CN105844147A - Application attestation method and apparatus - Google Patents
Application attestation method and apparatus Download PDFInfo
- Publication number
- CN105844147A CN105844147A CN201610164129.5A CN201610164129A CN105844147A CN 105844147 A CN105844147 A CN 105844147A CN 201610164129 A CN201610164129 A CN 201610164129A CN 105844147 A CN105844147 A CN 105844147A
- Authority
- CN
- China
- Prior art keywords
- application
- information
- encryption
- unit
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention discloses an application attestation method and apparatus. The apparatus comprises a processing unit, a storage unit, an encryption and decryption unit, an actuating unit and a check unit, wherein the storage unit comprises a first storage area and second storage area. By partition setting of the storage unit, one part of the storage unit is read-only, and the other part of the storage unit is readable and writable; and the read-only partition is used for storing important information such as keys, etc. in an attestation process, and the readable and writable partition facilitates storage of implementation codes of an application, and facilitates update of a corresponding application, so that flexibility of an SOC system is greatly improved, hardware costs are reduced, and broad market prospects are provided to the field of computer chip design.
Description
Technical field
The present invention relates to computer chip design field, particularly relate to a kind of application sign test method and apparatus.
Background technology
In SOC system architecture, safe CPU is often to buy, when chip liter at third party producer
When level or needs write new function in chip, it is necessary to buy CPU's to third party producer simultaneously
License (uses in the range of software and authorizes), not only increases hardware cost, also gives application program more
Newly bring inconvenience.ONE PROGRAM (read-only) device is generally used to store numeral sign test process
In key message, these devices not only increase difficulty and the complexity of system design, also increase simultaneously
Chip cost.
In sum, existing SOC system architecture difficulty in sign test hardware designs how is solved big, multiple
Miscellaneous degree is high, high in cost of production problem, is one problem needing solution badly of computer chip design field.
Summary of the invention
For this reason, it may be necessary to provide a kind of technical scheme applying sign test, in order to solve existing SOC system architecture
In sign test hardware designs, difficulty is big, complexity is high, high in cost of production problem.
Inventor provide a kind of application sign test device, described device include processing unit, memory element,
Encryption/decryption element, start unit and verification unit, described processing unit and encryption/decryption element connect, described
Processing unit is connected with memory element, and described memory element is connected with encryption/decryption element, described start unit
Being connected with encryption/decryption element, described verification unit is connected with encryption/decryption element;Described memory element includes
One memory block and the second memory block;
Described processing unit is used for obtaining application and performs code, and described encryption/decryption element is for performing application
Code is encrypted, and obtains PKI and private key, and generates the signing messages that application execution code is corresponding;
Described second memory block performs, for storing application execution code and this application, the signature that code is corresponding
Information, described first memory block performs, for storing this application, the PKI that code is corresponding;
Described processing unit is additionally operable to arrange the configuration information of memory element, and is stored by described configuration information
In the first memory block;
Described start unit adds confidential information for the private key receiving the first instruction and user's transmission, and from described
First memory block is read PKI to encryption/decryption element;
Described encryption/decryption element adds confidential information for the private key sending user and is decrypted, and obtains solving secret letter
Breath;
Described verification unit is used for judging that the signing messages in decryption information and the second memory block is the most identical,
If then by verification, the most not by verification.
Further, described first instruction is application enabled instruction, and the most described start unit is additionally operable to receive
Second instruction, described second instruction is application download instruction, and described processing unit is used for updating memory element
In application perform code and signing messages.
Further, described configuration information includes download information, reading writing information and erasure information;Then institute
State " configuration information that processing unit is additionally operable to arrange memory element " to specifically include:
Described processing unit is for being set to download by download information, by the reading writing information of memory element
It is set to read-only and forbids write, the erasure information of memory element is set to non-erasable.
Further, described device also includes Tip element, and described Tip element is in verification unit school
Test and obstructed out-of-date send information.
Further, described memory element is nonvolatile memory.
