further include CPU, FPGA, DSP, CPLD, etc. , the memory may include RAM, Flash and the like.

[116]当网管设备发布新的软件, 或者对现有软件进行升级的软件时, 会为这些软件 生成数字签名, 将数字签名打包在软件中, 并将该软件包发送给网元设备, 现有技术 中, 网元设备接收到软件包后, 获得其中的数字签名, 并通过验证数字签名确定软件 是否安全, 以此保证待加载软件的静态安全性。 网元设备对接收到的软件进行验证的 具体过程与前述步骤 201中的描述一致, 在此不再赘述。 [116] When the network management device releases new software or upgrades the existing software, it will generate digital signatures for these software, package the digital signatures in the software, and send the software package to the network element device. Now In the existing technology, after the network element device receives the software package, it obtains the digital signature therein, and determines the software package by verifying the digital signature Whether it is safe, so as to ensure the static safety of the software to be loaded. The specific process for the network element device to verify the received software is consistent with the description in the foregoing step 201, and will not be repeated here.

[117]当网元设备通过验证数字签名确定待加载的软件安全时, 将该软件加载到内存 中, 加载过程可以包括对软件的解压缩和初始化, 加载完成后, 该软件通常以软件代 码形式在内存中运行, 即待加载的软件与以加载到内存中的软件代码二者的形式不 同。 [117] When the network element device determines that the software to be loaded is safe by verifying the digital signature, the software is loaded into the memory. The loading process may include decompression and initialization of the software. After the loading is completed, the software is usually in the form of software code Running in memory, that is, the software to be loaded is not in the same form as the software code loaded into memory.

[118]步骤 302 : 网管设备向网元设备发送原始摘要信息的请求消息。 [118] Step 302: the network management device sends a request message for original summary information to the network element device.

[119]本实施例中, 网管设备可以具体为 0MC设备等, 每个网管设备可以实现与多个 网元设备之间的通信。 [120]本实施例中, 可以由网管设备主动向网元设备发送原始摘要信息的请求消息, 网管设备可以在向网元设备发送软件包后的预设时间后发送该请求消息,该预设时间 以保证网元设备能够完成在内存中加载软件代码即可。 [119] In this embodiment, the network management device may specifically be an OMC device, etc., and each network management device may implement communication with multiple network element devices. [120] In this embodiment, the network management device may actively send a request message for the original summary information to the network element device, and the network management device may send the request message after a preset time after sending the software package to the network element device. Time is enough to ensure that the network element device can complete loading the software code in the memory.

[121]步骤 303 :网元设备根据原始摘要信息的请求消息为加载在内存中的软件代码后 生成原始摘要信息。 [122]本实施例中, 网元设备接收到原始摘要信息的请求消息后, 计算已加载在内存 中的软件代码的摘要信息, 将该摘要信息作为原始摘要信息。其中, 摘要信息可以由 一个单向 Hash加密函数对软件代码进行作用而产生, 如果软件代码本身发生变化, 则计算出的摘要信息也会发生变化,因此通过摘要信息可以验证软件代码的安全性和 完整性。 [123]步骤 304: 网元设备将原始摘要信息发送给网管设备。 [124]步骤 305 : 网管设备保存原始摘要信息。 [121] Step 303: The network element device generates the original summary information for the software code loaded in the memory according to the request message of the original summary information. [122] In this embodiment, after receiving the original summary information request message, the network element device calculates the summary information of the software code loaded in the memory, and uses the summary information as the original summary information. Among them, the summary information can be generated by a one-way Hash encryption function on the software code. If the software code itself changes, the calculated summary information will also change, so the security and security of the software code can be verified through the summary information. integrity. [123] Step 304: The network element device sends the original summary information to the network management device. [124] Step 305: the network management device saves the original summary information.

[125]步骤 306 :网元设备在软件代码运行过程中接收网管设备发送的验证摘要信息的 上报请求消息。 [125] Step 306: The network element device receives the report request message of the verification summary information sent by the network management device during the operation of the software code.

[126]与图 2示出的实施例的不同在于,本实施例在网元设备上软件代码运行过程中, 网管设备可以根据管理员需求实时发送验证摘要信息的上报请求消息。 [127]步骤 307 :网元设备根据验证摘要信息的上报请求消息生成软件代码的验证摘要 信息。 [126] The difference from the embodiment shown in FIG. 2 is that in this embodiment, during the running of the software code on the network element device, the network management device can send a report request message for verification summary information in real time according to the administrator's requirements. [127] Step 307: The network element device generates the verification summary information of the software code according to the report request message of the verification summary information.

[128]网元设备接收验证摘要信息的上报请求消息后, 计算当前内存中运行的软件代 码的摘要信息,将该摘要信息作为验证摘要信息,验证摘要信息的计算方式和过程与 原始摘要信息一致, 在此不再赘述。 [128] After the network element device receives the report request message of the verification summary information, it calculates the summary information of the software code running in the current memory, and uses the summary information as the verification summary information. The calculation method and process of the verification summary information are consistent with the original summary information , which will not be repeated here.

[129]步骤 308 : 网元设备将验证摘要信息发送给网管设备。 [129] Step 308: The network element device sends the verification summary information to the network management device.

[130]步骤 309 : 网管设备比较验证摘要信息与原始摘要信息是否一致, 当验证摘要信 息与原始摘要信息不一致时,确定软件代码不安全, 当验证摘要信息与原始摘要信息 一致时, 确定软件代码安全。 [131]当网管设备接收到验证摘要信息后, 可以获取保存的原始摘要信息, 然后比较 验证摘要信息与原始摘要信息是否一致,如果一致则可以确定软件代码运行过程中未 被篡改, 软件代码安全, 如果不一致则可以确定软件代码运行过程中遭到篡改, 因此 软件代码不安全, 此时网管设备可以触发告警, 或者由管理员进行人工干预。 [130] Step 309: The network management device compares whether the verification summary information is consistent with the original summary information. When the verification summary information is inconsistent with the original summary information, it is determined that the software code is not safe. When the verification summary information is consistent with the original summary information, it is determined that the software code Safety. [131] When the network management device receives the verification summary information, it can obtain the saved original summary information, and then compare whether the verification summary information is consistent with the original summary information. If they are consistent, it can be determined that the software code has not been tampered with during operation, and the software code is safe. , if they are inconsistent, it can be determined that the software code has been tampered with during operation, so the software code is not safe. At this time, the network management device can trigger an alarm, or the administrator can perform manual intervention.

