CN105844147A - Application attestation method and apparatus - Google Patents

Application attestation method and apparatus Download PDF

Info

Publication number
CN105844147A
CN105844147A CN201610164129.5A CN201610164129A CN105844147A CN 105844147 A CN105844147 A CN 105844147A CN 201610164129 A CN201610164129 A CN 201610164129A CN 105844147 A CN105844147 A CN 105844147A
Authority
CN
China
Prior art keywords
application
information
encryption
unit
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610164129.5A
Other languages
Chinese (zh)
Inventor
王法翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN CHAORUI CHUANGYUAN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
FUJIAN CHAORUI CHUANGYUAN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN CHAORUI CHUANGYUAN INFORMATION TECHNOLOGY Co Ltd filed Critical FUJIAN CHAORUI CHUANGYUAN INFORMATION TECHNOLOGY Co Ltd
Priority to CN201610164129.5A priority Critical patent/CN105844147A/en
Publication of CN105844147A publication Critical patent/CN105844147A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses an application attestation method and apparatus. The apparatus comprises a processing unit, a storage unit, an encryption and decryption unit, an actuating unit and a check unit, wherein the storage unit comprises a first storage area and second storage area. By partition setting of the storage unit, one part of the storage unit is read-only, and the other part of the storage unit is readable and writable; and the read-only partition is used for storing important information such as keys, etc. in an attestation process, and the readable and writable partition facilitates storage of implementation codes of an application, and facilitates update of a corresponding application, so that flexibility of an SOC system is greatly improved, hardware costs are reduced, and broad market prospects are provided to the field of computer chip design.

Description

A kind of application sign test method and apparatus
Technical field
The present invention relates to computer chip design field, particularly relate to a kind of application sign test method and apparatus.
Background technology
In SOC system architecture, safe CPU is often to buy, when chip liter at third party producer When level or needs write new function in chip, it is necessary to buy CPU's to third party producer simultaneously License (uses in the range of software and authorizes), not only increases hardware cost, also gives application program more Newly bring inconvenience.ONE PROGRAM (read-only) device is generally used to store numeral sign test process In key message, these devices not only increase difficulty and the complexity of system design, also increase simultaneously Chip cost.
In sum, existing SOC system architecture difficulty in sign test hardware designs how is solved big, multiple Miscellaneous degree is high, high in cost of production problem, is one problem needing solution badly of computer chip design field.
Summary of the invention
For this reason, it may be necessary to provide a kind of technical scheme applying sign test, in order to solve existing SOC system architecture In sign test hardware designs, difficulty is big, complexity is high, high in cost of production problem.
Inventor provide a kind of application sign test device, described device include processing unit, memory element, Encryption/decryption element, start unit and verification unit, described processing unit and encryption/decryption element connect, described Processing unit is connected with memory element, and described memory element is connected with encryption/decryption element, described start unit Being connected with encryption/decryption element, described verification unit is connected with encryption/decryption element;Described memory element includes One memory block and the second memory block;
Described processing unit is used for obtaining application and performs code, and described encryption/decryption element is for performing application Code is encrypted, and obtains PKI and private key, and generates the signing messages that application execution code is corresponding;
Described second memory block performs, for storing application execution code and this application, the signature that code is corresponding Information, described first memory block performs, for storing this application, the PKI that code is corresponding;
Described processing unit is additionally operable to arrange the configuration information of memory element, and is stored by described configuration information In the first memory block;
Described start unit adds confidential information for the private key receiving the first instruction and user's transmission, and from described First memory block is read PKI to encryption/decryption element;
Described encryption/decryption element adds confidential information for the private key sending user and is decrypted, and obtains solving secret letter Breath;
Described verification unit is used for judging that the signing messages in decryption information and the second memory block is the most identical, If then by verification, the most not by verification.
Further, described first instruction is application enabled instruction, and the most described start unit is additionally operable to receive Second instruction, described second instruction is application download instruction, and described processing unit is used for updating memory element In application perform code and signing messages.
Further, described configuration information includes download information, reading writing information and erasure information;Then institute State " configuration information that processing unit is additionally operable to arrange memory element " to specifically include:
Described processing unit is for being set to download by download information, by the reading writing information of memory element It is set to read-only and forbids write, the erasure information of memory element is set to non-erasable.
Further, described device also includes Tip element, and described Tip element is in verification unit school Test and obstructed out-of-date send information.