Inventor additionally provides a kind of application sign test method, and described method is applied to apply sign test device, institute
State device and include processing unit, memory element, encryption/decryption element, start unit and verification unit, described
Processing unit and encryption/decryption element connect, and described processing unit is connected with memory element, described memory element
Being connected with encryption/decryption element, described start unit is connected with encryption/decryption element, described verification unit with add solution
Close unit connects;Described memory element includes the first memory block and the second memory block;Described method includes:
Processing unit obtains application and performs code, and encryption/decryption element performs code to application and is encrypted,
To PKI and private key, and generate the signing messages that application execution code is corresponding, and described application is performed generation
Code and this application perform signing messages corresponding to code and are stored in the second memory block storage, this application are held
The PKI that line code is corresponding is stored in the first memory block;
Processing unit arranges the configuration information of memory element, and described configuration information is stored in the first storage
District;
Start unit receives the private key of the first instruction and user's transmission and adds confidential information, and from described first storage
District reads PKI to encryption/decryption element;
Encryption/decryption element adds confidential information to the private key that user sends and is decrypted, and obtains decryption information;
Verification unit judges that the signing messages in decryption information and the second memory block is the most identical, if then leading to
Cross verification, the most not by verification.
Further, described first instruction is application enabled instruction, and the most described method also includes:
Start unit receives the second instruction, and processing unit updates the application in memory element and performs code and label
Name information, described second instruction is application download instruction.
Further, described configuration information includes download information, reading writing information and erasure information;Then institute
State " configuration information that processing unit arranges memory element " to specifically include:
The download information of memory element is set to download by processing unit, the read-write of memory element is believed
Breath is set to read-only and forbids write, is set to non-erasable by the erasure information of memory element.
Further, described device also includes that Tip element, described method include: Tip element is in verification
Unit verification is obstructed out-of-date sends information.
Further, described memory element is nonvolatile memory.
Application sign test method and apparatus described in technique scheme, described method is applied to apply sign test dress
Putting, described device includes processing unit, memory element, encryption/decryption element, start unit and verification unit;
Described memory element includes the first memory block and the second memory block;Described method includes: first processing unit
Obtaining application and perform code, encryption/decryption element performs code to application and is encrypted, and obtains PKI and private key,
And generate the signing messages that application execution code is corresponding, and described application execution code and this application are held
The signing messages that line code is corresponding is stored in the second memory block storage, and this application is performed the public affairs that code is corresponding
Key is stored in the first memory block;And post-processing unit arranges the configuration information of memory element, and join described
Confidence breath is stored in the first memory block;The private key that then start unit reception the first instruction and user send adds
Confidential information, and from described first memory block, read PKI to encryption/decryption element;Then encryption/decryption element pair
The private key that user sends adds confidential information and is decrypted, and obtains decryption information;Then verification unit judges deciphering
Information is the most identical with the signing messages in the second memory block, if then by verification, the most not passing through school
Test.Arranged by the subregion of memory element so that in memory element, a part of subregion is read-only, another part
Subregion is writeable readable, and Reading Sections may be used for the important information during storage sign test, such as PKI etc.;
Writeable readable subregion is conducive to storing the execution code of application program, it is simple to be updated application program,
Substantially increase the flexibility ratio of SOC system, reduce hardware cost, thus at computer chip design neck
Territory has wide market prospect.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of the application sign test device that an embodiment of the present invention relates to;
Fig. 2 is the Organization Chart of the SOC that an embodiment of the present invention relates to;
Fig. 3 is the flow chart of the application sign test method that an embodiment of the present invention relates to;
Description of reference numerals:
101, processing unit;
102, encryption/decryption element;
103, memory element;113, the first memory block;123, the second memory block;
104, start unit;
105, verification unit;
106, Tip element.
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, below
In conjunction with specific embodiments and coordinate accompanying drawing to be explained in detail.