[132]由上述实施例可见, 由于网元设备可以通过向网管设备发送软件运行过程中的 摘要信息, 因此可以检测出软件在运行过程中是否受到恶意攻击, 从而可以对网元设 备上运行过程中的软件的安全性进行保护, 提高了软件的动态安全性。 [132] It can be seen from the above embodiments that since the network element device can send the summary information of the software running process to the network management device, it can detect whether the software is maliciously attacked during the running process, so that the running process on the network element device The security of the software in the system is protected, and the dynamic security of the software is improved.

[133]参见图 4, 为本发明软件安全性检测方法的另一个实施例流程图: [133] Referring to Fig. 4, it is a flow chart of another embodiment of the software security detection method of the present invention:

[134]步骤 401 : 网元设备将软件加载到内存。 [134] Step 401: the network element device loads the software into the memory.

[135]本发明实施例中, 网元设备可以具体为单板等, 网元设备上可以设置有通过 SoC 安全芯片和内存等, 其中, SoC安全芯片可以进一步包含 CPU、 FPGA、 DSP、 CPLD等, 内存可以包含 RAM、 Flash等。 [135] In the embodiment of the present invention, the network element device may specifically be a single board, etc., and the network element device may be provided with a SoC security chip and a memory, etc., wherein the SoC security chip may further include CPU, FPGA, DSP, CPLD, etc. , the memory may include RAM, Flash and the like.

[136]当网管设备发布新的软件, 或者对现有软件进行升级的软件时, 会为这些软件 生成数字签名, 将数字签名打包在软件中, 并将该软件包发送给网元设备, 现有技术 中, 网元设备接收到软件包后, 获得其中的数字签名, 并通过验证数字签名确定软件 是否安全, 以此保证待加载软件的静态安全性。 网元设备对接收到的软件进行验证的 具体过程与前述步骤 201中的描述一致, 在此不再赘述。 [137]步骤 402 :网元设备在内存中加载完软件代码时,为软件代码生成原始摘要信息。 [136] When the network management device releases new software or upgrades existing software, it will generate digital signatures for these software, package the digital signatures in the software, and send the software package to the network element device. Now In the prior art, after the network element device receives the software package, it obtains the digital signature therein, and determines whether the software is safe by verifying the digital signature, so as to ensure the static security of the software to be loaded. The specific process for the network element device to verify the received software is consistent with the description in the foregoing step 201, and will not be repeated here. [137] Step 402: When the network element device finishes loading the software code in the memory, generate original summary information for the software code.

[138]与前述图 2和图 3示出的实施例不同, 本实施例中网元设备可以在加载完软件 代码后, 实时生成软件代码的摘要信息, 将该摘要信息作为原始摘要信息。 其中, 摘 要信息可以由一个单向 Hash加密函数对软件代码进行作用而产生, 如果软件代码本 身发生变化, 则计算出的摘要信息也会发生变化, 因此通过摘要信息可以验证软件代 码的安全性和完整性。 [138] Different from the aforementioned embodiments shown in FIG. 2 and FIG. 3, the network element device in this embodiment can generate summary information of the software code in real time after the software code is loaded, and use the summary information as the original summary information. Among them, the summary information can be generated by a one-way Hash encryption function on the software code. If the software code itself changes, the calculated summary information will also change. Therefore, the security and security of the software code can be verified through the summary information. integrity.

[139]步骤 403 : 网元设备向网管设备上报原始摘要信息。 [140]步骤 404: 网管设备保存原始摘要信息。 [139] Step 403: The network element device reports the original summary information to the network management device. [140] Step 404: the network management device saves the original summary information.

[141]步骤 405 : 网元设备在软件代码运行过程中,按照设置的时间周期生成软件代码 的验证摘要信息。 [141] Step 405: During the software code running process, the network element device generates the verification summary information of the software code according to the set time period.

[142]本实施例中, 为了验证软件代码运行过程中的安全性, 网元设备可以在软件代 码运行过程中, 按照设置的时间周期计算软件代码的摘要信息,将该摘要信息作为验 证摘要信息, 例如, 网元设备可以设置一个定时器, 当定时器的定时周期到达时, 触 发网元设备计算该定时周期的验证摘要信息。本步骤中,验证摘要信息的计算方式和 过程与原始摘要信息一致, 在此不再赘述。 [142] In this embodiment, in order to verify the security during the running of the software code, the network element device can calculate the summary information of the software code according to the set time period during the running of the software code, and use the summary information as the verification summary information For example, the network element device may set a timer, and when the timing period of the timer arrives, the network element device is triggered to calculate the verification summary information for the timing period. In this step, the calculation method and process of verifying the summary information are consistent with the original summary information, and will not be repeated here.

[143]步骤 406 : 网元设备向网管设备上报验证摘要信息。 [143] Step 406: The network element device reports the verification summary information to the network management device.

[144]步骤 407 : 网管设备比较验证摘要信息与原始摘要信息是否一致, 当验证摘要信 息与原始摘要信息不一致时,确定软件代码不安全, 当验证摘要信息与原始摘要信息 一致时, 确定软件代码安全。 [145]当网管设备接收到验证摘要信息后, 可以获取保存的原始摘要信息, 然后比较 验证摘要信息与原始摘要信息是否一致,如果一致则可以确定软件代码运行过程中未 被篡改, 软件代码安全, 如果不一致则可以确定软件代码运行过程中遭到篡改, 因此 软件代码不安全, 此时网管设备可以触发告警, 或者由管理员进行人工干预。 [144] Step 407: The network management device compares whether the verification summary information is consistent with the original summary information. When the verification summary information is inconsistent with the original summary information, it is determined that the software code is not safe. When the verification summary information is consistent with the original summary information, it is determined that the software code Safety. [145] When the network management device receives the verification summary information, it can obtain the saved original summary information, and then compare whether the verification summary information is consistent with the original summary information. If they are consistent, it can be determined that the software code has not been tampered with during operation, and the software code is safe. , if they are inconsistent, it can be determined that the software code has been tampered with during operation, so the software code is not safe. At this time, the network management device can trigger an alarm, or the administrator can perform manual intervention.

