Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for using asymmetric cryptographic algorithm to prevent codes from being maliciously tampered

An asymmetric encryption and code technology, applied in the field of encryption to avoid malicious tampering

Inactive Publication Date: 2018-03-09
DALIAN ROILAND SCI & TECH CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] But if someone analyzes the program in the main control chip, you can get the process of decrypting and downloading the code. Since the AES algorithm is a symmetric algorithm, it will decrypt and then encrypt
Then the process of getting the decrypted download code is equivalent to the process of getting the encryption at the same time. At this time, you can write code at will, encrypt, and download the code through the reserved serial port interface, so that the security of the system will be greatly challenged.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for using asymmetric cryptographic algorithm to prevent codes from being maliciously tampered
  • Method and system for using asymmetric cryptographic algorithm to prevent codes from being maliciously tampered
  • Method and system for using asymmetric cryptographic algorithm to prevent codes from being maliciously tampered

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings. The following examples are only descriptive, not restrictive, and cannot limit the protection scope of the present invention.

[0017] In the present invention, an EEPROM chip programmer is used as an example for description. In this embodiment, the STM32 series chip is used as the main control chip. The STM32 chip is a series of single-chip microcomputers widely used in embedded systems, and this chip supports online programming. Assume that the system is designed to be upgraded online to support more types of EEPROM chips.

[0018] The RSA public key encryption algorithm is an asymmetric algorithm. RSA is a public key cryptosystem. The so-called public key cryptosystem uses different encryption keys and decryption keys. It is computationally infeasible to deduce the encryption key from the key".

[0019] Such as figure 1 as sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and system for using an asymmetric cryptographic algorithm to prevent codes from being maliciously tampered, and belongs to the technical field of encryption. The method comprises the following steps of 1, dividing original system software into two parts of a boot program and an application program; 2, modifying an original engineering entry address as other positions in flash; 3, burning the boot program and the application program into the flash of a main control chip separately; 4, judging whether system upgrading is needed or not. The method and system have the advantages that through encrypted protection of codes by an RSA algorithm, the codes can be effectively prevented from being maliciously tampered. By means of the method and system for using theasymmetric cryptographic algorithm to prevent the codes from being maliciously tampered, even if someone obtains the codes and the processing method of the system, he / she cannot conduct modification,and the set verification process cannot be skipped. The codes of the application program are encrypted, and an asymmetric algorithm is adopted for encryption, so that the integrity of the applicationprogram cannot be damaged.

Description

technical field [0001] The invention relates to the field of encryption technology, in particular to a method and a system for preventing malicious tampering of codes by using an asymmetric encryption algorithm. Background technique [0002] After the development of many embedded systems is put into commercial use, they will face the problem of online upgrade, so as to realize the improvement of the developed embedded system or the modification of system bugs, and the online upgrade process is to pass some executable files through the original system. Interface, download and burn into the flash of the main control chip, because the downloaded executable files run directly in the main control chip, so there will be certain risks, if someone maliciously modifies these executable files, it will cause problems, How to ensure that the downloaded code is not maliciously tampered with is a widespread problem. [0003] In the current system, the method for preventing the code from ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/57
CPCG06F21/51G06F21/572G06F2221/033
Inventor 田雨农刘欣
Owner DALIAN ROILAND SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products