Refer to Fig. 1, for the schematic diagram of the application sign test device that an embodiment of the present invention relates to;Described dress
Put and include processing unit 101, memory element 103, encryption/decryption element 102, start unit 104 and verification
Unit 105, described processing unit 101 and encryption/decryption element 102 connect, described processing unit 101 with deposit
Storage unit 103 connects, and described memory element 103 is connected with encryption/decryption element 102, described start unit
104 are connected with encryption/decryption element 102, and described verification unit 105 is connected with encryption/decryption element 102;Described
Memory element 103 includes the first memory block 113 and the second memory block 123;
Described processing unit 101 is used for obtaining application and performs code, and described encryption/decryption element 102 is for right
Application performs code and is encrypted, and obtains PKI and private key, and generates the signature that application execution code is corresponding
Information;
Described second memory block 123 is corresponding for storing application execution code and this application execution code
Signing messages, described first memory block 113 performs, for storing this application, the PKI that code is corresponding;
Described processing unit 101 is additionally operable to arrange the configuration information of memory element, and by described configuration information
It is stored in the first memory block;
Described start unit 104 adds confidential information for the private key receiving the first instruction and user sends, and from
Described first memory block is read PKI to encryption/decryption element;
Described encryption/decryption element 102 adds confidential information for the private key sending user and is decrypted, and is solved
Confidential information;
Described verification unit 105 is for judging signing messages in decryption information and the second memory block whether phase
With, if then by verification, the most not by verification.
When using application sign test device to carry out application signature checking, first processing unit obtains to apply and performs
Code, described processing unit is the electronic component with data processing function, such as CPU.Described application is held
Line code is the execution code that software application is digitally signed checking, and software application is different, its correspondence
Perform code the most different.
Then application execution code is encrypted by encryption/decryption element, obtains PKI and private key, and generation should
The signing messages corresponding with performing code.In the present embodiment, use rivest, shamir, adelman to application
Execution code is encrypted, such as, can use Hash AES that application is performed code and be encrypted,
To improve the safety of the signing messages after encrypting.In the present embodiment, described memory element be non-easily
The property lost memorizer.Described memory element includes the first memory block and the second memory block.The PKI that encryption obtains
Can be stored in the first memory block of memory element, application performs code and this application performs code correspondence
Signing messages can be stored in the second memory block of memory element.
And post-processing unit arranges the configuration information of memory element, and described configuration information is stored in first
Memory block.In the present embodiment, described configuration information includes download information, reading writing information and erasing
Information.Described " processing unit is additionally operable to arrange the configuration information of memory element " specifically includes: described place
The reading writing information of memory element, for being set to download by download information, is set to read-only by reason unit
And forbid write, the erasure information of memory element is set to non-erasable.So, the of storage of public keys
One memory block attribute is arranged to read-only, not writeable, non-erasable, it is ensured that the safety of PKI, and then
Ensure the safety of application sign test process.So far, the preparation before sign test arranges work and completes, and can start
Application sign test operation.
The private key that then start unit reception the first instruction and user send adds confidential information, and from described first
Memory block is read PKI to encryption/decryption element.In the present embodiment, described first instruction is opened for application
Dynamic instruction, described start unit is that BOOTROM, BOOTROOM store device execution sign test behaviour
First code made, after receiving application enabled instruction, can read public affairs from described first memory block
Key is to encryption/decryption element.In other embodiments, described start unit is additionally operable to receive the second instruction, institute
Stating the second instruction is application download instruction, and described processing unit performs for updating the application in memory element
Code and signing messages.When user downloads other instructions, processing unit can reacquire just-downloaded answering
With performing code, new application execution code can be encrypted and obtain new signing messages by encryption/decryption element,
And new application execution code and signing messages are stored in the second memory block of memory element.
Then encryption/decryption element adds confidential information to the private key that user sends and is decrypted, and obtains decryption information.
The principle of rivest, shamir, adelman be with public key encryption, private key deciphering or with private key encryption, public key decryptions.
Wherein, PKI is stored in the first memory block of memory element, and private key sends the electricity of sign test request user
On subset.When carrying out sign test certification, encryption/decryption element can obtain PKI in the first memory block to
The private key that family sends adds confidential information and is decrypted, and obtains decryption information.
Signing messages during then verification unit judges decryption information and the second memory block is the most identical, if
Then by verification, the most not by verification.If decryption information is consistent with signing messages, illustrate that user is legal,
The application that then start unit can start to perform in the second memory block of memory element performs code, completes this
The startup of application.If decryption information is inconsistent with signing messages, then explanation user is illegal, then start unit
The application that will not start to perform in the second memory block of memory element performs code.In the present embodiment,
Described device also includes Tip element, and described Tip element is for out-of-date sending verification unit verification is obstructed
Information.Described information can be information of voice prompt, prompt information etc..