[146]由上述实施例可见, 由于网元设备可以通过向网管设备发送软件运行过程中的 摘要信息, 因此可以检测出软件在运行过程中是否受到恶意攻击, 从而可以对网元设 备上运行过程中的软件的安全性进行保护, 提高了软件的动态安全性。 [147]参见图 5, 为本发明软件安全性检测方法的另一个实施例流程图: [148]步骤 501 : 网元设备将软件加载到内存。 [146] It can be seen from the above embodiments that since the network element device can send the summary information of the software running process to the network management device, it can detect whether the software is maliciously attacked during the running process, so that the running process on the network element device The security of the software in the system is protected, and the dynamic security of the software is improved. [147] Referring to FIG. 5, it is a flowchart of another embodiment of the software security detection method of the present invention: [148] Step 501: The network element device loads the software into the memory.

[149]本发明实施例中, 网元设备可以具体为单板等, 网元设备上可以设置有通过 SoC 安全芯片和内存等, 其中, SoC安全芯片可以进一步包含 CPU、 FPGA、 DSP、 CPLD等, 内存可以包含 RAM、 Flash等。 [149] In the embodiment of the present invention, the network element device may specifically be a single board, etc., and the network element device may be provided with a SoC security chip and memory, etc., wherein the SoC security chip may further include CPU, FPGA, DSP, CPLD, etc. , the memory may include RAM, Flash and the like.

[150]当网管设备发布新的软件, 或者对现有软件进行升级的软件时, 会为这些软件 生成数字签名, 将数字签名打包在软件中, 并将该软件包发送给网元设备, 现有技术 中, 网元设备接收到软件包后, 获得其中的数字签名, 并通过验证数字签名确定软件 是否安全, 以此保证待加载软件的静态安全性。 网元设备对接收到的软件进行验证的 具体过程与前述步骤 201中的描述一致, 在此不再赘述。 [150] When the network management device releases new software or upgrades existing software, it will generate a digital signature for these software, package the digital signature in the software, and send the software package to the network element device. Now In the prior art, after the network element device receives the software package, it obtains the digital signature therein, and determines whether the software is safe by verifying the digital signature, so as to ensure the static security of the software to be loaded. The specific process for the network element device to verify the received software is consistent with the description in the foregoing step 201, and will not be repeated here.

[151]步骤 502 :网元设备在内存中加载完软件代码时,为软件代码生成原始摘要信息。 步骤 503 : 网元设备向网管设备上报原始摘要信息。 [151] Step 502: When the network element device finishes loading the software code in the memory, generate original summary information for the software code. Step 503: the network element device reports the original summary information to the network management device.

[152]步骤 504: 网管设备保存原始摘要信息。 [152] Step 504: the network management device saves the original summary information.

[153]与前述图 2和图 3示出的实施例不同, 本实施例中网元设备可以在加载完软件 代码后, 实时生成软件代码的摘要信息, 将该摘要信息作为原始摘要信息。 其中, 摘 要信息可以由一个单向 Hash加密函数对软件代码进行作用而产生, 如果软件代码本 身发生变化, 则计算出的摘要信息也会发生变化, 因此通过摘要信息可以验证软件代 码的安全性和完整性。 [153] Different from the aforementioned embodiments shown in FIG. 2 and FIG. 3, the network element device in this embodiment can generate summary information of the software code in real time after loading the software code, and use the summary information as the original summary information. Among them, the summary information can be generated by a one-way Hash encryption function on the software code. If the software code itself changes, the calculated summary information will also change. Therefore, the security and security of the software code can be verified through the summary information. integrity.

[154]步骤 505 :网元设备在软件代码运行过程中接收网管设备发送的验证摘要信息的 上报请求消息。 [154] Step 505: The network element device receives the report request message of the verification summary information sent by the network management device during the operation of the software code.

[155]与图 2和图 4示出的实施例的不同在于, 本实施例在网元设备上软件代码运行 过程中, 网管设备可以根据管理员需求实时发送验证摘要信息的上报请求消息。 [155] The difference from the embodiments shown in FIG. 2 and FIG. 4 is that in this embodiment, during the running of the software code on the network element device, the network management device can send a report request message for verifying summary information in real time according to the requirements of the administrator.

[156]步骤 506 :网元设备根据验证摘要信息的上报请求消息生成软件代码的验证摘要 信息。 [157]网元设备接收验证摘要信息的上报请求消息后, 计算当前内存中运行的软件代 码的摘要信息,将该摘要信息作为验证摘要信息,验证摘要信息的计算方式和过程与 原始摘要信息一致, 在此不再赘述。 [156] Step 506: The network element device generates the verification summary information of the software code according to the report request message of the verification summary information. [157] After the network element device receives the report request message of the verification summary information, it calculates the summary information of the software code running in the current memory, and uses the summary information as the verification summary information. The calculation method and process of the verification summary information are the same as The original summary information is consistent and will not be repeated here.

[158]步骤 507 : 网元设备将验证摘要信息发送给网管设备。 [158] Step 507: The network element device sends the verification summary information to the network management device.

[159]步骤 508 : 网管设备比较验证摘要信息与原始摘要信息是否一致, 当验证摘要信 息与原始摘要信息不一致时,确定软件代码不安全, 当验证摘要信息与原始摘要信息 一致时, 确定软件代码安全。 [159] Step 508: The network management device compares whether the verification summary information is consistent with the original summary information. When the verification summary information is inconsistent with the original summary information, it is determined that the software code is not safe. When the verification summary information is consistent with the original summary information, it is determined that the software code Safety.

[160]当网管设备接收到验证摘要信息后, 可以获取保存的原始摘要信息, 然后比较 验证摘要信息与原始摘要信息是否一致,如果一致则可以确定软件代码运行过程中未 被篡改, 软件代码安全, 如果不一致则可以确定软件代码运行过程中遭到篡改, 因此 软件代码不安全, 此时网管设备可以触发告警, 或者由管理员进行人工干预。 [161]由上述实施例可见, 由于网元设备可以通过向网管设备发送软件运行过程中的 摘要信息, 因此可以检测出软件在运行过程中是否受到恶意攻击, 从而可以对网元设 备上运行过程中的软件的安全性进行保护, 提高了软件的动态安全性。 [160] After the network management device receives the verification summary information, it can obtain the saved original summary information, and then compare whether the verification summary information is consistent with the original summary information. If they are consistent, it can be determined that the software code has not been tampered with during operation, and the software code is safe. , if they are inconsistent, it can be determined that the software code has been tampered with during operation, so the software code is not safe. At this time, the network management device can trigger an alarm, or the administrator can perform manual intervention. [161] It can be seen from the above embodiments that since the network element device can send the summary information of the software running process to the network management device, it can detect whether the software is maliciously attacked during the running process, so that the running process on the network element device can be analyzed. The security of the software in the system is protected, and the dynamic security of the software is improved.

