Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

54 results about "Software integrity" patented technology

Integrity Software are providers of the Evolution range of construction industry specific job costing and accounting software in the UK and Ireland.

Safety protection method of software integrity of cryptographic machine

The invention discloses a safety protection method of the software integrity of a cryptographic machine, and relates to the technical field of information safety codes. The safety protection method of the software integrity of the cryptographic machine is characterized by comprising the first step of generating check codes of the software integrity, wherein production personnel send a generation instruction of the check codes of the software integrity to the cryptographic machine through an external management interface, the cryptographic machine transmits byte streams of all software codes, firmware and property files inside the cryptographic machine to a safety storage, and the safety storage carries out check code calculation on the input byte streams to obtain the check codes of the software integrity; the second step of checking the software integrity, wherein the cryptographic machine is started, the cryptographic machine transmits the byte streams of all software codes, the firmware and the property files inside the cryptographic machine to the safety storage for check code calculation, the safety storage judges whether the newly calculated check codes of the software integrity and the check codes, on the safety storage, of the software integrity are uniform or not, if yes, the cryptographic machine starts to work, and if not, the cryptographic machine stops starting.
Owner:中电科网络安全科技股份有限公司

Method and system for establishing secure computing environment of intelligent electric energy meter

The invention discloses a method and system for establishing a secure computing environment of an intelligent electric energy meter, and the method comprises the steps: constructing a software integrity and source credibility verification chain starting from a bootloader and ending at a business application APP based on a digital certificate mechanism, and achieving the credible source verification and tamper-proof protection of local software of the electric energy meter. A local security computing environment is constructed for the electric energy meter, so that attack behaviors such as malicious code implantation for the electric energy meter can be effectively prevented. Master station fault security risks caused by spreading malicious codes and viruses to a master station system through the electric energy meter are avoided; the bootloader and the operating system OS are subjected to reverse measurement by introducing the security reinforcement APP, so that the software integrityand source credibility of the bootloader and the operating system OS are ensured; all software supports regular or any-time full-life-cycle management of the master station, the master station can see, manage and control the local operation software condition of the electric energy meter, and safety risks faced by the novel intelligent electric energy meter can be avoided.
Owner:CHINA ELECTRIC POWER RES INST +1

Software integrity protection and verification method and device

The embodiment of the invention discloses a software integrity protection and verification method and device. The protection process comprises the steps that first equipment obtains a first software package, wherein the first software package comprises a first signature of a first side for a second software package through a first private key; the first equipment uses the second private key to perform signature operation on the first software package to obtain a third software package including a second signature, the first private key being first-party control, and the second private key being second-party control. After the third software package is sent to the second device, the verification process comprises the steps that the second device obtains a first software package, and the first software package comprises a first signature, a second signature and a second software package; the second equipment verifies the first signature and the second signature based on a pre-stored first public key and a pre-stored second public key to obtain a verification result. Thus, protection of the integrity of the secret key software provided by a manufacturer and a user is adopted, dual software integrity verification bases are provided for the user, and the trust problem of the user is solved.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products