[go: up one dir, main page]

CN114547703A - Embedded safety communication method and system based on safety isolation module - Google Patents

Embedded safety communication method and system based on safety isolation module Download PDF

Info

Publication number
CN114547703A
CN114547703A CN202210436144.6A CN202210436144A CN114547703A CN 114547703 A CN114547703 A CN 114547703A CN 202210436144 A CN202210436144 A CN 202210436144A CN 114547703 A CN114547703 A CN 114547703A
Authority
CN
China
Prior art keywords
external data
decrypted
data
integrity
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210436144.6A
Other languages
Chinese (zh)
Inventor
施一明
高博
王天林
张军凯
谢灿华
董雁适
王骥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Zhikong Technology Co ltd
ZHEJIANG SUPCON RESEARCH CO LTD
Original Assignee
Zhejiang Zhikong Technology Co ltd
ZHEJIANG SUPCON RESEARCH CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Zhikong Technology Co ltd, ZHEJIANG SUPCON RESEARCH CO LTD filed Critical Zhejiang Zhikong Technology Co ltd
Priority to CN202210436144.6A priority Critical patent/CN114547703A/en
Publication of CN114547703A publication Critical patent/CN114547703A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an embedded secure communication method and a system based on a security isolation module, wherein the method comprises the steps of carrying out identity verification on external data before the embedded processing unit receives the external data; judging whether the ciphertext data belongs to the ciphertext data or not under the condition of passing the identity authentication; when the external data belongs to the ciphertext data, decrypting the external data; then judging whether the data belongs to the control data; when the decrypted external data belongs to the control data, integrity check is carried out, a check result is output, and whether the decrypted external data has integrity is judged; under the condition that the decrypted external data has integrity, directly transmitting the decrypted external data to the embedded processing unit; under the condition of not belonging to the control data, the decrypted external data is directly transmitted to the embedded processing unit, and the system comprises the embedded processing unit and a safety isolation unit. The invention can ensure the safety of the external data transmitted to the safety isolation module.

