Unlock instant, AI-driven research and patent intelligence for your innovation.

System mirror image document signature method and system, client and server

A technology for system mirroring and mirroring files, applied in the field of information security, can solve problems such as private key leakage, and achieve the effects of avoiding private key leakage, saving labor costs, and enhancing security.

Inactive Publication Date: 2017-01-11
QINGDAO HISENSE MOBILE COMM TECH CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a method for signing system image files, a client, a server and a system, so as to solve the existing problem that private keys are easily leaked when signing system image files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System mirror image document signature method and system, client and server
  • System mirror image document signature method and system, client and server
  • System mirror image document signature method and system, client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] refer to figure 1 , shows a method for signing a system image file according to an embodiment of the present invention, and the method may specifically include the following steps.

[0048] Step 101, the server sets a signature directory and a program directory, the signature directory has access rights to the client; the program directory includes signature scripts and private keys, and the program directory does not have access rights to the client.

[0049] Considering that the present invention may run under the linux operating system environment, the linux ftp software vsftpd (very secure FTP daemon, very safe FTP process) that is currently more commonly used and more stable can be selected to deploy the ftp server.

[0050] The server sets a signature directory with read and write permissions for the client, for the client to upload and download system image files. In addition, a program directory is set up to save the signature script and private key, and this p...

Embodiment 2

[0065] refer to figure 2 , showing a method for signing a system image file according to another embodiment of the present invention, the method may specifically include the following steps:

[0066] Step 201, the server sets a signature directory and a program directory, the signature directory has access rights to the client; the program directory includes signature scripts and private keys, and the program directory does not have access rights to the client.

[0067] For this step, reference may be made to step 101, which will not be repeated here.

[0068] It should be noted that, in this embodiment, in order to facilitate the server to manage the signature directory or each subdirectory, status information is set for the signature directory or each subdirectory, and the server and the client perform corresponding processing according to the status information. Status information includes upload status, signature status, download status, and timeout status.

[0069] The...

Embodiment 3

[0091] This embodiment provides a client 300 , including an upload unit 301 and a download unit 302 .

[0092] The upload unit 301 is configured to upload an unsigned image file, and the uploaded system image file is stored in a signature directory set by the server, and the signature directory has access authority to the client.

[0093] Downloading unit 302 is used for downloading the signed image file, the signed image file is to execute the signature script of the program directory by the server, and use the private key to sign the system image file; the program directory is preset by the server, including the signature script and the private key. key, the program directory does not have access rights to the client.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system mirror image document signature method. The method comprises the following steps: a server sets a signature directory and a program directory, wherein the signature directory has an access permission to a client, the program directory comprises a signature script and a private key, and the program directory has no access permission to the client; the server receives an unsigned system mirror image document uploaded by the client and stores the same in the signature directory; the server executes the signature script and signs the system mirror image document by using the private key corresponding to the client; and the client downloads the signed system mirror image document. Since the signature of the system mirror image document can be completed at the server without manual participation, the leakage problem of the private key is avoided; and moreover, the access permissions of the signature directory used for storing the system mirror image document and the program directory used for storing the signature script and the private key to the client are limited differently, the client cannot access the program directory let alone obtaining the signature script and the related private key in the program directory, thereby further reinforcing the security of the private key.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for signing a system image file, a client, a server and a system. Background technique [0002] Faced with the increasingly serious information security problems of mobile terminals, more and more mobile terminal manufacturers adopt the Secure Boot mechanism to protect mobile terminals. Whether it corresponds to determine whether the mobile terminal software version is an authorized version, if it does not correspond, it means that the mobile terminal software version is an unauthorized version, and the mobile terminal is not allowed to continue to boot. [0003] Therefore, whether the mobile terminal is safe or not must first ensure the security of the signature of the system image file. Most of the existing system image files are signed by giving the private key of the terminal manufacturer to the developer or a special rom manufacturer to sign it. Once the private...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64H04L29/06
CPCG06F21/645H04L63/10
Inventor 刘戈峰杜小杰
Owner QINGDAO HISENSE MOBILE COMM TECH CO LTD