Cipher chip embedded application installation method and device

A technology for application installation and cryptographic chips, applied in computer security devices, software deployment, program/content distribution protection, etc., and can solve problems such as security risks

Pending Publication Date: 2021-06-08
POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD +2
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention provides a cryptographic chip embedded application installation method and device, which are used to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher chip embedded application installation method and device
  • Cipher chip embedded application installation method and device
  • Cipher chip embedded application installation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Embodiments of the present invention provide a cryptographic chip embedded application installation method and device, which are used to solve the technical problem of potential safety hazards in installing a third-party application on a cryptographic chip.

[0039] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] see figure 1 , figure 1 It is a flow chart of steps of a cryptog...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cipher chip embedded application installation method and device. The method comprises the following steps: when a user triggers an application installation operation, performing identity authentication on the user; after the authentication is passed, receiving a preset first metric value of the to-be-installed embedded application input by the user; receiving the to-be-installed embedded application and an application installation package of the to-be-installed embedded application; performing integrity measurement on the to-be-installed embedded application installation package to obtain a second measurement value; and when the first metric value of the to-be-installed embedded application is equal to the second metric value of the to-be-installed embedded application, installing the application installation package of the to-be-installed embedded application. The technical problem that potential safety hazards exist when a third-party application is installed on a cipher chip is solved. The security of installing the third-party application on the cipher chip is improved.

Description

technical field [0001] The invention relates to the technical field of application installation, in particular to a method and device for installing an embedded application of a cryptographic chip. Background technique [0002] A cryptographic chip refers to an integrated circuit chip that implements one or more cryptographic algorithms and uses a cryptographic system to protect keys and sensitive information. The core of a cryptographic chip is usually an intelligent CPU chip that can run cryptographic algorithms. At present, cryptographic chips have been widely used in government affairs, finance, public security, national defense, civil affairs, communications, transportation, health, education, logistics, water, electricity and other fields. The core foundation of information system security. [0003] With the widespread use of encryption chips, encryption chips must be adapted to various scenarios. Therefore, multiple third-party applications may be installed on one e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F8/61G06F21/10G06F21/72
CPCG06F8/62G06F21/105G06F21/72
Inventor 郑文杰卢建刚李波谭慧娟杨祎巍匡晓云黄开天
Owner POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products