Safety protection method of software integrity of cryptographic machine

A security protection and cryptographic machine technology, applied in the field of information security cryptography, can solve the problem of unreliability, the integrity check code calculation program has no security protection, and cannot effectively avoid the simultaneous modification or replacement of software files and integrity check codes. Attacks and other issues to achieve the effect of improving security and ensuring security

Inactive Publication Date: 2014-06-18
中电科网络安全科技股份有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] There are some shortcomings in the traditional software integrity verification method, which cannot effectively prevent malicious software from illegally modifying software files
The key point is that the pre-calculated integrity check code and the file or other forms are stored in the same storage medium, which cannot effectively avoid the attack of synchronous modification or replacement of the software file and the integrity check code; a better solution is The IC card or USB KEY is used to store the integrity verification code separately, but the IC card and USB KEY are usually not protected by sufficient physical security to ensure their safety, and there are also unreliable problems
In addition, the integrity check code calculation program usually does not have sufficient security protection, and illegal attackers can achieve the purpose of attack by modifying or replacing the integrity check code program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method of software integrity of cryptographic machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0044] Any feature disclosed in this specification, unless specifically stated, can be replaced by other alternative features that are equivalent or have similar purposes. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0045] The safety protection method for software integrity proposed by the invention includes a software integrity check code generation process and a software integrity check process. The software integrity check code generation process is carried out during the production of the cipher machine, and cannot be changed after leaving the factory. The software integrity verification process is performed after the cipher machine is put into operation, that is, the cipher machine is forced to perform veri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety protection method of the software integrity of a cryptographic machine, and relates to the technical field of information safety codes. The safety protection method of the software integrity of the cryptographic machine is characterized by comprising the first step of generating check codes of the software integrity, wherein production personnel send a generation instruction of the check codes of the software integrity to the cryptographic machine through an external management interface, the cryptographic machine transmits byte streams of all software codes, firmware and property files inside the cryptographic machine to a safety storage, and the safety storage carries out check code calculation on the input byte streams to obtain the check codes of the software integrity; the second step of checking the software integrity, wherein the cryptographic machine is started, the cryptographic machine transmits the byte streams of all software codes, the firmware and the property files inside the cryptographic machine to the safety storage for check code calculation, the safety storage judges whether the newly calculated check codes of the software integrity and the check codes, on the safety storage, of the software integrity are uniform or not, if yes, the cryptographic machine starts to work, and if not, the cryptographic machine stops starting.

Description

technical field [0001] The invention belongs to the technical field of information security cryptography, and relates to a method for enhancing the security of a cipher machine itself. A safe and reliable software integrity protection method is adopted to prevent malicious software such as Trojan horses and viruses from illegally tampering with the software inside the cipher machine. Firmware and attribute files, thereby enhancing the security of the cipher machine and ensuring the safety and reliability of the user's business system. Background technique [0002] Cryptography technology is the basic technology of information security, and cipher machine is the foundation of secure application of cryptography technology and the core of information security. With the rapid and comprehensive development of my country's information industry, cryptographic equipment, as the core of information security, has been providing safe cryptographic technology for the development of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
Inventor 张世雄李元正
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products