Unlock instant, AI-driven research and patent intelligence for your innovation.

Mirror image package file verification method and device, equipment and computer storage medium

A verification method and package file technology, applied in the field of information security, can solve the problems of unable to verify mirror package files, illegal use of mirror package files, etc.

Pending Publication Date: 2022-03-25
上海宏英智能科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method, device, device, and computer storage medium for verifying a mirror package file, which can at least solve the problem of mirror image caused by the inability to verify whether the mirror package file stored in the memory chip of the device is a legal copy in the prior art. Package files are easily illegally used by unauthorized devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mirror image package file verification method and device, equipment and computer storage medium
  • Mirror image package file verification method and device, equipment and computer storage medium
  • Mirror image package file verification method and device, equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The characteristics and exemplary embodiments of various aspects of the application will be described in detail below. In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only intended to explain the present application rather than limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present application by showing examples of the present application.

[0028] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mirror image package file verification method and device, equipment and a computer storage medium. The method comprises the following steps: after a mirror image package file comprising a second equipment key value and a preset encryption algorithm is copied to a storage chip in to-be-verified first equipment, acquiring a first equipment identifier in a power-off restarting process of the first equipment, and reading the preset encryption algorithm from the storage chip; generating a first equipment key value according to the first equipment identifier and a preset encryption algorithm; reading a second equipment key value from the storage chip; and under the condition that the first equipment key value is matched with the second equipment key value, determining that the mirror image package file is legally copied into a storage chip in the first equipment. By adopting the mirror image package file verification method and device, the equipment and the computer storage medium provided by the invention, whether the mirror image package file is legally copied into the storage chip in the equipment or not can be verified, so that the mirror image package file is conveniently prevented from being illegally used by unauthorized equipment.

Description

technical field [0001] The present application belongs to the technical field of information security, and in particular relates to a mirror image package file verification method, device, equipment and computer storage medium. Background technique [0002] With the popularization of electronic devices, there are more and more kinds of software, among which, the application of embedded software is also more and more extensive. [0003] Usually, when the embedded software needs to be installed, the chip manufacturer will compile the source code of the embedded software and make it into a mirror package file, and then copy the mirror package file of the embedded software to the memory chip of the electronic device through a dedicated download tool. However, since the memory chip is not encrypted, the data in the entire memory chip can be directly read by special tools, and then written into other memory chips of the same model and capacity, so that it can be used illegally in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/44G06F21/60G06F21/79
CPCG06F21/445G06F21/602G06F21/79
Inventor 不公告发明人
Owner 上海宏英智能科技股份有限公司