Further, described memory element is nonvolatile memory.
Inventor additionally provides a kind of application sign test method, and described method is applied to apply sign test device, institute State device and include processing unit, memory element, encryption/decryption element, start unit and verification unit, described Processing unit and encryption/decryption element connect, and described processing unit is connected with memory element, described memory element Being connected with encryption/decryption element, described start unit is connected with encryption/decryption element, described verification unit with add solution Close unit connects;Described memory element includes the first memory block and the second memory block;Described method includes:
Processing unit obtains application and performs code, and encryption/decryption element performs code to application and is encrypted, To PKI and private key, and generate the signing messages that application execution code is corresponding, and described application is performed generation Code and this application perform signing messages corresponding to code and are stored in the second memory block storage, this application are held The PKI that line code is corresponding is stored in the first memory block;
Processing unit arranges the configuration information of memory element, and described configuration information is stored in the first storage District;
Start unit receives the private key of the first instruction and user's transmission and adds confidential information, and from described first storage District reads PKI to encryption/decryption element;
Encryption/decryption element adds confidential information to the private key that user sends and is decrypted, and obtains decryption information;
Verification unit judges that the signing messages in decryption information and the second memory block is the most identical, if then leading to Cross verification, the most not by verification.
Further, described first instruction is application enabled instruction, and the most described method also includes:
Start unit receives the second instruction, and processing unit updates the application in memory element and performs code and label Name information, described second instruction is application download instruction.
Further, described configuration information includes download information, reading writing information and erasure information;Then institute State " configuration information that processing unit arranges memory element " to specifically include:
The download information of memory element is set to download by processing unit, the read-write of memory element is believed Breath is set to read-only and forbids write, is set to non-erasable by the erasure information of memory element.
Further, described device also includes that Tip element, described method include: Tip element is in verification Unit verification is obstructed out-of-date sends information.
Further, described memory element is nonvolatile memory.
Application sign test method and apparatus described in technique scheme, described method is applied to apply sign test dress Putting, described device includes processing unit, memory element, encryption/decryption element, start unit and verification unit; Described memory element includes the first memory block and the second memory block;Described method includes: first processing unit Obtaining application and perform code, encryption/decryption element performs code to application and is encrypted, and obtains PKI and private key, And generate the signing messages that application execution code is corresponding, and described application execution code and this application are held The signing messages that line code is corresponding is stored in the second memory block storage, and this application is performed the public affairs that code is corresponding Key is stored in the first memory block;And post-processing unit arranges the configuration information of memory element, and join described Confidence breath is stored in the first memory block;The private key that then start unit reception the first instruction and user send adds Confidential information, and from described first memory block, read PKI to encryption/decryption element;Then encryption/decryption element pair The private key that user sends adds confidential information and is decrypted, and obtains decryption information;Then verification unit judges deciphering Information is the most identical with the signing messages in the second memory block, if then by verification, the most not passing through school Test.Arranged by the subregion of memory element so that in memory element, a part of subregion is read-only, another part Subregion is writeable readable, and Reading Sections may be used for the important information during storage sign test, such as PKI etc.; Writeable readable subregion is conducive to storing the execution code of application program, it is simple to be updated application program, Substantially increase the flexibility ratio of SOC system, reduce hardware cost, thus at computer chip design neck Territory has wide market prospect.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of the application sign test device that an embodiment of the present invention relates to;
Fig. 2 is the Organization Chart of the SOC that an embodiment of the present invention relates to;
Fig. 3 is the flow chart of the application sign test method that an embodiment of the present invention relates to;
Description of reference numerals:
101, processing unit;
102, encryption/decryption element;
103, memory element;113, the first memory block;123, the second memory block;
104, start unit;
105, verification unit;
106, Tip element.
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, below In conjunction with specific embodiments and coordinate accompanying drawing to be explained in detail.