As in figure 2 it is shown, the Organization Chart of the SOC related to for an embodiment of the present invention.Described application
Device can be integrated in SOC, and safe SOC includes universal cpu module (CPU), straight
Meet internal memory read module (DMA), high-speed bus (High Speed Bus), low speed bus (Low Speed
Bus), the bridge (Bridge) of high low speed general line system, start read only memory (BOOTROM), dynamically deposit
Reservoir (RAM), nonvolatile storage, enciphering and deciphering algorithm accelerating module (Crypto_ip), USB (universal serial bus)
Module (USB), simulates numeral/digital-to-analogue conversion module (ADC/DAC), universal input/output interface mould
Block (GPIO), IC-card interface module (SAM), universal asynchronous receiving-transmitting transmitter UART/ serial ports Peripheral Interface
SPI module (USART), intervalometer (TIMER), two-wire serial EBI (I2C), IC interior sound
Frequently bus (I2S), physical security detection and protection module (Defender), system management module (SMU), protect
Protect unit module (PU) etc..
Below the modules function of SOC framework is illustrated: universal cpu refers to application
In Embedded 32 or 64 business CPU, such as ARM, MIPS etc..The i.e. present invention implements
Processing unit in example.High-speed bus and low speed bus are the system bus supporting with CPU, general high speed
For ahb bus or AXI bus, low speed bus is generally APB bus.RAM is the high speed of system
Dynamic memory, for caching system data.USB is system and outside high-speed interface, completes debugging
Or quickly transmit the function of data;ADC/DAC is the simulation numeral/digital-to-analogue conversion interface in sheet,
Complete the hardware decoding function of magnetic card, the generation of true random number simultaneously;GPIO module is general except completing
Outside input/output function, also supporting TIE_LOW function and ONES function, TIE_LOW function is high
Level is output, and low level is input, and ONES function is when being configured as output to as high level, is passing through
After regular hour, high level is reset by hardware automatically, output low level.
Nonvolatile storage is eFlash or eeprom on the main storage area of system, generally sheet, i.e.
The memory element of the present invention, including INFORMATION interval (the first memory block) and MAINBLOCK
Interval (the second memory block), the interval attribute that can arrange self of INFORMATION and system open
The dynamic configuration information needed, the attribute of self includes reading, write and erasing etc. controls, configuration information
Including JTAG, start-up mode and the most modifiable cipher key configuration, MAINBLOCK interval does not belong to
Property limit, can read, write and wipe.In the present embodiment, when PKI is once write
Behind INFORMATION interval, attribute interval for INFORMATION will be arranged to read-only, can not
Write, non-erasable.
Encryption and decryption accelerating module (encryption/decryption element in Crypto_ip, the i.e. present invention) supports multiple symmetry and non-
The symmetrical hardware-accelerated algorithm of encryption and decryption, described hardware-accelerated algorithm include SM2, SM3, SM4,
RSA2048/RSA1024, AES_128, DES/3DES and HASH_256 scheduling algorithm.BOOTROM
The clean boot of (i.e. start unit in the present invention) completion system, start sign test, the merit of key updating
Energy.SAM module is the logical access control module of IC-card, supports ISO7816;USART module root
According to CPU configuration support UART or SPI function, it is achieved drive SPI liquid crystal display screen, debugging or with
The functions such as bluetooth peripheral hardware communication;TIMER realizes the function of timing;I2C completes such as IC-card physics
The function of the configuration of interface chip;I2S realizes outside audio interface.
Defender realizes real-time clock (RTC), key preserves and external physical detecting function, this thing
Reason detects CPU work or does not work the most real-time being operated according to configuration, physical detecting type
Including voltage detecting, current detecting, frequency deviation detection, temperature detection, detection etc. of uncapping, if be detected that
Abnormal, just the key being saved in inside is removed.Work as system worked well, need the sensitivity of safeguard protection
After data store physical security and protection module (Defender), it is necessary to constantly to these sensitive datas
Proposing protection, when the temperature detecting that someone uncaps, module frequency offsets or works, voltage, electric current are not
When the region of normal design, automatically sensitive data can be removed, reach protected effect.SMU module is
The control module of the clock of system, reset and system register, reading configuration is at system management module
(SMU) completing in, when system reset releases when, system first has to read configuration from nonvolatile storage
After word, completing configuration, other modules just can work.PU is the protected location module of system, according to system
Configuration determine which peripheral hardware or internal memory are in guard mode, which can access, and which can not access.
