Target partition verification method and device, storage medium and computer equipment

A verification method and technology of a verification device, which are applied in the field of data security, can solve the problems of equipment performance degradation and particularly obvious performance degradation, and achieve the effects of improving security, saving calculation amount, and saving running space.

Inactive Publication Date: 2020-07-10
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The Android platform's existing integrity check function (dm-verity) for blocks in the device, for example, during the booting phase of the device, due to the need to verify all blocks of the target device, will cause device performance to degrade (in The action of checking will be added when reading block operations), especially on devices with low RAM, the performance degradation is particularly obvious, and it is impossible to reach a good balance between "security" and "performance"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Target partition verification method and device, storage medium and computer equipment
  • Target partition verification method and device, storage medium and computer equipment
  • Target partition verification method and device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] As mentioned in the background art, in the prior art, when the system partition of the Android device performs security verification, it is impossible to ensure the integrity of the system partition without affecting the performance of the device.

[0032] Traditionally, the device-mapper-verity (abbreviated dm-verity) kernel function performs a verified boot for transparent integrity checking of block devices. A block device is virtualized in dm-verity. When the block data is read, the hash calculation will be performed first, and it will be checked against the pre-calculated hash tree. If it matches, the read is successful, otherwise a Read I / O errors, so as to achieve the purpose of data integrity verification. This pre-calculated hash tree contains all the blocks of the target device to be verified. For each block (generally 4k in size), there is a SHA256 hash (32 bytes), which is stored at the leaf node of the tree. The middle node of the tree is the re-SHA256 has...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a target partition verification method and device, a storage medium and computer equipment, and the method comprises the steps: obtaining a list file of a target partition andstandard verification data corresponding to the list file, and enabling the list file to record the verification values of a part of files stored in the target partition; performing verification calculation on the list file to obtain current verification data, and comparing the current verification data with the standard verification data; if the current verification data is consistent with the standard verification data, performing verification calculation on the partial files to obtain a current verification value of each file; and when the current check value of each file is consistent withthe check value of the corresponding file recorded in the list file, determining that the target partition passes the check. Through adoption of the method, the performance of the equipment is not influenced while the partition integrity of the system can be ensured.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method and device for verifying a target partition, a storage medium, and computer equipment. Background technique [0002] Among the currently used smart devices, the Android (Android) system is widely used. On an Android device, if the system partition is tampered with by a malicious program (such as being rooted), it will bring danger to the user, and the system partition needs to be protected. The Android platform's existing integrity check function (dm-verity) for blocks in the device, for example, during the booting phase of the device, due to the need to verify all blocks of the target device, will cause device performance to degrade (in The action of checking will be added when reading block operations), especially on devices with low RAM, the performance degradation is particularly obvious, and a good balance between "security" and "performance" cannot be reached. Conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60
CPCG06F21/64G06F21/602G06F21/606G06F2221/2107
Inventor 张小俊胡婕杨攀吴艳文
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products