Refer to Fig. 1, for the schematic diagram of the application sign test device that an embodiment of the present invention relates to;Described dress Put and include processing unit 101, memory element 103, encryption/decryption element 102, start unit 104 and verification Unit 105, described processing unit 101 and encryption/decryption element 102 connect, described processing unit 101 with deposit Storage unit 103 connects, and described memory element 103 is connected with encryption/decryption element 102, described start unit 104 are connected with encryption/decryption element 102, and described verification unit 105 is connected with encryption/decryption element 102;Described Memory element 103 includes the first memory block 113 and the second memory block 123;
Described processing unit 101 is used for obtaining application and performs code, and described encryption/decryption element 102 is for right Application performs code and is encrypted, and obtains PKI and private key, and generates the signature that application execution code is corresponding Information;
Described second memory block 123 is corresponding for storing application execution code and this application execution code Signing messages, described first memory block 113 performs, for storing this application, the PKI that code is corresponding;
Described processing unit 101 is additionally operable to arrange the configuration information of memory element, and by described configuration information It is stored in the first memory block;
Described start unit 104 adds confidential information for the private key receiving the first instruction and user sends, and from Described first memory block is read PKI to encryption/decryption element;
Described encryption/decryption element 102 adds confidential information for the private key sending user and is decrypted, and is solved Confidential information;
Described verification unit 105 is for judging signing messages in decryption information and the second memory block whether phase With, if then by verification, the most not by verification.
When using application sign test device to carry out application signature checking, first processing unit obtains to apply and performs Code, described processing unit is the electronic component with data processing function, such as CPU.Described application is held Line code is the execution code that software application is digitally signed checking, and software application is different, its correspondence Perform code the most different.
Then application execution code is encrypted by encryption/decryption element, obtains PKI and private key, and generation should The signing messages corresponding with performing code.In the present embodiment, use rivest, shamir, adelman to application Execution code is encrypted, such as, can use Hash AES that application is performed code and be encrypted, To improve the safety of the signing messages after encrypting.In the present embodiment, described memory element be non-easily The property lost memorizer.Described memory element includes the first memory block and the second memory block.The PKI that encryption obtains Can be stored in the first memory block of memory element, application performs code and this application performs code correspondence Signing messages can be stored in the second memory block of memory element.
And post-processing unit arranges the configuration information of memory element, and described configuration information is stored in first Memory block.In the present embodiment, described configuration information includes download information, reading writing information and erasing Information.Described " processing unit is additionally operable to arrange the configuration information of memory element " specifically includes: described place The reading writing information of memory element, for being set to download by download information, is set to read-only by reason unit And forbid write, the erasure information of memory element is set to non-erasable.So, the of storage of public keys One memory block attribute is arranged to read-only, not writeable, non-erasable, it is ensured that the safety of PKI, and then Ensure the safety of application sign test process.So far, the preparation before sign test arranges work and completes, and can start Application sign test operation.
The private key that then start unit reception the first instruction and user send adds confidential information, and from described first Memory block is read PKI to encryption/decryption element.In the present embodiment, described first instruction is opened for application Dynamic instruction, described start unit is that BOOTROM, BOOTROOM store device execution sign test behaviour First code made, after receiving application enabled instruction, can read public affairs from described first memory block Key is to encryption/decryption element.In other embodiments, described start unit is additionally operable to receive the second instruction, institute Stating the second instruction is application download instruction, and described processing unit performs for updating the application in memory element Code and signing messages.When user downloads other instructions, processing unit can reacquire just-downloaded answering With performing code, new application execution code can be encrypted and obtain new signing messages by encryption/decryption element, And new application execution code and signing messages are stored in the second memory block of memory element.
Then encryption/decryption element adds confidential information to the private key that user sends and is decrypted, and obtains decryption information. The principle of rivest, shamir, adelman be with public key encryption, private key deciphering or with private key encryption, public key decryptions. Wherein, PKI is stored in the first memory block of memory element, and private key sends the electricity of sign test request user On subset.When carrying out sign test certification, encryption/decryption element can obtain PKI in the first memory block to The private key that family sends adds confidential information and is decrypted, and obtains decryption information.
Signing messages during then verification unit judges decryption information and the second memory block is the most identical, if Then by verification, the most not by verification.If decryption information is consistent with signing messages, illustrate that user is legal, The application that then start unit can start to perform in the second memory block of memory element performs code, completes this The startup of application.If decryption information is inconsistent with signing messages, then explanation user is illegal, then start unit The application that will not start to perform in the second memory block of memory element performs code.In the present embodiment, Described device also includes Tip element, and described Tip element is for out-of-date sending verification unit verification is obstructed Information.Described information can be information of voice prompt, prompt information etc..