[162]与本发明方法软件安全性检测方法的实施例相对应, 本发明还提供了软件安全 性检测装置、 网管设备及网元设备的实施例。 [163]参见图 6,为本发明软件安全性检测装置的一个实施例框图,该装置可以设置在 网管设备侧: [162] Corresponding to the embodiments of the software security detection method of the present invention, the present invention also provides embodiments of a software security detection device, a network management device, and a network element device. [163] Referring to Figure 6, it is a block diagram of an embodiment of the software security detection device of the present invention, which can be set on the side of the network management device:

[164]该装置包括: 获得单元 610、 接收单元 620和检测单元 630。 [164] The device includes: an obtaining unit 610, a receiving unit 620 and a detecting unit 630.

[165]其中, 获得单元 610, 用于从网元设备获得原始摘要信息, 所述原始摘要信息是 所述网元设备为加载在内存中的软件代码生成的摘要信息; [166]接收单元 620,用于接收所述网元设备发送的验证摘要信息,所述验证摘要信息 是所述网元设备在所述软件代码运行过程中生成的摘要信息; [165] Wherein, the obtaining unit 610 is configured to obtain original summary information from the network element device, and the original summary information is the summary information generated by the network element device for the software code loaded in the memory; [166] The receiving unit 620 , for receiving verification summary information sent by the network element device, where the verification summary information is summary information generated by the network element device during the running of the software code;

[167]检测单元 630,用于比较所述接收单元 610接收的所述验证摘要信息与所述获得 单元 620获得的所述原始摘要信息是否一致, 若否, 则确定所述软件代码不安全, 若 是, 则确定所述软件代码安全。 [168]可选的, 所述获得单元 610可以包括 (图 6中未示出): [169]请求消息发送子单元, 用于向所述网元设备发送原始摘要信息的请求消息; [167] A detection unit 630, configured to compare whether the verification summary information received by the receiving unit 610 is consistent with the original summary information obtained by the obtaining unit 620, if not, determine that the software code is not safe, If yes, it is determined that the software code is safe. [168] Optionally, the obtaining unit 610 may include (not shown in FIG. 6): [169] A request message sending subunit, configured to send a request message of original summary information to the network element device;

[170]第一原始摘要接收子单元, 用于接收所述网元设备根据所述请求消息发送子单 元发送的所述原始摘要信息的请求消息返回的所述原始摘要信息。 [170] The first original summary receiving subunit is configured to receive the original summary information returned by the network element device according to the original summary information request message sent by the request message sending subunit.

[171]可选的, 所述获得单元 610也可以包括 (图 6中未示出): [172]第二原始摘要接收子单元, 用于接收所述网元设备在内存中加载完所述软件代 码时上报的所述原始摘要信息。 [171] Optionally, the obtaining unit 610 may also include (not shown in FIG. 6 ): [172] A second original abstract receiving subunit, configured to receive the The original summary information reported by the software code.

[173]可选的, 所述接收单元 620可以包括 (图 6中未示出): [173] Optionally, the receiving unit 620 may include (not shown in FIG. 6):

[174]第一验证摘要接收子单元, 用于接收所述网元设备按照设置的时间周期上报的 所述验证摘要信息; [175]可选的, 所述接收单元 620也可以包括 (图 6中未示出): [174] The first verification summary receiving subunit is configured to receive the verification summary information reported by the network element device according to the set time period; [175] Optionally, the receiving unit 620 may also include (Figure 6 not shown):

[176]上报请求发送子单元,用于向所述网元设备发送验证摘要信息的上报请求消息; [176] A report request sending subunit, configured to send a report request message for verifying summary information to the network element device;

[177]第二验证摘要接收子单元, 用于接收所述网元设备根据所述上报请求发送子单 元发送的验证摘要信息的上报请求消息返回的所述验证摘要信息。 [177] The second verification summary receiving subunit is configured to receive the verification summary information returned by the network element device according to the report request message of the verification summary information sent by the report request sending subunit.

[178]参见图 7,为本发明软件安全性检测装置的另一个实施例框图,该装置可以设置 在网元设备侧: [178] Referring to Figure 7, it is a block diagram of another embodiment of the software security detection device of the present invention, which can be set on the network element device side:

[179]该装置包括: 第一发送单元 710和第二发送单元 720。 [179] The device includes: a first sending unit 710 and a second sending unit 720.

[180]其中, 第一发送单元 710, 用于将原始摘要信息发送给网管设备, 所述原始摘要 信息是为加载在内存中的软件代码生成的摘要信息; [180] Wherein, the first sending unit 710 is configured to send the original summary information to the network management device, where the original summary information is summary information generated for the software code loaded in the memory;

[181]第二发送单元 720,用于在所述软件代码运行过程中向所述网管设备发送所述软 件代码的验证摘要信息,以使所述网管设备通过比较所述第二发送单元发送的验证摘 要信息与所述第一发送单元发送的原始摘要信息确定所述软件代码是否安全。 [181] The second sending unit 720 is configured to send the verification summary information of the software code to the network management device during the running of the software code, so that the network management device compares the information sent by the second sending unit Verifying the summary information and the original summary information sent by the first sending unit to determine whether the software code is safe.

[182]可选的, 所述第一发送单元 710可以包括 (图 7中未示出): [182] Optionally, the first sending unit 710 may include (not shown in FIG. 7):

[183]请求消息接收子单元,用于接收所述网管设备发送的原始摘要信息的请求消息; [184]第一原始摘要生成子单元, 用于根据所述请求消息接收子单元接收的原始摘要 信息的请求消息为加载在内存中的软件代码生成所述原始摘要信息; [183] A request message receiving subunit, configured to receive a request message of the original summary information sent by the network management device; [184] The first original summary generating subunit is configured to generate the original summary information for the software code loaded in the memory according to the request message of the original summary information received by the request message receiving subunit;

[185]第一原始摘要发送子单元, 用于将所述第一原始摘要生成子单元生成的原始摘 要信息发送给所述网管设备。 [185] The first original abstract sending subunit is configured to send the original abstract information generated by the first original abstract generating subunit to the network management device.

