Advanced security method and device

An advanced security and module installation technology, applied in the field of network security, can solve the problems of increased hardware cost, easy leakage of user data, easy leakage of user data, etc., and achieves the effect of ensuring security and improving security.

Active Publication Date: 2017-09-05
ZTE CORP
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the installation of anti-virus software is based on the existing viruses. If a new virus is encountered, it is easy to leak user data; the use of secure firmware in the production of smart devices is to prevent flashing. If the device is rooted, it is easy to Leaking user data; adopting chip-level advanced security will lead to increased hardware costs and very long authentication time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Advanced security method and device
  • Advanced security method and device
  • Advanced security method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0062] Embodiment two: figure 2 A schematic flow chart of Embodiment 2 of a high-level security method provided by the present invention, as shown in figure 2 As shown, the public key in the asymmetric key pair is stored in the OTP area of ​​the CPU, and the advanced security method of private key signature and public key verification is adopted. The specific steps are as follows:

[0063] S201. Use an asymmetric encryption algorithm to generate a public key and a private key, the private key is used for signing, and the public key is used for verification.

[0064] S202. Unpack the firmware package or upgrade package that needs to be signed, and preprocess all the file contents in it, including but not limited to SHA256, CRC and other algorithms, to obtain the first password key1.

[0065] S203. Use the private key in the asymmetric key pair to sign key1 to obtain key2.

[0066] S204. For the convenience of storing the encrypted data, the encrypted data is post-processed ...

Embodiment 3

[0074] Embodiment three: image 3 A schematic flow chart of Embodiment 3 of a high-level security method provided by the present invention, as shown in image 3 As shown, the public key in the asymmetric key pair is stored in the OTP area of ​​the CPU, and the public key is used to encrypt and decrypt the private key. The specific steps are as follows:

[0075] S301. Use an asymmetric encryption algorithm to generate a public key and a private key, where the public key is used for encryption and the private key is used for decryption.

[0076] S302. Unpack the firmware package or upgrade package that needs to be signed, and perform preprocessing on all file contents in it, including but not limited to algorithms such as SHA256 and CRC, to obtain key1.

[0077] S303. Encrypt key1 using the public key in the asymmetric key pair to obtain key2.

[0078] S304. For the convenience of storing the encrypted data, the encrypted data is post-processed into a readable character string...

Embodiment 4

[0086] Embodiment four: Figure 4 A schematic flow diagram of Embodiment 4 of an advanced security method provided by the present invention, as shown in Figure 4 As shown, the public key in the asymmetric key pair is stored in the flash memory or the system disk, and the advanced security method of private key signature and public key verification is adopted. The specific steps are as follows:

[0087] S401. Use an asymmetric encryption algorithm to generate a public key and a private key, the private key is used for signing, and the public key is used for verification.

[0088] S402. Unpack the firmware package or upgrade package that needs to be signed, and preprocess all the file contents in it, including but not limited to SHA256, CRC and other algorithms, to obtain key1.

[0089] S403. Use the private key in the asymmetric key pair to sign key1 to obtain key2.

[0090]S404. For the convenience of storing the encrypted data, the encrypted data is post-processed into a r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an advanced security method and device. A signing module preprocesses a data packet and signs a preprocessed result. An installation module installs the signed data packet in a preset area and adds a signature attribute to a file in the preset area. When it is determined that the file in the preset area is performed, a verification module reads the signature attribute of the file to obtain a legal signature and verifies the consistency of the signature of the file and the legal signature. A performance module prevents the performance of the file when the signature of the file is inconsistent with the legal signature. When the file is opened, signature verification is performed, and the performance module prevents the performance of the file when it is determined that the verified signature is illegal, so the security of user data is ensured from a source, and the security is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a high-level security method and device. Background technique [0002] At present, with the development of smart operating systems, more and more smart devices have emerged, such as mainstream smart phones, set-top boxes, smart TVs, smart watches, etc., and new smart devices are constantly being invented. These smart devices store a lot of data related to personal privacy, and many smart devices trust each other, so they can control each other, for example: once a smart watch and a smart phone are bound, the two send or receive data It is unrestricted. While these bring convenience to people, there are also very large security risks. It may cause personal privacy data to be maliciously stolen, and may also be remotely controlled. For example: the popular super user (root ), after logging in as a super user on the mobile phone, the operator can remotely control the camer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/57
CPCG06F21/572H04L9/3249
Inventor 屈小刚
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products