Method and device for signing user program and method and device for verifying signature of user program

A user program and program technology, applied in the field of information security, can solve the problems of inability to prevent theft, high cost and inconvenience of program upgrade and function addition, and achieve the effect of preventing malicious tampering or theft and reducing the risk of violent cracking

Active Publication Date: 2012-07-25
恒鸿达科技有限公司
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Use OTP memory to save the program or use a CPU with OTP. The OTP CPU is a storage unit that stores the program and belongs to the one-time programmable type, so it cannot be tampered with after the program is programmed, unless the memory or CPU is replaced, without changing the physical device. Under certain conditions, this scheme using OTP CPU can achieve the effect of anti-tampering, but the program can be copied to other same CPUs for use, that is, it cannot achieve the effect of anti-theft. In addition, the program of this scheme can only be programmed once, and the program upgrade and The cost of adding functions is relatively high and inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for signing user program and method and device for verifying signature of user program
  • Method and device for signing user program and method and device for verifying signature of user program
  • Method and device for signing user program and method and device for verifying signature of user program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to describe the technical content, structural features, achieved goals and effects of the present invention in detail, the following will be described in detail in conjunction with the embodiments and accompanying drawings.

[0038] The present invention mainly solves the security problem of the user program. First, the authorizer must generate a signature key group, specifically: the authorizer generates a key group with a length of 2048 bits through the RSA2048 key generation tool, and the key group specifically includes a public key E, private key D, module N, the authorizer releases the public key E and module N to the developer of the dedicated CPU program, and the developer compiles the public key E and module N into the program.

[0039] see figure 1 , the present invention first proposes a method for signing a user program, comprising steps:

[0040] S101: Obtain the ID of the CPU, and perform a SHA-256 hash operation on the user program to obtain a pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for signing a user program verifying signature of the user program. The method for signing the user program includes steps of acquiring ID (identity) of a CPU (central processing unit), computing the user program by SHA-256 hash operation to obtain a program digest, compiling a public key and a module generated through RSA (Ron Rivest,Adi Shamirh and Len Adleman) encryption algorithm into the user program; combining the ID of the CPU, the program digest and the length of the user program in sequence to form a data string; operating the data string by a private key corresponding to the public key and the module to obtain ciphertext; and loading the ciphertext into a check area of the CPU. By combining with the RSA algorithm and the SHA algorithm to process the user program and integrating with the ID of the CPU to be a part of the signature, the user program must be restarted by being strictly subjected to the signature verifying process matched with the signature, risk in brute force attack to the user program is greatly reduced, and the user program can be effectively protected from being tampered or stolen maliciously.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for signing user programs and verifying user program signatures. Background technique [0002] Use OTP memory to save the program or use a CPU with OTP. The OTP CPU is a storage unit that stores the program and belongs to the one-time programmable type, so it cannot be tampered with after the program is programmed, unless the memory or CPU is replaced, without changing the physical device. Under certain conditions, this scheme using OTP CPU can achieve the effect of anti-tampering, but the program can be copied to other same CPUs for use, that is, it cannot achieve the effect of anti-theft. In addition, the program of this scheme can only be programmed once, and the program upgrade and The cost of adding functions is relatively high and inconvenient. Contents of the invention [0003] The technical problem mainly solved by the present invention is to pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12G06F21/60
Inventor 吴荣兴
Owner 恒鸿达科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products