[186]可选的, 所述第一发送单元 710也可以包括 (图 7中未示出): [186] Optionally, the first sending unit 710 may also include (not shown in FIG. 7):

[187]第二原始摘要生成子单元, 用于在内存中加载完所述软件代码时, 为所述软件 代码生成所述原始摘要信息; [187] A second original abstract generating subunit, configured to generate the original abstract information for the software code when the software code is loaded in the memory;

[188]第二原始摘要发送子单元, 用于向所述网管设备上报所述第二原始摘要生成子 单元生成的原始摘要信息。 [188] The second original digest sending subunit is configured to report the original digest information generated by the second original digest generating subunit to the network management device.

[189]可选的, 所述第二发送单元 720可以包括 (图 7中未示出): [189] Optionally, the second sending unit 720 may include (not shown in FIG. 7):

[190]第一验证摘要生成单元, 用于在所述软件代码运行过程中, 按照设置的时间周 期生成所述软件代码的验证摘要信息; [190] A first verification summary generating unit, configured to generate verification summary information of the software code according to a set time period during the running of the software code;

[191]第一验证摘要发送子单元, 用于向所述网管设备发送所述第一验证摘要生成单 元生成的验证摘要信息。 [191] A first verification summary sending subunit, configured to send the verification summary information generated by the first verification summary generation unit to the network management device.

[192]可选的, 所述第二发送单元 720也可以包括 (图 7中未示出): [192] Optionally, the second sending unit 720 may also include (not shown in FIG. 7):

[193]上报请求接收子单元, 用于在所述软件代码运行过程中接收所述网管设备发送 的验证摘要信息的上报请求消息; [193] A report request receiving subunit, configured to receive a report request message of the verification summary information sent by the network management device during the operation of the software code;

[194]第二验证摘要生成子单元, 用于根据所述上报请求接收子单元接收的验证摘要 信息的上报请求消息生成所述软件代码的验证摘要信息; [194] The second verification summary generating subunit is configured to generate the verification summary information of the software code according to the report request message of the verification summary information received by the report request receiving subunit;

[195]第二验证摘要发送子单元, 用于将所述第二验证摘要生成子单元生成的验证摘 要信息发送给所述网管设备。 [195] A second verification summary sending subunit, configured to send the verification summary information generated by the second verification summary generation subunit to the network management device.

[196]参见图 8, 为本发明网管设备的实施例框图: [196] Referring to Figure 8, it is a block diagram of an embodiment of the network management device of the present invention:

[197]该网管设备包括: 网络接口 810和处理器 820。 [198]其中, 所述网络接口 810, 用于从网元设备获得原始摘要信息, 所述原始摘要信 息是所述网元设备为加载在内存中的软件代码生成的摘要信息,以及接收所述网元设 备发送的验证摘要信息,所述验证摘要信息是所述网元设备在所述软件代码运行过程 中生成的摘要信息; [199]所述处理器 820,用于比较所述验证摘要信息与所述原始摘要信息是否一致,若 否, 则确定所述软件代码不安全, 若是, 则确定所述软件代码安全。 [197] The network management device includes: a network interface 810 and a processor 820. [198] Wherein, the network interface 810 is configured to obtain original summary information from the network element device, where the original summary information is summary information generated by the network element device for the software code loaded in the memory, and receive the The verification summary information sent by the network element device, the verification summary information is the summary information generated by the network element device during the running of the software code; [199] The processor 820 is configured to compare the verification summary information Whether it is consistent with the original summary information, if not, it is determined that the software code is not safe, and if so, it is determined that the software code is safe.

[200]可选的,所述网络接口 810,可以具体用于向所述网元设备发送原始摘要信息的 请求消息,并接收所述网元设备根据所述原始摘要信息的请求消息返回的所述原始摘 要信息; 或者, 接收所述网元设备在内存中加载完所述软件代码时, 向所述网管设备 上报的所述原始摘要信息。 [200] Optionally, the network interface 810 may be specifically configured to send a request message of original summary information to the network element device, and receive the request message returned by the network element device according to the request message of the original summary information. the original summary information; or, receiving the original summary information reported to the network management device when the network element device finishes loading the software code in the memory.

[201]可选的,所述网络接口 810,可以具体用于接收所述网元设备按照设置的时间周 期上报的所述验证摘要信息; 或者, 向所述网元设备发送验证摘要信息的上报请求消 息,并接收所述网元设备根据所述验证摘要信息的上报请求消息返回的所述验证摘要 信息。 [202]参见图 9, 为本发明网元设备的实施例框图: [201] Optionally, the network interface 810 may be specifically configured to receive the verification summary information reported by the network element device according to a set time period; or, send a report of the verification summary information to the network element device request message, and receive the verification summary information returned by the network element device according to the report request message of the verification summary information. [202] Referring to FIG. 9, it is a block diagram of an embodiment of the network element device of the present invention:

[203]该网元设备包括: 网络接口 910和处理器 920。 [203] The network element device includes: a network interface 910 and a processor 920.

[204]其中,所述处理器 920,用于通过所述网络接口 910将原始摘要信息发送给网管 设备, 所述原始摘要信息是所述网元设备为加载在内存中的软件代码生成的摘要信 息, 以及,在所述软件代码运行过程中通过所述网络接口 910向所述网管设备发送所 述软件代码的验证摘要信息,以使所述网管设备通过比较所述验证摘要信息与所述原 始摘要信息确定所述软件代码是否安全。 [204] Wherein, the processor 920 is configured to send the original summary information to the network management device through the network interface 910, the original summary information is a summary generated by the network element device for the software code loaded in the memory information, and, during the running process of the software code, send the verification summary information of the software code to the network management device through the network interface 910, so that the network management device compares the verification summary information with the original The summary information determines whether the software code in question is safe or not.