Description

Embedded safety communication method and system based on safety isolation module
Technical Field
The invention relates to the technical field of embedded systems, in particular to an embedded secure communication method and system based on a security isolation module.
Background
An embedded processing unit, i.e., an embedded system, is composed of hardware and software. The device has small volume and power consumption, is applied to special scenes, has limited performance and has higher requirements on reliability and real-time performance.
Because the information security protection function of the embedded system is weak, the existing embedded system is not generally accessed to the internet, but with the rapid development of the internet of things, the external communication demand of the embedded system is increased, so that the situation of indirect or direct connection with the internet occurs, the situation can increase the risk of the embedded system being attacked and invaded, and huge hidden danger is brought to the information security of the embedded system.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an embedded type safety communication method and system based on a safety isolation module.
In one aspect, the present invention provides an embedded secure communication method based on a security isolation module, comprising the following steps:
before the embedded processing unit receives external data,
firstly, carrying out identity verification on external data;
judging whether the external data belongs to the ciphertext data or not under the condition of passing the identity verification;
decrypting the external data in case the external data belongs to the ciphertext data;
after the decryption is finished, judging whether the decrypted external data belongs to the control data;
under the condition that the decrypted external data belongs to the control data, carrying out integrity verification on the decrypted external data and outputting a verification result, and judging the integrity of the decrypted external data according to the verification result;
under the condition that the decrypted external data has integrity, directly transmitting the decrypted external data to the embedded processing unit;
and under the condition that the decrypted external data does not belong to the control data, directly transmitting the decrypted external data to the embedded processing unit.
Optionally, the received external data is discarded without passing the authentication.
Alternatively, in the case where the external data does not belong to the ciphertext data, the received external data is discarded.
Optionally, decrypting the external data further comprises:
judging whether the numerical value in the external data belongs to the integrity check value;
under the condition that the value in the external data belongs to the integrity check value, decrypting the integrity check value by adopting an asymmetric algorithm based on the first key, and storing the decrypted integrity check value;
and under the condition that the numerical value in the external data does not belong to the integrity check value, decrypting the numerical value not belonging to the integrity check value by adopting a symmetric algorithm based on the second secret key.
Optionally, the determining the integrity of the decrypted external data according to the verification result further includes:
obtaining a stored decrypted integrity check value:
when the verification result is consistent with the stored decrypted integrity verification value, the decrypted external data has integrity;
and when the verification result is inconsistent with the stored decrypted integrity verification value, the decrypted external data does not have integrity.
Optionally, when the decrypted external data does not have data integrity, discarding the decrypted external data.
Optionally, when the embedded processing unit sends the internal data to the outside:
and encrypting the internal data and then transmitting the encrypted data to the outside.
In another aspect, the present invention provides an embedded secure communication system based on a security isolation module, for implementing the above-mentioned embedded secure communication method based on the security isolation module, including:
the embedded processing unit is used for receiving the decrypted external data; and the combination of (a) and (b),
the safety isolation unit is used for receiving the external data before the embedded processing unit receives the external data,
firstly, carrying out identity authentication on external data;
judging whether the external data belongs to the ciphertext data or not under the condition of passing the identity authentication;
decrypting the external data in case the external data belongs to the ciphertext data;
after the decryption is finished, judging whether the decrypted external data belongs to the control data;
when the decrypted external data belongs to the control data, integrity verification is carried out on the decrypted external data and a verification result is output, the integrity of the decrypted external data is judged according to the verification result, and the decrypted external data is directly transmitted to the embedded processing unit under the condition that the decrypted external data has the integrity;
and under the condition that the decrypted external data does not belong to the control data, directly transmitting the decrypted external data to the embedded processing unit.
Optionally, the safety isolation unit comprises:
a security processing subunit: the system comprises a first key, a second key and a decrypted integrity check value, wherein the first key, the second key and the decrypted integrity check value are used for carrying out identity authentication on external data and storing the first key, the second key and the decrypted integrity check value; and the combination of (a) and (b),
a communication switching subunit: judging whether the external data belongs to the ciphertext data or not under the condition of passing the identity authentication;
decrypting the external data in case the external data belongs to the ciphertext data;
after the decryption is finished, judging whether the decrypted external data belongs to the control data;
when the decrypted external data belongs to the control data, integrity verification is carried out on the decrypted external data and a verification result is output, the integrity of the decrypted external data is judged according to the verification result, and the decrypted external data is directly transmitted to the embedded processing unit under the condition that the decrypted external data has the integrity;
and under the condition that the decrypted external data does not belong to the control data, directly transmitting the decrypted external data to the embedded processing unit.
Compared with the prior art, the invention has the following beneficial effects:
the invention provides an embedded safety communication method and a system based on a safety isolation module for ensuring the safety of data transmitted to an embedded processing unit.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a flow chart of example 1 provided by the present invention;
fig. 2 is a flowchart illustrating the transmission of internal data to the outside by the embedded processing unit according to embodiment 1 of the present invention;
FIG. 3 is a system block diagram of embodiment 2 provided by the present invention;
fig. 4 is a block diagram of a specific implementation of embodiment 2 provided by the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the invention, but are not intended to limit the invention in any way. It should be noted that it would be obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit of the invention. All falling within the scope of the present invention.
Example 1
In this embodiment, when the external communication interface sends external data to the embedded processing unit, the external data needs to be transmitted to the embedded processing unit through the security isolation unit, where the external data is transmitted through the external communication interface on the security isolation unit.
As shown in fig. 1, an embodiment of the present invention provides an embedded secure communication method based on a security isolation module, including the following steps:
before the embedded processing unit receives external data,
the external data is authenticated first.
In practical application, the external data is subjected to identity authentication based on the identity authentication information carried by the external data, and the received external data can be directly discarded under the condition that the external data does not pass the identity authentication.
And under the condition of passing the identity authentication, judging whether the external data belongs to the ciphertext data.
In practical application, whether the external data belongs to the ciphertext data or not can be judged according to the description information of the external data, and the received external data is discarded under the condition that the external data does not belong to the ciphertext data.
Decrypting the external data in case the external data belongs to the ciphertext data;
in practical application, firstly, whether a numerical value in external data belongs to an integrity check value is judged;
under the condition that the value in the external data belongs to the integrity check value, decrypting the integrity check value by adopting an asymmetric algorithm based on the first key, and storing the decrypted integrity check value;
and under the condition that the numerical value in the external data does not belong to the integrity check value, decrypting the numerical value not belonging to the integrity check value by adopting a symmetric algorithm based on the second secret key.
It can be understood that, in this embodiment, the value in the external data is divided into two parts, one part is the integrity check value, and the other part is the rest of the value, and the two parts of data are decrypted by different keys and different decryption algorithms respectively.
And after the decryption is finished, judging whether the decrypted external data belongs to the control data.
In practical application, because the control data may affect the system running state, it is necessary to determine whether the external data belongs to the control data, where the control data may be a control program file;
under the condition that the decrypted external data belongs to the control data, carrying out integrity verification on the decrypted external data and outputting a verification result, and judging the integrity of the decrypted external data according to the verification result;
and under the condition that the decrypted external data has integrity, directly transmitting the decrypted external data to the embedded processing unit.
In practical application, the integrity check of the external data may be performed by calculating a check result of the external data by using a hash algorithm, where the check result may be understood as an integrity check value of the external data, and determining the integrity of the decrypted external data according to the check result may be understood as:
acquiring the stored decrypted integrity check value:
when the verification result is consistent with the stored decrypted integrity verification value, the decrypted external data has integrity;
and when the verification result is inconsistent with the stored decrypted integrity verification value, the decrypted external data does not have integrity.
It is understood that when the external data has integrity, it indicates that the external data has not been tampered or destroyed, and when the external data does not have integrity, it is understood that the external data has been tampered or destroyed.
And when the external data does not have integrity, directly discarding the external data.
And under the condition that the decrypted external data does not belong to the control data, directly transmitting the decrypted external data to the embedded processing unit.
It can be understood that the external data does not belong to the control data, and the running state of the system is not affected, so that the integrity of the external data can be sent to the embedded processing unit without being verified.
As shown in fig. 2, the communication method described above is that the embedded processing unit receives external data, and the embedded processing unit may also transmit internal data to the outside, where the embedded processing unit obtains the internal data through the internal module interface, and in order to ensure confidentiality of the transmitted internal data, the method of transmitting data to the outside is as follows: and encrypting the internal data and then transmitting the encrypted data to the outside.
Example 2
Referring to fig. 3, the present invention further provides an embedded secure communication system based on a security isolation module, which is used for implementing the above-mentioned embedded secure communication method based on the security isolation module, and the method includes:
the embedded processing unit 1 is used for receiving the decrypted external data; and the combination of (a) and (b),
a security isolation unit 2 for, before the embedded processing unit 1 receives the external data,
firstly, carrying out identity authentication on external data;
judging whether the external data belongs to the ciphertext data or not under the condition of passing the identity verification;
decrypting the external data in case the external data belongs to the ciphertext data;
after the decryption is finished, judging whether the decrypted external data belongs to the control data;
when the decrypted external data belongs to the control data, integrity verification is carried out on the decrypted external data and a verification result is output, the integrity of the decrypted external data is judged according to the verification result, and the decrypted external data is directly transmitted to the embedded processing unit under the condition that the decrypted external data has the integrity;
and under the condition that the decrypted external data does not belong to the control data, directly transmitting the decrypted external data to the embedded processing unit.
Wherein, the safety isolation unit 2 comprises:
the secure processing subunit 201: the system comprises a first key, a second key and a decrypted integrity check value, wherein the first key, the second key and the decrypted integrity check value are used for carrying out identity authentication on external data and storing the first key, the second key and the decrypted integrity check value; and the combination of (a) and (b),
communication relay subunit 202: judging whether the external data belongs to the ciphertext data or not under the condition of passing the identity authentication;
decrypting the external data in case the external data belongs to the ciphertext data;
after the decryption is finished, judging whether the decrypted external data belongs to the control data;
when the decrypted external data belongs to the control data, integrity verification is carried out on the decrypted external data and a verification result is output, the integrity of the decrypted external data is judged according to the verification result, and the decrypted external data is directly transmitted to the embedded processing unit 1 when the decrypted external data has the integrity;
and under the condition that the decrypted external data does not belong to the control data, directly transmitting the decrypted external data to the embedded processing unit 1.
The communication switching subunit is internally provided with algorithms such as an encryption and decryption algorithm, a verification algorithm and the like.
Referring to fig. 4, in practical application of the system, an embedded processing unit 1 is constructed based on a domestic loongson 2K1000 dual-core CPU processor, internally connected to a 2GB DDR3 domestic memory through a DDR interface, connected to a BIOS, a power-down save, NAND FLASH memory through a storage interface, and externally connected to a domestic FPGA JFM7K325T in a security isolation unit 2 through a PCIE interface; the security isolation unit 2 comprises JFM K325T domestic FPGA and RJMU401 domestic security chip, both of which are connected with the security isolation unit through SPI interface and communicate with each other through FPGA, one path is connected with domestic remote RG801H G communication module through dual PHY interface by Ethernet communication, the other path is connected with PLC backplane bus through BLVDS, three paths are respectively connected with host computer communication, extended rack communication and a spare channel through PHY by Ethernet communication, the system is composed of domestic devices, the confidentiality and security of the system can be effectively enhanced, the domestic godson 2K1000 dual-core CPU processor is a dual-core processor produced by godson China company, the type is godson two number series, which is an upgrade chip of godson 2H, 2 GS264e processing cores are integrated in the chip, 1GHz (industrial level is 800-plus-I900 MHz), 64-bit DDR3 controller, 2 GMAC controllers, 2 PCIE controllers and a plurality of interfaces, the terminal is mainly applied to network communication, is applied to the industrial control field of the terminal and is low in power consumption.
The foregoing description of specific embodiments of the present invention has been presented. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.

