Secure guiding system, method, code signature construction method and authentication method

A technology for secure boot and secure system, applied in the field of secure boot system, can solve the problem that elliptic curve cryptography technology is not well applied, and achieve the effects of simplifying key management, protecting operating system security, and preventing user loss

Active Publication Date: 2007-09-12
BEIJING SHENZHOU ANFU TECH CO LTD
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, at present, elliptic curve cryptography has not been well applied in mobile terminal se...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure guiding system, method, code signature construction method and authentication method
  • Secure guiding system, method, code signature construction method and authentication method
  • Secure guiding system, method, code signature construction method and authentication method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0038] As shown in Figure 1, the secure boot system of the mobile terminal according to the first embodiment of the present invention mainly includes: a secure processing kernel (preferably, may be an embedded secure processing kernel) 100, including a CPU 102, a RAM 101, and a ROM ( Internal flash) 103 is used to establish a safe boot program, and complete the authentication process to the operating system software image file or application system software image file based on elliptic curve cryptography; the safe operating system 410 is connected with the safe processing kernel, including multimedia applications The processor 205, the baseband processor 204, and the external interface device general interface 207 are used to execute a hardware initialization function.

[0039]In addition, the security guidance system at least includes: a radio frequency signal transceiving module, a baseband signal processing module, a multimedia processor, a terminal flash memory 202, and a g...

no. 2 example

[0047] According to the second embodiment of the present invention, based on the secure boot system of the mobile terminal in the first embodiment, a code signature construction method is provided.

[0048] As shown in Figure 2, the method includes the following steps: Step S202, constructing the image file of operating system software and application system software; Step S204, generating the elliptic curve root certificate center certificate and its corresponding private key; Step S206, based on the The elliptic curve root certificate authority certificate obtained in step S204 generates an elliptic curve cipher parameter set and a key pair; step S208, performs a hash operation on the image files of the operating system software and application system software constructed in step S202 to generate a map Image file digest; and step S210, perform elliptic curve signature on the image file digest generated in step S208.

[0049] Wherein, in step S208, a hash function is used for...

no. 3 example

[0062] According to the third embodiment of the present invention, based on the secure boot system of the first embodiment, a code signature authentication method is provided.

[0063] As shown in Figure 4, the method includes the following steps: step S402, securely process the kernel boot program based on the elliptic curve root certificate authority certificate, and obtain a public elliptic curve parameter set and related public keys; step S404, securely process the kernel boot program to verify the image Whether the signature of the file exceeds the scope of the elliptic curve base point group order; wherein, in the case of no verification result, proceed to step S406; step S406, generate the message digest of the image file; step S408, calculate w=s-1 respectively mod n, u1=ew mod n, u2=rw modn, and X=u1G+u2Q=values ​​of (x1, y1); step S410, verify the code signature according to the value of the abscissa of X calculated in step S408.

[0064] Wherein, in step S410, when ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is a mobile terminal safe booting method, comprising the steps of: 1. safe booting program builds an interrupt vector list in the internal RAM of a safe processing kernel; 2. initializing the internal RAM; 3. the safe processing kernel boots program to build access to the internal RAM and makes hardware initialization, where the hardware comprises flash memory out of safe processing kernel chip; 4. loading and processing configuration data in the flash memory; 5. loading operating system software mapping file and completing authentication on the operating system software mapping file based on ECC (Elliptic Curve Cryptography); 6. loading application system software mapping file and completing authentication on the application system software mapping file based on ECC; and 7. after the application system software mapping file passes the authentication, transmitting the control to the application system. And the invention also discloses a mobile terminal safe booting system, and a code signing constructing method and a code signing authentication method.

Description

technical field [0001] The present invention relates to the communication field, and in particular, relates to a security guidance system and method, a code signature construction method and an authentication method. Background technique [0002] With the acceleration of the commercialization of 3G (third generation) networks in the world and the increasing demand for mobile Internet, the network is not limited to the Internet, which means that the security of mobile terminals is more important. [0003] From the perspective of mobile services and terminals, at present, mobile terminals are gradually evolving into handheld terminal tools that integrate basic call services, data services, information acquisition, and electronic payment. With the help of mobile terminals, while people enjoy rich 3G multimedia services, mobile terminal systems and applications are also facing a series of security issues. Information security has become a crucial part of business mobility. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30G06F7/72
CPCH04L2209/80H04L9/3247H04L9/3073
Inventor 卢忱王云峰胡焰龙梅时春李岩禹忠
Owner BEIJING SHENZHOU ANFU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products