[205]可选的,所述处理器 920,可以具体用于当所述网络接口接收所述网管设备发送 的原始摘要信息的请求消息后,根据所述原始摘要信息的请求消息为加载在内存中的 软件代码生成所述原始摘要信息,并通过所述网络接口将所述原始摘要信息发送给所 述网管设备; 或者, 在内存中加载完所述软件代码时, 为所述软件代码生成所述原始 摘要信息, 并通过所述网络接口向所述网管设备上报所述原始摘要信息。 [205] Optionally, the processor 920 may be specifically configured to, after the network interface receives the request message of the original summary information sent by the network management device, load the request message into the memory according to the request message of the original summary information The software code in the memory generates the original summary information, and sends the original summary information to the network management device through the network interface; or, when the software code is loaded in the memory, the software code generates the the original summary information, and report the original summary information to the network management device through the network interface.

[206]可选的, 所述处理器 920, 可以具体用于在所述软件代码运行过程中, 按照设置 的时间周期生成所述软件代码的验证摘要信息,并通过所述网络接口向所述网管设备 发送所述验证摘要信息; 或者,在所述软件代码运行过程中当所述网络接口接收所述 网管设备发送的验证摘要信息的上报请求消息后,根据所述验证摘要信息的上报请求 消息生成所述软件代码的验证摘要信息,并通过所述网络接口将所述验证摘要信息发 送给所述网管设备。 [206] Optionally, the processor 920 may be specifically configured to, during the execution of the software code, according to the set Generate the verification summary information of the software code within a time period, and send the verification summary information to the network management device through the network interface; or, when the network interface receives the network management device during the operation of the software code After the device sends the report request message of the verification summary information, generate the verification summary information of the software code according to the report request message of the verification summary information, and send the verification summary information to the network management device through the network interface .

[207]由上述实施例可见, 网管设备从网元设备获得原始摘要信息, 该原始摘要信息 是网元设备为加载在内存中的软件代码生成的摘要信息,网元设备在软件代码运行过 程中生成验证摘要信息, 网管设备接收网元设备发送的验证摘要信息, 并比较验证摘 要信息与原始摘要信息是否一致, 若否, 则确定软件代码不安全, 若是, 则确定软件 代码安全。应用本发明实施例, 由于网元设备可以通过向网管设备发送软件运行过程 中的摘要信息, 因此可以检测出软件在运行过程中是否受到恶意攻击, 从而可以对网 元设备上运行过程中的软件的安全性进行保护, 提高了软件的动态安全性。 [207] It can be seen from the above embodiments that the network management device obtains the original abstract information from the network element device. The original abstract information is the abstract information generated by the network element device for the software code loaded in the memory. The verification summary information is generated, and the network management device receives the verification summary information sent by the network element device, and compares whether the verification summary information is consistent with the original summary information. If not, it is determined that the software code is not safe, and if so, it is determined that the software code is safe. By applying the embodiment of the present invention, since the network element device can send the summary information of the software running process to the network management device, it can detect whether the software is maliciously attacked during the running process, so that the software during the running process on the network element device can be The security of the system is protected, which improves the dynamic security of the software.

[208]本领域的技术人员可以清楚地了解到本发明实施例中的技术可借助软件加必需 的通用硬件平台的方式来实现。基于这样的理解,本发明实施例中的技术方案本质上 或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产 品可以存储在存储介质中, 如 R0M/RAM、 磁碟、 光盘等, 包括若干指令用以使得一台 计算机设备(可以是个人计算机, 服务器, 或者网络设备等)执行本发明各个实施例 或者实施例的某些部分所述的方法。 [208] Those skilled in the art can clearly understand that the technology in the embodiment of the present invention can be realized by means of software plus necessary general-purpose hardware platform. Based on this understanding, the technical solution in the embodiment of the present invention is essentially or the part that contributes to the prior art can be embodied in the form of a software product, and the computer software product can be stored in a storage medium, such as ROM/RAM , magnetic disk, optical disk, etc., including several instructions to make a computer device (which may be a personal computer, server, or network device, etc.) execute the methods described in various embodiments or some parts of the embodiments of the present invention.

[209]本说明书中的各个实施例均采用递进的方式描述, 各个实施例之间相同相似的 部分互相参见即可, 每个实施例重点说明的都是与其他实施例的不同之处。尤其, 对 于系统实施例而言, 由于其基本相似于方法实施例, 所以描述的比较简单, 相关之处 参见方法实施例的部分说明即可。 [209] Each embodiment in this specification is described in a progressive manner, the same and similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for the related parts, refer to the part of the description of the method embodiment.

[210]以上所述的本发明实施方式, 并不构成对本发明保护范围的限定。 任何在本发 明的精神和原则之内所作的修改、等同替换和改进等,均应包含在本发明的保护范围 之内。 [210] The embodiments of the present invention described above do not limit the protection scope of the present invention. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present invention shall be included within the protection scope of the present invention.

Claims (12)