Claims (9)

1. An embedded type safety communication method based on a safety isolation module is characterized by comprising the following steps:
before the embedded processing unit receives external data,
firstly, carrying out identity authentication on the external data;
judging whether the external data belongs to the ciphertext data or not under the condition of passing the identity authentication;
decrypting the external data in a case where the external data belongs to ciphertext data;
after decryption is finished, judging whether the decrypted external data belongs to control data;
under the condition that the decrypted external data belongs to control data, integrity verification is carried out on the decrypted external data, a verification result is output, and the integrity of the decrypted external data is judged according to the verification result;
under the condition that the decrypted external data has the integrity, directly transmitting the decrypted external data to an embedded processing unit;
and under the condition that the decrypted external data does not belong to the control data, directly transmitting the decrypted external data to the embedded processing unit.
2. The embedded security communication method based on the security isolation module as claimed in claim 1, wherein the received external data is discarded without passing authentication.
3. The embedded type security communication method based on the security isolation module as claimed in claim 1, wherein in case that the external data does not belong to the ciphertext data, the received external data is discarded.
4. The embedded security communication method based on the security isolation module as claimed in claim 1, wherein the decrypting of the external data further comprises:
judging whether the numerical value in the external data belongs to an integrity check value or not;
under the condition that the value in the external data belongs to the integrity check value, decrypting the integrity check value by adopting an asymmetric algorithm based on a first key, and storing the decrypted integrity check value;
and under the condition that the numerical value in the external data does not belong to the integrity check value, decrypting the numerical value not belonging to the integrity check value by adopting a symmetric algorithm based on the second key.
5. The embedded security communication method based on the security isolation module according to claim 4, wherein the determining the integrity of the decrypted external data according to the verification result further comprises:
obtaining the stored decrypted integrity check value:
when the verification result is consistent with the stored decrypted integrity verification value, the decrypted external data has integrity;
and when the verification result is inconsistent with the stored decrypted integrity verification value, the decrypted external data does not have integrity.
6. The embedded security communication method based on the security isolation module as claimed in claim 5, wherein when the decrypted external data does not have data integrity, the decrypted external data is discarded.
7. The embedded security communication method based on the security isolation module as claimed in claim 1, wherein when the embedded processing unit transmits the internal data to the outside:
and encrypting the internal data and then transmitting the encrypted internal data to the outside.
8. A security isolation module-based embedded security communication system for implementing the security isolation module-based embedded security communication method of any one of claims 1 to 7, comprising:
the embedded processing unit is used for receiving the decrypted external data; and the combination of (a) and (b),
a security isolation unit for receiving the external data before the embedded processing unit receives the external data,
firstly, carrying out identity authentication on the external data;
judging whether the external data belongs to the ciphertext data or not under the condition of passing the identity authentication;
decrypting the external data in a case where the external data belongs to ciphertext data;
after decryption is finished, judging whether the decrypted external data belongs to control data;
when the decrypted external data belongs to control data, integrity verification is carried out on the decrypted external data and a verification result is output, the integrity of the decrypted external data is judged according to the verification result, and the decrypted external data is directly transmitted to an embedded processing unit under the condition that the decrypted external data has the integrity;
and under the condition that the decrypted external data does not belong to the control data, directly transmitting the decrypted external data to the embedded processing unit.
9. The security isolation module-based embedded security communication system of claim 8, wherein the security isolation unit comprises:
a security processing subunit: the system comprises a first key, a second key and a decrypted integrity check value, wherein the first key, the second key and the decrypted integrity check value are used for carrying out identity authentication on the external data and storing the first key, the second key and the decrypted integrity check value; and the combination of (a) and (b),
a communication switching subunit: judging whether the external data belongs to the ciphertext data or not under the condition of passing the identity authentication;
decrypting the external data in a case where the external data belongs to ciphertext data;
after decryption is finished, judging whether the decrypted external data belongs to control data;
when the decrypted external data belongs to control data, integrity verification is carried out on the decrypted external data and a verification result is output, the integrity of the decrypted external data is judged according to the verification result, and the decrypted external data is directly transmitted to an embedded processing unit under the condition that the decrypted external data has the integrity;
and under the condition that the decrypted external data does not belong to the control data, directly transmitting the decrypted external data to the embedded processing unit.
CN202210436144.6A 2022-04-25 2022-04-25 Embedded safety communication method and system based on safety isolation module Pending CN114547703A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210436144.6A CN114547703A (en) 2022-04-25 2022-04-25 Embedded safety communication method and system based on safety isolation module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210436144.6A CN114547703A (en) 2022-04-25 2022-04-25 Embedded safety communication method and system based on safety isolation module