As in figure 2 it is shown, the Organization Chart of the SOC related to for an embodiment of the present invention.Described application Device can be integrated in SOC, and safe SOC includes universal cpu module (CPU), straight Meet internal memory read module (DMA), high-speed bus (High Speed Bus), low speed bus (Low Speed Bus), the bridge (Bridge) of high low speed general line system, start read only memory (BOOTROM), dynamically deposit Reservoir (RAM), nonvolatile storage, enciphering and deciphering algorithm accelerating module (Crypto_ip), USB (universal serial bus) Module (USB), simulates numeral/digital-to-analogue conversion module (ADC/DAC), universal input/output interface mould Block (GPIO), IC-card interface module (SAM), universal asynchronous receiving-transmitting transmitter UART/ serial ports Peripheral Interface SPI module (USART), intervalometer (TIMER), two-wire serial EBI (I2C), IC interior sound Frequently bus (I2S), physical security detection and protection module (Defender), system management module (SMU), protect Protect unit module (PU) etc..
Below the modules function of SOC framework is illustrated: universal cpu refers to application In Embedded 32 or 64 business CPU, such as ARM, MIPS etc..The i.e. present invention implements Processing unit in example.High-speed bus and low speed bus are the system bus supporting with CPU, general high speed For ahb bus or AXI bus, low speed bus is generally APB bus.RAM is the high speed of system Dynamic memory, for caching system data.USB is system and outside high-speed interface, completes debugging Or quickly transmit the function of data;ADC/DAC is the simulation numeral/digital-to-analogue conversion interface in sheet, Complete the hardware decoding function of magnetic card, the generation of true random number simultaneously;GPIO module is general except completing Outside input/output function, also supporting TIE_LOW function and ONES function, TIE_LOW function is high Level is output, and low level is input, and ONES function is when being configured as output to as high level, is passing through After regular hour, high level is reset by hardware automatically, output low level.
Nonvolatile storage is eFlash or eeprom on the main storage area of system, generally sheet, i.e. The memory element of the present invention, including INFORMATION interval (the first memory block) and MAINBLOCK Interval (the second memory block), the interval attribute that can arrange self of INFORMATION and system open The dynamic configuration information needed, the attribute of self includes reading, write and erasing etc. controls, configuration information Including JTAG, start-up mode and the most modifiable cipher key configuration, MAINBLOCK interval does not belong to Property limit, can read, write and wipe.In the present embodiment, when PKI is once write Behind INFORMATION interval, attribute interval for INFORMATION will be arranged to read-only, can not Write, non-erasable.
Encryption and decryption accelerating module (encryption/decryption element in Crypto_ip, the i.e. present invention) supports multiple symmetry and non- The symmetrical hardware-accelerated algorithm of encryption and decryption, described hardware-accelerated algorithm include SM2, SM3, SM4, RSA2048/RSA1024, AES_128, DES/3DES and HASH_256 scheduling algorithm.BOOTROM The clean boot of (i.e. start unit in the present invention) completion system, start sign test, the merit of key updating Energy.SAM module is the logical access control module of IC-card, supports ISO7816;USART module root According to CPU configuration support UART or SPI function, it is achieved drive SPI liquid crystal display screen, debugging or with The functions such as bluetooth peripheral hardware communication;TIMER realizes the function of timing;I2C completes such as IC-card physics The function of the configuration of interface chip;I2S realizes outside audio interface.
Defender realizes real-time clock (RTC), key preserves and external physical detecting function, this thing Reason detects CPU work or does not work the most real-time being operated according to configuration, physical detecting type Including voltage detecting, current detecting, frequency deviation detection, temperature detection, detection etc. of uncapping, if be detected that Abnormal, just the key being saved in inside is removed.Work as system worked well, need the sensitivity of safeguard protection After data store physical security and protection module (Defender), it is necessary to constantly to these sensitive datas Proposing protection, when the temperature detecting that someone uncaps, module frequency offsets or works, voltage, electric current are not When the region of normal design, automatically sensitive data can be removed, reach protected effect.SMU module is The control module of the clock of system, reset and system register, reading configuration is at system management module (SMU) completing in, when system reset releases when, system first has to read configuration from nonvolatile storage After word, completing configuration, other modules just can work.PU is the protected location module of system, according to system Configuration determine which peripheral hardware or internal memory are in guard mode, which can access, and which can not access.
