A method and unit for temporarily opening a root shell in an embedded linux device
An embedded and device technology, applied in the field of communication, can solve problems caused by devices, rootshell password leakage, technical obstacles, etc., and achieve the effect of convenient location and questioning
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] Such as figure 1 Shown, a method for temporarily opening the root shell in an embedded linux device, the device manufacturer generates a public-private key pair for signature authentication when producing an embedded linux device; the public-private key pair is stored in the embedded linux device The public key in; generally speaking, the OTP area of the embedded linux device is used to store the public key and will not be erased. This method comprises the steps:
[0026] Step 1: Obtain the first hash value through the SN code and hash function of the embedded linux device;
[0027] The hash function is SHA256. Since the SN code is unique for any device, the first hash value generated is also unique.
[0028] Step 2: Obtain the license file from the device manufacturer, and obtain the second hash value through the public key and the license file; the second hash value is generated by the device manufacturer according to the SN code and hash function, and signed with...
Embodiment 2
[0037] Such as figure 2 As shown, a unit for temporarily opening a root shell in an embedded linux device includes the following modules:
[0038] License module 1: used to obtain the license file provided by the equipment manufacturer; generally, the equipment manufacturer has already prepared the license file during the production process; the main method of making the license file is:
[0039] Step 10: The device manufacturer obtains the SN code of the embedded linux device, and calculates the second hash value according to the hash function SHA256;
[0040] Step 20: The device manufacturer signs the second hash value with a private key to obtain a license file.
[0041] The first hash value generating module 2: used to obtain the first hash value through the SN code of the embedded linux device and the hash function SHA256;
[0042] The second hash value acquisition module 3: used to sign the license file obtained by the license module with a public key to obtain the se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