As it is shown on figure 3, the flow chart of the application sign test method related to for an embodiment of the present invention.Described
Method be applied to apply sign test device, described device include processing unit, memory element, encryption/decryption element,
Start unit and verification unit, described processing unit and encryption/decryption element connect, described processing unit with deposit
Storage unit connects, and described memory element is connected with encryption/decryption element, described start unit and encryption/decryption element
Connecting, described verification unit is connected with encryption/decryption element;Described memory element includes the first memory block and
Two memory blocks;Described method includes:
Initially entering step S301 processing unit and obtain application execution code, described processing unit is for having number
According to the electronic component of process function, such as CPU.It is that software application carries out numeral label that described application performs code
The execution code of name checking, software application is different, and the execution code of its correspondence is the most different.
Then enter step S302 encryption/decryption element application execution code is encrypted, obtain PKI and private
Key, and generate the signing messages that application execution code is corresponding.In the present embodiment, asymmetric adding is used
Close algorithm performs code to application and is encrypted, such as, can use Hash AES that application is performed generation
Code is encrypted, to improve the safety of the signing messages after encrypting.In the present embodiment, deposit described in
Storage unit is nonvolatile memory.Described memory element includes the first memory block and the second memory block.And
The signing messages that described application execution code and this application perform code corresponding is deposited by rear entrance step S303
Being stored in the second memory block, the PKI that this application is performed code corresponding is stored in the first memory block.
Then enter step S304 processing unit and the configuration information of memory element is set, and by described configuration letter
Breath is stored in the first memory block.In the present embodiment, described configuration information includes download information, read-write
Information and erasure information.Described " processing unit is additionally operable to arrange the configuration information of memory element " is concrete
Including: the read-write of memory element, for being set to download by download information, is believed by described processing unit
Breath is set to read-only and forbids write, is set to non-erasable by the erasure information of memory element.So,
First memory block attribute of storage of public keys is arranged to read-only, not writeable, non-erasable, it is ensured that PKI
Safety, and then ensure the safety of application sign test process.So far, to arrange work complete for the preparation before sign test
Become, can start to apply sign test to operate.
The private key then entering step S305 start unit reception the first instruction and user's transmission adds confidential information,
And from described first memory block, read PKI to encryption/decryption element.In the present embodiment, described first
Instruction is application enabled instruction, and described start unit is BOOTROM, and BOOTROOM stores dressing
Put first code performing sign test operation, after receiving application enabled instruction, can deposit from described first
Storage area reads PKI to encryption/decryption element.In other embodiments, described start unit is additionally operable to receive
Second instruction, described second instruction is application download instruction, and described processing unit is used for updating memory element
In application perform code and signing messages.When user downloads other instructions, processing unit can obtain again
Taking just-downloaded application and perform code, new application execution code can be encrypted and obtain by encryption/decryption element
New signing messages, and new application performs code and signing messages is stored in the second of memory element and stores
District.
Then enter step S306 encryption/decryption element the private key that user sends is added confidential information to be decrypted, must
To decryption information.The principle of rivest, shamir, adelman is with public key encryption, private key deciphering or to add with private key
Close, public key decryptions.Wherein, PKI is stored in the first memory block of memory element, and private key is sent out user
Go out on the electronic equipment of sign test request.When carrying out sign test certification, encryption/decryption element can obtain the first storage
PKI in district adds confidential information to the private key that user sends and is decrypted, and obtains decryption information.
Then enter step S307 verification unit and judge that the signing messages in decryption information and the second memory block is
No identical, if then entering step S308 to pass through verification, otherwise enter step S309 by verification.