  1. Claim
    1st, a kind of software security detection method, it is characterised in that methods described includes:
    Network Management Equipment obtains original digest information from network element device, and the original digest information is the summary info that the network element device is the software code generation being carried in internal memory;
    The Network Management Equipment receives the checking summary info that the network element device is sent, and the checking summary info is the summary info that the network element device is generated in the software code running;
    Whether the Network Management Equipment checking summary info is consistent with the original digest information, if not, it is determined that the software code is dangerous, if, it is determined that the software code safety.2nd, according to the method described in claim 1, it is characterised in that the Network Management Equipment obtains original digest information from network element device, including:
    The Network Management Equipment sends the request message of original digest information to the network element device, and receives the original digest information that the network element device is returned according to the request message of the original digest information;Or, when the Network Management Equipment reception network element device has loaded the software code in internal memory, the original digest information reported to the Network Management Equipment.
    3rd, method according to claim 1 or 2, it is characterised in that the Network Management Equipment receives the checking summary info that the network element device is sent, including:
    The Network Management Equipment receives the checking summary info that the network element device is reported according to the time cycle of setting;Or,
    The Network Management Equipment sends the request message that reports for verifying summary info to the network element device, and receives the checking summary info that reports request message return of the network element device according to the checking summary info.
    4th, a kind of software security detection method, it is characterised in that methods described includes:
    Original digest information is sent to Network Management Equipment by network element device, and the original digest information is the summary info that the network element device is the software code generation being carried in internal memory;
    The network element device sends the checking summary info of the software code in the software code running to the Network Management Equipment, so that the Network Management Equipment determines whether the software code is safe by relatively more described checking summary info and the original digest information.
    5th, method according to claim 4, it is characterised in that the network element device original is plucked described Information is wanted to be sent to Network Management Equipment, including:
    The network element device receives the request message for the original digest information that the Network Management Equipment is sent, it is that the software code being carried in internal memory generates the original digest information according to the request message of the original digest information, and the original digest information is sent to the Network Management Equipment;Or,
    It is that the software code generates the original digest information, and the original digest information is reported to the Network Management Equipment when network element device has loaded the software code in internal memory.
    6th, the method according to claim 4 or 5, it is characterised in that the network element device sends the checking summary info of the software code in the software code running to the Network Management Equipment, including:The network element device generates the checking summary info of the software code in the software code running, according to the time cycle of setting, and sends the checking summary info to the Network Management Equipment;Or, what the network element device received the checking summary info that the Network Management Equipment is sent in the software code running reports request message, the checking summary info of the software code is generated according to the request message that reports of the checking summary info, and the checking summary info is sent to the Network Management Equipment.
    7th, a kind of software security detection means, it is characterised in that described device includes:
    Obtaining unit, for obtaining original digest information from network element device, the original digest information is the summary info that the network element device is the software code generation being carried in internal memory;
    Receiving unit, for receiving the checking summary info that the network element device is sent, the checking summary info is the summary info that the network element device is generated in the software code running;
    Whether detection unit, the original digest information for comparing the checking summary info of the receiving unit reception with the obtaining unit is obtained is consistent, if not, it is determined that the software code is dangerous, if, it is determined that the software code safety.8th, the device according to the claim 7, it is characterised in that
    The obtaining unit includes:Request message transmission sub-unit and the first original digest receiving subelement;The request message transmission sub-unit, the request message for sending original digest information to the network element device;
    The first original digest receiving subelement, for receiving the original digest information that the request message for the original digest information that the network element device is sent according to the request message transmission sub-unit is returned;
    Or, the obtaining unit includes:Second original digest receiving subelement;
    The second original digest receiving subelement, for receive the network element device loaded in internal memory it is described The original digest information reported during software code.
    9th, the device according to claim 7 or 8, it is characterised in that
    The receiving unit includes:First checking summary receiving subelement;
    The first checking summary receiving subelement, for receiving the checking summary info that the network element device is reported according to the time cycle of setting;
    Or, the receiving unit includes:Report request transmission sub-unit and the second checking summary receiving subelement;It is described to report request transmission sub-unit, for reporting request message to network element device transmission checking summary info;
    The second checking summary receiving subelement, the checking summary info for reporting request message to return for receiving the checking summary info that the network element device reports request transmission sub-unit to send according to.
    10th, a kind of software security detection means, it is characterised in that described device includes:
    First transmitting element, for original digest information to be sent into Network Management Equipment, the original digest information is the summary info of the software code generation to be carried in internal memory;
    Second transmitting element, checking summary info for sending the software code to the Network Management Equipment in the software code running, so that the original digest information that the checking summary info that the Network Management Equipment is sent by relatively more described second transmitting element is sent with first transmitting element determines whether the software code is safe.
    11st, device according to claim 10, it is characterised in that
    First transmitting element includes:Request message receiving subelement, the first original digest generation subelement and the first original digest transmission sub-unit;
    The request message receiving subelement, the request message for receiving the original digest information that the Network Management Equipment is sent;
    First original digest generates subelement, and the request message of the original digest information for being received according to the request message receiving subelement is that the software code being carried in internal memory generates the original digest information;The first original digest transmission sub-unit, the original digest information for first original digest to be generated to subelement generation is sent to the Network Management Equipment;
    Or, first transmitting element includes:Second original digest generates subelement and the second original digest transmission sub-unit;
    Second original digest generates subelement, is institute during for having loaded the software code in internal memory State software code and generate the original digest information;
    The second original digest transmission sub-unit, the original digest information for reporting the second original digest generation subelement generation to the Network Management Equipment.12nd, the device according to claim 10 or 11, it is characterised in that
    Second transmitting element includes:First checking summarization generation unit and the first checking summary transmission sub-unit;
    The first checking summarization generation unit, in the software code running, the checking summary info of the software code to be generated according to the time cycle of setting;
    The first checking summary transmission sub-unit, the checking summary info for sending the first checking summarization generation unit generation to the Network Management Equipment;
    Or, second transmitting element includes:Report request receiving subelement, the second checking summarization generation subelement and the second checking summary transmission sub-unit;
    It is described to report request receiving subelement, report request message for receive the checking summary info that the Network Management Equipment is sent in the software code running;
    The second checking summarization generation subelement, the checking summary info for reporting request message to generate the software code of the checking summary info for reporting request receiving subelement reception according to;
    The second checking summary transmission sub-unit, for the checking summary info of the described second checking summarization generation subelement generation to be sent into the Network Management Equipment.
    13rd, a kind of Network Management Equipment, it is characterised in that the Network Management Equipment includes:Network interface and processor, wherein,
    The network interface, for obtaining original digest information from network element device, the original digest information is the summary info that the network element device is the software code generation being carried in internal memory, and the checking summary info that the network element device is sent is received, the checking summary info is the summary info that the network element device is generated in the software code running;
    The processor, it is whether consistent with the original digest information for comparing the checking summary info, if not, it is determined that the software code is dangerous, if, it is determined that the software code safety.14th, Network Management Equipment according to claim 13, it is characterised in that
    The network interface, specifically for sending the request message of original digest information to the network element device, and receives the original digest information that the network element device is returned according to the request message of the original digest information; Or, when the reception network element device has loaded the software code in internal memory, the original digest information reported to the Network Management Equipment.
    15th, the Network Management Equipment according to claim 13 or 14, it is characterised in that
    The network interface, specifically for receiving the checking summary info that the network element device is reported according to the time cycle of setting;Or, the request message that reports for verifying summary info is sent to the network element device, and receive the checking summary info that reports request message return of the network element device according to the checking summary info.16th, a kind of network element device, it is characterised in that the network element device includes:Network interface and processor, wherein,
    The processor, for original digest information to be sent into Network Management Equipment by the network interface, the original digest information is the summary info that the network element device is the software code generation being carried in internal memory, and, the checking summary info of the software code is sent to the Network Management Equipment by the network interface in the software code running, so that the Network Management Equipment determines whether the software code is safe by relatively more described checking summary info and the original digest information.
    17th, network element device according to claim 16, it is characterised in that
    The processor, after request message specifically for receiving the original digest information that the Network Management Equipment is sent when the network interface, it is that the software code being carried in internal memory generates the original digest information according to the request message of the original digest information, and the original digest information is sent to by the Network Management Equipment by the network interface;Or, it is that the software code generates the original digest information, and the original digest information is reported to the Network Management Equipment by the network interface when having loaded the software code in internal memory.18th, the network element device according to claim 16 or 17, it is characterised in that
    The processor, specifically in the software code running, generating the checking summary info of the software code according to the time cycle of setting, and the checking summary info is sent to the Network Management Equipment by the network interface;Or, when the network interface receives after the reporting request message of summary info of checking that the Network Management Equipment is sent in the software code running, the checking summary info of the software code is generated according to the request message that reports of the checking summary info, and the checking summary info is sent to by the Network Management Equipment by the network interface.
CN201480000117.8A 2014-03-04 2014-03-04 Software security detection method, apparatus and device Pending CN105190637A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/072826 WO2015131324A1 (en) 2014-03-04 2014-03-04 Software security detection method, apparatus and device

