A version verification method, device and terminal equipment

A verification method and terminal equipment technology, applied in the computer field, can solve problems such as system security risks and achieve the effect of preventing security attacks

Active Publication Date: 2019-07-19
SHANGHAI HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If the off-chip security version has security holes, it needs to be upgraded. Suppose the version with security holes is VerX, the upgraded version is VerY, and VerX has security holes. After the upgrade, the attacker can roll back the version to VerX and exploit the holes. Conduct security attacks, so there is a system security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A version verification method, device and terminal equipment
  • A version verification method, device and terminal equipment
  • A version verification method, device and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the technical solutions and beneficial effects of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0055] In addition, the version verification method in the embodiment of the present invention is applicable to various terminal devices with a processor (Central Processing Unit, CPU for short) and application programs, including computing devices, vehicle-mounted devices, wearable devices, and various forms of User equipment (User Equipment, referred to as UE), mobile station (Mobile station, referred to as MS), terminal (terminal), terminal equipment (Terminal Equipment) and so on.

[0056] The embodiment of the present invention is applicable to the scenario where the software can be upgraded,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A version check method, apparatus and terminal device, used for preventing an attacker from using versions having security vulnerabilities to carry out security attacks so as to improve system security. In the method, a version number of each version has a corresponding check bit, and forbidden information and available information of a version are indicated by means of the bits; when acquiring a first version, a check bit corresponding to a version number is first determined according to the version number of the version; if the check bit corresponding to the version number of the version is a first numerical value, the version is determined to be forbidden and the check has not passed; and if the check bit corresponding to the version number of the version is a second numerical value, then the version is determined to be available and the check has passed. By means of said method, a security check may be conducted on the versions, and versions which do not pass the check may not be used, thus an attacker may be prevented from using versions having security vulnerabilities to carry out security attacks.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a version checking method, device and terminal equipment. Background technique [0002] System security is a set of software and hardware solutions to support secure boot and ensure the system runs in a trusted environment. A system security solution based on the ARM architecture is usually combined with Secure Boot and Trust Zone technologies. Secure Boot is the basis of system security and is responsible for the initialization process of the entire security system. According to the trusted integrity theory, the secure boot of the system is the root of trust for the security of the entire system. Only when the security of the system boot is guaranteed can the security of other components of the system be guaranteed. [0003] When the system is safely started, the system adopts a step-by-step authentication signature, and after the authentication is passed, the subsequent proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 陈溪许世峰钱建英
Owner SHANGHAI HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products