If decryption information is consistent with signing messages, illustrating that user is legal, then start unit can start to perform storage
Application in second memory block of unit performs code, completes the startup of this application.If decryption information and label
Name information is inconsistent, then explanation user is illegal, then start unit will not start to perform the second of memory element
Application in memory block performs code.In the present embodiment, described device also includes Tip element, institute
State Tip element for out-of-date sending information verification unit verification is obstructed.Described information is permissible
It is information of voice prompt, prompt information etc..
Application sign test method and apparatus described in technique scheme, described method is applied to apply sign test dress
Putting, described device includes processing unit, memory element, encryption/decryption element, start unit and verification unit;
Described memory element includes the first memory block and the second memory block;Described method includes: first processing unit
Obtaining application and perform code, encryption/decryption element performs code to application and is encrypted, and obtains PKI and private key,
And generate the signing messages that application execution code is corresponding, and described application execution code and this application are held
The signing messages that line code is corresponding is stored in the second memory block storage, and this application is performed the public affairs that code is corresponding
Key is stored in the first memory block;And post-processing unit arranges the configuration information of memory element, and join described
Confidence breath is stored in the first memory block;The private key that then start unit reception the first instruction and user send adds
Confidential information, and from described first memory block, read PKI to encryption/decryption element;Then encryption/decryption element pair
The private key that user sends adds confidential information and is decrypted, and obtains decryption information;Then verification unit judges deciphering
Information is the most identical with the signing messages in the second memory block, if then by verification, the most not passing through school
Test.Arranged by the subregion of memory element so that in memory element, a part of subregion is read-only, another part
Subregion is writeable readable, and Reading Sections may be used for the important information during storage sign test, such as PKI etc.;
Writeable readable subregion is conducive to storing the execution code of application program, it is simple to be updated application program,
Substantially increase the flexibility ratio of SOC system, reduce hardware cost, thus at computer chip design neck
Territory has wide market prospect.
It should be noted that in this article, the relational terms of such as first and second or the like is used merely to
One entity or operation are separated with another entity or operating space, and not necessarily requires or imply
Relation or the order of any this reality is there is between these entities or operation.And, term " includes ",
" comprise " or its any other variant is intended to comprising of nonexcludability, so that include that one is
The process of row key element, method, article or terminal unit not only include those key elements, but also include not
There are other key elements being expressly recited, or also include setting for this process, method, article or terminal
Standby intrinsic key element.In the case of there is no more restriction, by statement " including ... " or " comprising ... "
The key element limited, it is not excluded that in including the process of described key element, method, article or terminal unit
There is also other key element.Additionally, in this article, the reason such as " being more than ", " being less than ", " exceeding "
Solve as not include this number;More than " ", " below ", " within " etc. be interpreted as including this number.
Although being described the various embodiments described above, but those skilled in the art once learn
Basic creative concept, then can make other change and amendment to these embodiments, so above institute
Stating only embodiments of the invention, not thereby limit the scope of patent protection of the present invention, every utilization is originally
Equivalent structure or equivalence flow process that description of the invention and accompanying drawing content are made convert, or directly or indirectly use
In the technical field that other are relevant, within being the most in like manner included in the scope of patent protection of the present invention.
Claims (10)
1. one kind application sign test device, it is characterised in that described device include processing unit, memory element,
Encryption/decryption element, start unit and verification unit, described processing unit and encryption/decryption element connect, described
Processing unit is connected with memory element, and described memory element is connected with encryption/decryption element, described start unit
Being connected with encryption/decryption element, described verification unit is connected with encryption/decryption element;Described memory element includes
One memory block and the second memory block;
Described processing unit is used for obtaining application and performs code, and described encryption/decryption element is for performing application
Code is encrypted, and obtains PKI and private key, and generates the signing messages that application execution code is corresponding;
Described second memory block performs, for storing application execution code and this application, the signature that code is corresponding
Information, described first memory block performs, for storing this application, the PKI that code is corresponding;
Described processing unit is additionally operable to arrange the configuration information of memory element, and is stored by described configuration information
In the first memory block;
Described start unit adds confidential information for the private key receiving the first instruction and user's transmission, and from described
First memory block is read PKI to encryption/decryption element;
Described encryption/decryption element adds confidential information for the private key sending user and is decrypted, and obtains solving secret letter
Breath;
Described verification unit is used for judging that the signing messages in decryption information and the second memory block is the most identical,
If then by verification, the most not by verification.