As it is shown on figure 3, the flow chart of the application sign test method related to for an embodiment of the present invention.Described Method be applied to apply sign test device, described device include processing unit, memory element, encryption/decryption element, Start unit and verification unit, described processing unit and encryption/decryption element connect, described processing unit with deposit Storage unit connects, and described memory element is connected with encryption/decryption element, described start unit and encryption/decryption element Connecting, described verification unit is connected with encryption/decryption element;Described memory element includes the first memory block and Two memory blocks;Described method includes:
Initially entering step S301 processing unit and obtain application execution code, described processing unit is for having number According to the electronic component of process function, such as CPU.It is that software application carries out numeral label that described application performs code The execution code of name checking, software application is different, and the execution code of its correspondence is the most different.
Then enter step S302 encryption/decryption element application execution code is encrypted, obtain PKI and private Key, and generate the signing messages that application execution code is corresponding.In the present embodiment, asymmetric adding is used Close algorithm performs code to application and is encrypted, such as, can use Hash AES that application is performed generation Code is encrypted, to improve the safety of the signing messages after encrypting.In the present embodiment, deposit described in Storage unit is nonvolatile memory.Described memory element includes the first memory block and the second memory block.And The signing messages that described application execution code and this application perform code corresponding is deposited by rear entrance step S303 Being stored in the second memory block, the PKI that this application is performed code corresponding is stored in the first memory block.
Then enter step S304 processing unit and the configuration information of memory element is set, and by described configuration letter Breath is stored in the first memory block.In the present embodiment, described configuration information includes download information, read-write Information and erasure information.Described " processing unit is additionally operable to arrange the configuration information of memory element " is concrete Including: the read-write of memory element, for being set to download by download information, is believed by described processing unit Breath is set to read-only and forbids write, is set to non-erasable by the erasure information of memory element.So, First memory block attribute of storage of public keys is arranged to read-only, not writeable, non-erasable, it is ensured that PKI Safety, and then ensure the safety of application sign test process.So far, to arrange work complete for the preparation before sign test Become, can start to apply sign test to operate.
The private key then entering step S305 start unit reception the first instruction and user's transmission adds confidential information, And from described first memory block, read PKI to encryption/decryption element.In the present embodiment, described first Instruction is application enabled instruction, and described start unit is BOOTROM, and BOOTROOM stores dressing Put first code performing sign test operation, after receiving application enabled instruction, can deposit from described first Storage area reads PKI to encryption/decryption element.In other embodiments, described start unit is additionally operable to receive Second instruction, described second instruction is application download instruction, and described processing unit is used for updating memory element In application perform code and signing messages.When user downloads other instructions, processing unit can obtain again Taking just-downloaded application and perform code, new application execution code can be encrypted and obtain by encryption/decryption element New signing messages, and new application performs code and signing messages is stored in the second of memory element and stores District.
Then enter step S306 encryption/decryption element the private key that user sends is added confidential information to be decrypted, must To decryption information.The principle of rivest, shamir, adelman is with public key encryption, private key deciphering or to add with private key Close, public key decryptions.Wherein, PKI is stored in the first memory block of memory element, and private key is sent out user Go out on the electronic equipment of sign test request.When carrying out sign test certification, encryption/decryption element can obtain the first storage PKI in district adds confidential information to the private key that user sends and is decrypted, and obtains decryption information.
Then enter step S307 verification unit and judge that the signing messages in decryption information and the second memory block is No identical, if then entering step S308 to pass through verification, otherwise enter step S309 by verification. If decryption information is consistent with signing messages, illustrating that user is legal, then start unit can start to perform storage Application in second memory block of unit performs code, completes the startup of this application.If decryption information and label Name information is inconsistent, then explanation user is illegal, then start unit will not start to perform the second of memory element Application in memory block performs code.In the present embodiment, described device also includes Tip element, institute State Tip element for out-of-date sending information verification unit verification is obstructed.Described information is permissible It is information of voice prompt, prompt information etc..
