Encryption and authentication protection method and system of secondary development embedded type application program

An application and secondary development technology, applied in user identity/authority verification, instruments, electrical digital data processing, etc., can solve the problems of limited hardware resources, secondary development of embedded software security issues, etc., to achieve secure access , the effect of improving safety

Active Publication Date: 2012-12-19
深圳市君安宏图技术有限公司
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to solve the security problem of the secondary development embedded software in the embedded device in view of the fact that in the prior art, there is no better encryption scheme for embedded devices with limited hardware resources and support for secondary development Defects, providing an encryption and authentication protection method and system for secondary development embedded software that can effectively solve the security problems of secondary development embedded software in embedded devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and authentication protection method and system of secondary development embedded type application program
  • Encryption and authentication protection method and system of secondary development embedded type application program
  • Encryption and authentication protection method and system of secondary development embedded type application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] The method for the encryption and authentication protection of the embedded application program of secondary development in the embedded system of the embodiment of the present invention, such as figure 1 shown, including the following steps:

[0047] S101. The master device sends information requesting data download to the embedded device;

[0048] S102. The embedded device receives the request information and feeds back response information to the main device;

[0049] S103. The master device downloads data to the embedded device, and the data includes authentication codes, keys and encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption and authentication protection method and system of a secondary development embedded type application program. The encryption and authentication protection method comprises the steps that: primary equipment requests for information of downloading data to the embedded equipment; embedded equipment receives the request information and feeds back response information to the embedded equipment; the primary equipment downloads data from the embedded equipment, wherein the data comprises an authentication code, a key and an encrypted application program; the embedded equipment receives and stores the requested data to a storage module and decrypt by using the received key to solidify the application program; the embedded equipment starts up the application program and receives a to-be-verified authentication code input by the user; the embedded equipment obtains the authentication code stored in the storage module and verifies the to-be-verified authentication code; and if the verification passes, the embedded equipment runs the application program, otherwise, ends running the application program. According to the invention, safety of the secondary development software of the embedded equipment can be improved without adding extra hardware.

Description

technical field [0001] The invention relates to the technical field of software encryption, in particular to an encryption and authentication protection method and system for secondary development of embedded application programs. Background technique [0002] With the development of electronic information technology, embedded devices have been widely used in various fields such as industry, agriculture, education, national defense, scientific research and daily life. Embedded system is a complex of software and hardware. It is a special "computer" system centered on applications and based on computer technology. Both software and hardware can be tailored. When manufacturers develop embedded devices, considering factors such as functional requirements, system cost, and hardware size, the hardware configuration of embedded systems will be subject to certain restrictions. Although embedded devices have played a huge role in the electronic informatization of various industries...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22H04L9/32
Inventor 黄强林嘉顺倪赞春
Owner 深圳市君安宏图技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products