2. application sign test device as claimed in claim 1, it is characterised in that described first instruction is for answering
With enabled instruction, the most described start unit is additionally operable to receive the second instruction, and described second instruction is under application
Carrying instruction, described processing unit performs code and signing messages for updating the application in memory element.
3. application sign test device as claimed in claim 1, it is characterised in that described configuration information includes
Download information, reading writing information and erasure information;It is then described that " processing unit is additionally operable to arrange memory element
Configuration information " specifically include:
Described processing unit is for being set to download by download information, by the reading writing information of memory element
It is set to read-only and forbids write, the erasure information of memory element is set to non-erasable.
4. application sign test device as claimed in claim 1, it is characterised in that described device also includes carrying
Showing unit, described Tip element is for out-of-date sending information verification unit verification is obstructed.
5. application sign test device as claimed in claim 1, it is characterised in that described memory element is non-
Volatile memory.
6. an application sign test method, it is characterised in that described method is applied to apply sign test device, institute
State device and include processing unit, memory element, encryption/decryption element, start unit and verification unit, described
Processing unit and encryption/decryption element connect, and described processing unit is connected with memory element, described memory element
Being connected with encryption/decryption element, described start unit is connected with encryption/decryption element, described verification unit with add solution
Close unit connects;Described memory element includes the first memory block and the second memory block;Described method includes:
Processing unit obtains application and performs code, and encryption/decryption element performs code to application and is encrypted,
To PKI and private key, and generate the signing messages that application execution code is corresponding, and described application is performed generation
Code and this application perform signing messages corresponding to code and are stored in the second memory block storage, this application are held
The PKI that line code is corresponding is stored in the first memory block;
Processing unit arranges the configuration information of memory element, and described configuration information is stored in the first storage
District;
Start unit receives the private key of the first instruction and user's transmission and adds confidential information, and from described first storage
District reads PKI to encryption/decryption element;
Encryption/decryption element adds confidential information to the private key that user sends and is decrypted, and obtains decryption information;
Verification unit judges that the signing messages in decryption information and the second memory block is the most identical, if then leading to
Cross verification, the most not by verification.
7. application sign test method as claimed in claim 6, it is characterised in that described first instruction is for answering
With enabled instruction, the most described method also includes:
Start unit receives the second instruction, and processing unit updates the application in memory element and performs code and label
Name information, described second instruction is application download instruction.
8. application sign test method as claimed in claim 6, it is characterised in that described configuration information includes
Download information, reading writing information and erasure information;It is then described that " processing unit arranges the configuration of memory element
Information " specifically include:
The download information of memory element is set to download by processing unit, the read-write of memory element is believed
Breath is set to read-only and forbids write, is set to non-erasable by the erasure information of memory element.
9. application sign test method as claimed in claim 6, it is characterised in that described device also includes carrying
Show that unit, described method include: Tip element out-of-date sends information verification unit verification is obstructed.