Publications (1)

Publication Number Publication Date
CN114547703A true CN114547703A (en) 2022-05-27

Family

ID=81667187

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210436144.6A Pending CN114547703A (en) 2022-04-25 2022-04-25 Embedded safety communication method and system based on safety isolation module

Country Status (1)

Country Link
CN (1) CN114547703A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5285456A (en) * 1991-05-15 1994-02-08 International Business Machines Corporation System and method for improving the integrity of control information
US20090054937A1 (en) * 2007-08-24 2009-02-26 Thomas Severin System and method for transmitting and activating a plurality of control data
CN103105783A (en) * 2011-11-15 2013-05-15 晨星软件研发(深圳)有限公司 Embedded device and control method thereof
CN107105060A (en) * 2017-05-27 2017-08-29 天津恒天新能源汽车研究院有限公司 A kind of method for realizing electric automobile information security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5285456A (en) * 1991-05-15 1994-02-08 International Business Machines Corporation System and method for improving the integrity of control information
US20090054937A1 (en) * 2007-08-24 2009-02-26 Thomas Severin System and method for transmitting and activating a plurality of control data
CN103105783A (en) * 2011-11-15 2013-05-15 晨星软件研发(深圳)有限公司 Embedded device and control method thereof
CN107105060A (en) * 2017-05-27 2017-08-29 天津恒天新能源汽车研究院有限公司 A kind of method for realizing electric automobile information security

Similar Documents

Publication Publication Date Title
US10530793B2 (en) System and method for detection and prevention of attacks on in-vehicle networks
EP3274850B1 (en) Protecting a memory
US9300470B2 (en) Semiconductor device and method of writing data to semiconductor device
US9054874B2 (en) System and method for data authentication among processors
CN111295645B (en) SoC chip and bus access control method
CN209803788U (en) PCIE credible password card
US11294846B2 (en) System, apparatus and method for secure communication on a bus
US9152576B2 (en) Mode-based secure microcontroller
CN114422556A (en) FlexCan bus controller based on SRAM PUF
EP3757838A1 (en) Warm boot attack mitigations for non-volatile memory modules
US11372793B2 (en) System on chip and control method thereof
CN102088348A (en) Mobile phone security chip for embedded platform and protection system comprising same
CN114547703A (en) Embedded safety communication method and system based on safety isolation module
JP2021005382A (en) Communication device and method for authenticating message
CN107317925B (en) Mobile terminal
CN116628708A (en) Method for starting chip, electronic equipment and readable storage medium
US20220114111A1 (en) Integrated chip and data processing method
CN114969794A (en) SoC system and data encryption method
CN201957034U (en) Mobile phone security chip used in embedded platform and protection system comprising same
CN109583196B (en) Key generation method
CN113868607B (en) Disposable identity identification using method and device
CN118694757B (en) File transmission method, device and storage medium based on private transmission protocol
CN118337528B (en) CAN bus safety communication real-time monitoring method and system based on HSM module
US20230350603A1 (en) Securing dynamic random access memory (dram) contents to non-volatile in a persistent memory module
Severin Security Co-Processors

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220527