Secure guiding system, method, code signature construction method and authentication method

A security boot and code technology, applied in the field of communication, can solve the problems that the elliptic curve cryptography technology has not been well applied, and achieve the effects of simplifying key management, protecting the security of the operating system, and preventing the loss of users

Active Publication Date: 2011-05-11
BEIJING SHENZHOU ANFU TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, at present, elliptic curve cryptography has not been well applied in mobile terminal security. At the same time, there are few researches on elliptic curve cryptography in mobile terminal security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure guiding system, method, code signature construction method and authentication method
  • Secure guiding system, method, code signature construction method and authentication method
  • Secure guiding system, method, code signature construction method and authentication method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0038] Such as figure 1 As shown, the secure boot system of the mobile terminal according to the first embodiment of the present invention mainly includes: a secure processing kernel (preferably, may be an embedded secure processing kernel) 100, including a CPU 102, a RAM 101, and a ROM (internal flash) 103, used to establish a secure boot program, and complete the authentication process to the operating system software image file or the application system software image file based on elliptic curve cryptography; the secure operating system 410 is connected to the secure processing kernel, including the multimedia application processor 205 , a baseband processor 204, and an external interface device common interface 207, configured to execute a hardware initialization function.

[0039]In addition, the security guidance system at least includes: a radio frequency signal transceiving module, a baseband signal processing module, a multimedia processor, a terminal flash memory 20...

no. 2 example

[0047] According to the second embodiment of the present invention, based on the secure boot system of the mobile terminal in the first embodiment, a code signature construction method is provided.

[0048] Such as figure 2 As shown, the method includes the following steps: Step S202, constructing the image file of the operating system software and the application system software; Step S204, generating the elliptic curve root certificate center certificate and its corresponding private key; Step S206, based on the The obtained elliptic curve root certificate center certificate generates an elliptic curve cryptographic parameter set and a key pair; step S208, hashing the image files of the operating system software and application system software constructed in step S202 to generate an image file summary ; and step S210, performing an elliptic curve signature on the image file digest generated in step S208.

[0049] Wherein, in step S208, a hash function is used for hash oper...

no. 3 example

[0062] According to the third embodiment of the present invention, based on the secure boot system of the first embodiment, a code signature authentication method is provided.

[0063] Such as Figure 4 As shown, the method includes the following steps: Step S402, the security processing kernel boot program obtains a public elliptic curve parameter set and related public keys based on the elliptic curve root certificate authority certificate; Step S404, the security processing kernel boot program verifies the signature of the image file Whether exceed the scope of elliptic curve base point group order; Wherein, under the situation that verification result is no, proceed to step S406; Step S406, generate the message summary of image file; Step S408, calculate respectively w=s-1 mod n, u1=ew mod n, u2=rw modn, and X=u1G+u2Q=values ​​of (x1, y1); step S410, verify the code signature according to the value of the abscissa of X calculated in step S408.

[0064] Wherein, in step S4...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is a mobile terminal safe booting method, comprising the steps of: 1. safe booting program builds an interrupt vector list in the internal RAM of a safe processing kernel; 2. initializing the internal RAM; 3. the safe processing kernel boots program to build access to the internal RAM and makes hardware initialization, where the hardware comprises flash memory out of safe processingkernel chip; 4. loading and processing configuration data in the flash memory; 5. loading operating system software mapping file and completing authentication on the operating system software mappingfile based on ECC (Elliptic Curve Cryptography); 6. loading application system software mapping file and completing authentication on the application system software mapping file based on ECC; and 7.after the application system software mapping file passes the authentication, transmitting the control to the application system. And the invention also discloses a mobile terminal safe booting system, and a code signing constructing method and a code signing authentication method.

Description

technical field [0001] The present invention relates to the communication field, and in particular, relates to a security guidance system and method, a code signature construction method and an authentication method. Background technique [0002] With the acceleration of the commercialization of 3G (third generation) networks in the world and the increasing demand for mobile Internet, the network is not limited to the Internet, which means that the security of mobile terminals is more important. [0003] From the perspective of mobile services and terminals, at present, mobile terminals are gradually evolving into handheld terminal tools that integrate basic call services, data services, information acquisition, and electronic payment. With the help of mobile terminals, while people enjoy rich 3G multimedia services, mobile terminal systems and applications are also facing a series of security issues. Information security has become a crucial part of business mobility. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30G06F7/72
CPCH04L9/3247H04L9/3073H04L2209/80
Inventor 卢忱王云峰胡焰龙梅时春李岩禹忠
Owner BEIJING SHENZHOU ANFU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products