Verification device, verification system, verification method, and verification program

A verification device and verification unit technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as hardware that is difficult to expand functions and difficult to prevent tampering

Pending Publication Date: 2022-04-12
NIPPON TELEGRAPH & TELEPHONE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, in an embedded system, it is difficult to build in hardware with a tamper-resistant function from the viewpoint of cost etc., and it is difficult to expand functions compared with a general-purpose PC such as a server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification device, verification system, verification method, and verification program
  • Verification device, verification system, verification method, and verification program
  • Verification device, verification system, verification method, and verification program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. Note that the present invention is not limited to the embodiments. Also, in the description of the drawings, the same parts are denoted by the same reference numerals.

[0021] [Construction of verification system]

[0022] figure 1 is a schematic diagram illustrating a schematic configuration of an authentication system according to the present embodiment. Such as figure 1 As shown, the verification system 1 includes a verification device 10 and an object device 20 . The object device 20 is a software-embedded device such as an IoT device that is an object of authentication processing described later. Here, in this embodiment, programs and data are collectively referred to as software. In addition, in the memory 21 of the object device 20, an area where software is stored is called a software area.

[0023] The verification means 10 verifies...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A storage unit (11) stores the size of a free area of a memory (21) in a target device (20) and software stored in the memory (21). A generation unit (12a) generates a graph configured from a plurality of nodes on the basis of the size of the free area in the memory (21), and transmits the graph to the target device (20). A calculation unit (12b) calculates a hash value corresponding to each block in the software stored in the memory (21). A verification unit (12c) verifies whether or not tampering to a memory (21) in the target device (20) has occurred using the calculated hash value corresponding to the block and a returned response to a challenge specifying a node of the graph calculated using the graph, and a hash value of the returned block in response to a challenge specifying the block.

Description

technical field [0001] The invention relates to a verification device, a verification system, a verification method and a verification program. Background technique [0002] In recent years, due to the popularity of the Internet of Things (IoT), it has become important to detect malware and software tampering in embedded devices and take security measures. On the other hand, in an embedded system, it is difficult to incorporate hardware with a tamper-resistant function from the viewpoint of cost and the like, and it is difficult to expand functions compared with general-purpose PCs such as servers. Therefore, a whitelist type detection technique is desired to externally verify whether software installed in a device deviates from a predetermined correct state without using special hardware (Non-Patent Document 1). [0003] reference list [0004] non-patent literature [0005] Non-Patent Document 1: A. Seshadri, A. Perrig, L. van Doorn, P. Khosla, "SWATT: SoftWare-based AT...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/78
CPCG06F21/78G06F21/57G06F21/64H04L9/3271H04L9/3236G06F21/602G06F21/606G06F2221/2103
Inventor 伊藤真奈美山越公洋泷口浩义中津留毅
Owner NIPPON TELEGRAPH & TELEPHONE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products