Publications (1)

Publication Number Publication Date
CN105190637A true CN105190637A (en) 2015-12-23

Family

ID=54054338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480000117.8A Pending CN105190637A (en) 2014-03-04 2014-03-04 Software security detection method, apparatus and device

Country Status (2)

Country Link
CN (1) CN105190637A (en)
WO (1) WO2015131324A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875372A (en) * 2017-12-29 2018-11-23 哈尔滨安天科技股份有限公司 A kind of code detection method, device, electronic equipment and storage medium
CN111740854A (en) * 2019-03-25 2020-10-02 美光科技公司 Apparatus, method and system for secure device communication

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10474823B2 (en) * 2016-02-16 2019-11-12 Atmel Corporation Controlled secure code authentication
CN106096388B (en) * 2016-05-31 2019-04-16 北京小米移动软件有限公司 A kind of code security processing method, device, terminal device and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6047242A (en) * 1997-05-28 2000-04-04 Siemens Aktiengesellschaft Computer system for protecting software and a method for protecting software
CN1514375A (en) * 2003-07-21 2004-07-21 蒋正华 Software protection method
CN101783801A (en) * 2010-01-29 2010-07-21 福建星网锐捷网络有限公司 Software protection method based on network, client side and server
CN101996286A (en) * 2009-08-10 2011-03-30 北京多思科技发展有限公司 Dynamic security measure implementation method, security measurement device and application system
CN102375953A (en) * 2010-08-10 2012-03-14 上海贝尔股份有限公司 Software certification method and software certification device
CN103065072A (en) * 2011-10-21 2013-04-24 北京大学 Method and device to improve Java software jailbreak difficulty and copyright verification method
CN103501294A (en) * 2010-08-18 2014-01-08 北京奇虎科技有限公司 Method for judging whether program is malicious or not

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102208003A (en) * 2010-03-31 2011-10-05 鸿富锦精密工业(深圳)有限公司 Software program protection system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6047242A (en) * 1997-05-28 2000-04-04 Siemens Aktiengesellschaft Computer system for protecting software and a method for protecting software
CN1514375A (en) * 2003-07-21 2004-07-21 蒋正华 Software protection method
CN101996286A (en) * 2009-08-10 2011-03-30 北京多思科技发展有限公司 Dynamic security measure implementation method, security measurement device and application system
CN101783801A (en) * 2010-01-29 2010-07-21 福建星网锐捷网络有限公司 Software protection method based on network, client side and server
CN102375953A (en) * 2010-08-10 2012-03-14 上海贝尔股份有限公司 Software certification method and software certification device
CN103501294A (en) * 2010-08-18 2014-01-08 北京奇虎科技有限公司 Method for judging whether program is malicious or not
CN103065072A (en) * 2011-10-21 2013-04-24 北京大学 Method and device to improve Java software jailbreak difficulty and copyright verification method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875372A (en) * 2017-12-29 2018-11-23 哈尔滨安天科技股份有限公司 A kind of code detection method, device, electronic equipment and storage medium
CN111740854A (en) * 2019-03-25 2020-10-02 美光科技公司 Apparatus, method and system for secure device communication
CN111740854B (en) * 2019-03-25 2023-07-18 美光科技公司 Apparatus, method and system for safety device communication

Also Published As

Publication number Publication date
WO2015131324A1 (en) 2015-09-11

Similar Documents

Publication Publication Date Title
US11632248B2 (en) Systems, methods and apparatuses for device attestation based on speed of computation
CN110113167B (en) A kind of information protection method, system and readable storage medium of intelligent terminal
US10242176B1 (en) Controlled access communication between a baseboard management controller and PCI endpoints
US8966642B2 (en) Trust verification of a computing platform using a peripheral device
US20210344494A1 (en) Systems, Methods and Apparatuses for Device Attestation Based on Speed of Computation
CN104751049B (en) A kind of application program installation method and mobile terminal
CN109194625B (en) Client application protection method and device based on cloud server and storage medium
WO2016019790A1 (en) Verification method, client, server and system for installation package
JP6190404B2 (en) Receiving node, message receiving method and computer program
US11222116B2 (en) Heartbeat signal verification
CN105190637A (en) Software security detection method, apparatus and device
US10122755B2 (en) Method and apparatus for detecting that an attacker has sent one or more messages to a receiver node
CN111444519A (en) Protect log data integrity
Fu et al. TPM-based remote attestation for Wireless Sensor Networks
CN105404470B (en) Date storage method and safety device, data-storage system
CN111479265A (en) Information dissemination method and device, computer equipment and storage medium
CN107220545A (en) A kind of hardware encryption system, method and server
CN110069415A (en) For in software test procedure software integrity verification and method for testing software
CN111586013A (en) Network intrusion detection method, device, node terminal and storage medium
CN106549924A (en) A kind of communication security protection methods, devices and systems
EP2973203B1 (en) Systems, methods and apparatuses for device attestation based on speed of computation
CN105825124A (en) Server illegal operation monitoring method and monitoring system
CN104268165A (en) Online query method and equipment
CN114710508A (en) A blockchain-based data synchronization method and related device
EP3087714B1 (en) A method and apparatus for detecting that an attacker has sent one or more messages to a receiver node

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151223

RJ01 Rejection of invention patent application after publication