Unlock instant, AI-driven research and patent intelligence for your innovation.

MD5 value storage method and system

A storage system and memory technology, applied in the direction of digital data protection, internal/peripheral computer component protection, etc., can solve the problems of high risk, MD5 reference value is easy to be read or modified by humans, and the reference value is easy to be exposed. Flexibility, highlighting substantive features, and improving safety effects

Active Publication Date: 2018-03-13
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the above method of storing the MD5 reference value of the Bootloader program is to store the pre-calculated MD5 reference value of the Bootloader program in a specified area. The benchmark value is easy to be read or modified by humans, and the risk is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MD5 value storage method and system
  • MD5 value storage method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with the accompanying drawings.

[0047] figure 1 It is a specific implementation of the MD5 value storage method of the present invention. In this embodiment, the method for storing the MD5 value includes the following steps s1-s4.

[0048] Step s1, obtain the preset address translation policy value m, and take the remainder of the address translation policy value m from 0xf to obtain the remainder Α s , the remainder A s A for the first memory s storage address.

[0049] Step s2, based on the remainder Α obtained in the above-mentioned step s1 s , the preset indirect storage address Α j A stored in the first memory s storage address.

[0050] In this embodiment, the indirect storage address A j The bit width and the remainder A s are equal in width.

[0051] Ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an MD5 storage method and system. The MD5 storage method and system are characterized in that an obtained address is converted into a strategy value m for calculating a residueof 0xf, an As storage address of a first storage is obtained, then, on the basis of the obtained As storage address of the first storage and a preset indirect storage address Aj, according to a specific recursion formula, storage addresses A0-A15 of a second storage are obtained correspondingly, and finally, according to the one-one corresponding relation of the preset storage addresses A0-A15 andbytes of an MD5 value to be stored, data corresponding to the bytes of the MD5 value to be stored is correspondingly stored into corresponding storage addresses in the storage addresses A0-A15 of thesecond storage. The MD5 storage safety is improved.

Description

technical field [0001] The invention relates to the field of computer security, in particular to an MD5 value storage method and a storage system, which are mainly applicable to a processor-based BootLoader tampering detection mechanism of a computer. Background technique [0002] Message Digest Algorithm MD5 (Message Digest Algorithm) is a hash function widely used in the field of computer security to provide message integrity protection. [0003] In the computer field, before the Bootloader of the embedded system is started, the integrity of the BootLoader program is usually detected by MD5, that is, whether the BootLoader program is tampered with. [0004] However, in the BootLoader tampering detection mechanism of the existing embedded system, most of them adopt special code or logic to measure or complete the Bootloader. And when detecting, often read the pre-stored MD5 reference value (the MD5 value of the source program corresponding to the BootLoader program to be d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/64
CPCG06F21/64G06F21/78
Inventor 刘同强周玉龙童元满赵元邹晓峰
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD