Method and device for preventing information tampering

A technology for tampering and identifying information, which is applied to secure communication devices and key distribution, and can solve problems such as untrustworthy information obtained by the server.

Inactive Publication Date: 2019-04-09
SICHUAN PANOVASIC TECH
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the present application provides a method and device for preventing information tampering, which is used to solve the pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing information tampering
  • Method and device for preventing information tampering
  • Method and device for preventing information tampering

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0055] See figure 2 , figure 2 A sequence diagram of a method for preventing information tampering applied to a device server according to an embodiment of the present application is shown. A method for preventing information tampering provided by the embodiment of this application is applied to a device server, including:

[0056] Step S110: Receive the identification information, application public key and first signature sent by the application server.

[0057] The identification information is the identification information of the device terminal, the application public key is generated by the device terminal and sent to the application server, and the first signature is signed by the device terminal using the device private key in the trusted execution environment to the application public key Acquired, information stored in the TEE cannot be modified by untrusted applications. The identification information here includes: Media Access Control Address (Media Access C...

no. 2 example

[0080] See Figure 4 , Figure 4 A sequence diagram of an interaction between a device terminal sending trusted information to a device server provided by the embodiment of the present application is shown.

[0081] Step S210: The device terminal obtains the information obtained by executing trusted operations in the trusted execution environment, and obtains trusted information.

[0082] Wherein, the trusted information is the information obtained by performing trusted operations in the trusted execution environment of the device terminal, where the trusted information may be geographic location information, for example: geographic location information obtained through a wireless module, and geographic location information includes: longitude , latitude, province / state and city, etc., or location information obtained by accessing the Global Positioning System or the Beidou Satellite System. Of course, other information may also be included, such as information about the dev...

Embodiment approach

[0088] In order to facilitate understanding, the following describes another implementation of the method for preventing information tampering provided by the embodiment of the present application. Another implementation of the method for preventing information tampering provided by the embodiment of the present application is specifically described as follows:

[0089] See Figure 5 , Figure 5 A schematic diagram of the connection of the information tampering prevention system provided by the embodiment of the present application is shown. The specific implementation mainly includes the following four steps:

[0090] 1. Preset device public-private key pair: Before the device leaves the factory, a pair of public-private key pair is generated at the production line stage. The device private key is stored in the RPMB partition on storage devices such as eMMC, and the device public key is imported to the device server. The device private key is managed by the key management T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for preventing information tampering. The method and the device are used for solving the problem that information acquired by a server is untrusted due to the fact that terminal position information can be tampered in the prior art. The method comprises the steps: receiving identification information sent by an application server, and applying a public key and a first signature, wherein the identification information is identification information of an equipment terminal, the application public key is generated by the equipment terminal and sent to the application server, the first signature is obtained by the equipment terminal by using an equipment private key to sign the application public key in a trusted execution environment, and the information stored in the trusted execution environment cannot be modified by an untrusted application program; searching a public key corresponding to the equipment private key according to the identification information to obtain the equipment public key which corresponds to the equipment private key stored in the equipment terminal; and sending a verification result to the application server if the first signature is verified successfully by using the device public key.

Description

technical field [0001] The present application relates to the technical field of information encryption, and in particular to a method and device for preventing information tampering. Background technique [0002] Today's mobile devices are widely adopted, and the high growth rate of mobile devices will continue. An important feature of mobile devices is that their geographic location will move, unlike traditional devices such as TVs and refrigerators. Geographical location is an important data characteristic of mobile devices. After accurately collecting terminal information that has not been tampered with, deeper data analysis can be performed to obtain commercial value. Location information plays an important role in mobile applications on mobile devices, such as shared bicycle applications (Application, APP for short), online car-hailing APPs, map APPs, and location-based check-in APPs. At present, the above-mentioned APP mainly determines the location information thro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0819H04L9/3247H04L63/0428H04L63/12H04L63/123
Inventor 周强强刘建敏张福健
Owner SICHUAN PANOVASIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products