10. application sign test method as claimed in claim 6, it is characterised in that described memory element is
Nonvolatile memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610164129.5A CN105844147A (en) | 2016-03-22 | 2016-03-22 | Application attestation method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610164129.5A CN105844147A (en) | 2016-03-22 | 2016-03-22 | Application attestation method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105844147A true CN105844147A (en) | 2016-08-10 |
Family
ID=56587896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610164129.5A Pending CN105844147A (en) | 2016-03-22 | 2016-03-22 | Application attestation method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105844147A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112214795A (en) * | 2020-10-13 | 2021-01-12 | 天津津航计算技术研究所 | Encryption module suitable for various data bandwidths |
CN113139197A (en) * | 2021-04-27 | 2021-07-20 | 上海淇玥信息技术有限公司 | Project signature checking method and device and electronic equipment |
CN114721729A (en) * | 2020-12-22 | 2022-07-08 | 中国科学院沈阳自动化研究所 | ZYNQ trusted starting method based on JTAG transmission protocol |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609665A (en) * | 2012-01-19 | 2012-07-25 | 福建三元达软件有限公司 | Method and device for signing user program and method and device for verifying signature of user program |
CN103049694A (en) * | 2013-01-14 | 2013-04-17 | 上海慧银信息科技有限公司 | Core safety architecture implementation method of intelligent financial transaction terminal |
CN103914658A (en) * | 2013-01-05 | 2014-07-09 | 展讯通信(上海)有限公司 | Safe starting method of terminal equipment, and terminal equipment |
CN104866343A (en) * | 2015-05-15 | 2015-08-26 | 长城信息产业股份有限公司 | Security startup method for embedded equipment and securely-started embedded equipment |
-
2016
- 2016-03-22 CN CN201610164129.5A patent/CN105844147A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609665A (en) * | 2012-01-19 | 2012-07-25 | 福建三元达软件有限公司 | Method and device for signing user program and method and device for verifying signature of user program |
CN103914658A (en) * | 2013-01-05 | 2014-07-09 | 展讯通信(上海)有限公司 | Safe starting method of terminal equipment, and terminal equipment |
CN103049694A (en) * | 2013-01-14 | 2013-04-17 | 上海慧银信息科技有限公司 | Core safety architecture implementation method of intelligent financial transaction terminal |
CN104866343A (en) * | 2015-05-15 | 2015-08-26 | 长城信息产业股份有限公司 | Security startup method for embedded equipment and securely-started embedded equipment |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112214795A (en) * | 2020-10-13 | 2021-01-12 | 天津津航计算技术研究所 | Encryption module suitable for various data bandwidths |
CN112214795B (en) * | 2020-10-13 | 2022-08-16 | 天津津航计算技术研究所 | Encryption module suitable for various data bandwidths |
CN114721729A (en) * | 2020-12-22 | 2022-07-08 | 中国科学院沈阳自动化研究所 | ZYNQ trusted starting method based on JTAG transmission protocol |
CN114721729B (en) * | 2020-12-22 | 2024-07-16 | 中国科学院沈阳自动化研究所 | ZYNQ trusted starting method based on JTAG transmission protocol |
CN113139197A (en) * | 2021-04-27 | 2021-07-20 | 上海淇玥信息技术有限公司 | Project signature checking method and device and electronic equipment |
CN113139197B (en) * | 2021-04-27 | 2024-05-28 | 上海淇玥信息技术有限公司 | Project label checking method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105391840B (en) | Automatically create destination application | |
KR101712784B1 (en) | System and method for key management for issuer security domain using global platform specifications | |
CN104156642B (en) | A kind of security password input system and method based on safe touch screen control chip | |
US9407636B2 (en) | Method and apparatus for securely saving and restoring the state of a computing platform | |
US8543838B1 (en) | Cryptographic module with secure processor | |
CN114218592A (en) | Sensitive data encryption and decryption method and device, computer equipment and storage medium | |
CN100456200C (en) | Multi-token seal and unseal | |
US10536274B2 (en) | Cryptographic protection for trusted operating systems | |
CN106104557B (en) | For obtaining secret System and method for from the master key for the application being tied in equipment | |
CN109858265A (en) | A kind of encryption method, device and relevant device | |
CN105718807B (en) | Android system and its authentic authentication system based on soft TCM and credible software stack and method | |
CN108140093A (en) | Secret is migrated using for the hardware root of trust of equipment | |
CN106605233A (en) | Providing a trusted execution environment using a processor | |
CN108345806A (en) | A kind of hardware encryption card and encryption method | |
Arfaoui et al. | Trusted execution environments: A look under the hood | |
US10691627B2 (en) | Avoiding redundant memory encryption in a cryptographic protection system | |
CN102609665B (en) | Method and device for signing user program and method and device for verifying signature of user program | |
CN103902915B (en) | Trustable industrial control terminal and establishing method thereof | |
CN104462965A (en) | Method for verifying integrity of application program and network device | |
US10949537B2 (en) | Secure firmware provisioning and device binding mechanism | |
TW201706899A (en) | Security device and method of providing security service to host therein, security apparatus and computer software product | |
CN101004719A (en) | Embedded system and method for increasing embedded system security | |
CN103649964A (en) | Secure hosted execution architecture | |
CN110401539A (en) | A kind of certificate data processing method, server, terminal and system | |
CN109460639A (en) | A kind of license authentication control method, device, terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160810 |