Application sign test method and apparatus described in technique scheme, described method is applied to apply sign test dress Putting, described device includes processing unit, memory element, encryption/decryption element, start unit and verification unit; Described memory element includes the first memory block and the second memory block;Described method includes: first processing unit Obtaining application and perform code, encryption/decryption element performs code to application and is encrypted, and obtains PKI and private key, And generate the signing messages that application execution code is corresponding, and described application execution code and this application are held The signing messages that line code is corresponding is stored in the second memory block storage, and this application is performed the public affairs that code is corresponding Key is stored in the first memory block;And post-processing unit arranges the configuration information of memory element, and join described Confidence breath is stored in the first memory block;The private key that then start unit reception the first instruction and user send adds Confidential information, and from described first memory block, read PKI to encryption/decryption element;Then encryption/decryption element pair The private key that user sends adds confidential information and is decrypted, and obtains decryption information;Then verification unit judges deciphering Information is the most identical with the signing messages in the second memory block, if then by verification, the most not passing through school Test.Arranged by the subregion of memory element so that in memory element, a part of subregion is read-only, another part Subregion is writeable readable, and Reading Sections may be used for the important information during storage sign test, such as PKI etc.; Writeable readable subregion is conducive to storing the execution code of application program, it is simple to be updated application program, Substantially increase the flexibility ratio of SOC system, reduce hardware cost, thus at computer chip design neck Territory has wide market prospect.
It should be noted that in this article, the relational terms of such as first and second or the like is used merely to One entity or operation are separated with another entity or operating space, and not necessarily requires or imply Relation or the order of any this reality is there is between these entities or operation.And, term " includes ", " comprise " or its any other variant is intended to comprising of nonexcludability, so that include that one is The process of row key element, method, article or terminal unit not only include those key elements, but also include not There are other key elements being expressly recited, or also include setting for this process, method, article or terminal Standby intrinsic key element.In the case of there is no more restriction, by statement " including ... " or " comprising ... " The key element limited, it is not excluded that in including the process of described key element, method, article or terminal unit There is also other key element.Additionally, in this article, the reason such as " being more than ", " being less than ", " exceeding " Solve as not include this number;More than " ", " below ", " within " etc. be interpreted as including this number.
Although being described the various embodiments described above, but those skilled in the art once learn Basic creative concept, then can make other change and amendment to these embodiments, so above institute Stating only embodiments of the invention, not thereby limit the scope of patent protection of the present invention, every utilization is originally Equivalent structure or equivalence flow process that description of the invention and accompanying drawing content are made convert, or directly or indirectly use In the technical field that other are relevant, within being the most in like manner included in the scope of patent protection of the present invention.

Claims (10)

1. one kind application sign test device, it is characterised in that described device include processing unit, memory element, Encryption/decryption element, start unit and verification unit, described processing unit and encryption/decryption element connect, described Processing unit is connected with memory element, and described memory element is connected with encryption/decryption element, described start unit Being connected with encryption/decryption element, described verification unit is connected with encryption/decryption element;Described memory element includes One memory block and the second memory block;
Described processing unit is used for obtaining application and performs code, and described encryption/decryption element is for performing application Code is encrypted, and obtains PKI and private key, and generates the signing messages that application execution code is corresponding;
Described second memory block performs, for storing application execution code and this application, the signature that code is corresponding Information, described first memory block performs, for storing this application, the PKI that code is corresponding;
Described processing unit is additionally operable to arrange the configuration information of memory element, and is stored by described configuration information In the first memory block;
Described start unit adds confidential information for the private key receiving the first instruction and user's transmission, and from described First memory block is read PKI to encryption/decryption element;
Described encryption/decryption element adds confidential information for the private key sending user and is decrypted, and obtains solving secret letter Breath;
Described verification unit is used for judging that the signing messages in decryption information and the second memory block is the most identical, If then by verification, the most not by verification.
2. application sign test device as claimed in claim 1, it is characterised in that described first instruction is for answering With enabled instruction, the most described start unit is additionally operable to receive the second instruction, and described second instruction is under application Carrying instruction, described processing unit performs code and signing messages for updating the application in memory element.
3. application sign test device as claimed in claim 1, it is characterised in that described configuration information includes Download information, reading writing information and erasure information;It is then described that " processing unit is additionally operable to arrange memory element Configuration information " specifically include:
Described processing unit is for being set to download by download information, by the reading writing information of memory element It is set to read-only and forbids write, the erasure information of memory element is set to non-erasable.
4. application sign test device as claimed in claim 1, it is characterised in that described device also includes carrying Showing unit, described Tip element is for out-of-date sending information verification unit verification is obstructed.
5. application sign test device as claimed in claim 1, it is characterised in that described memory element is non- Volatile memory.
6. an application sign test method, it is characterised in that described method is applied to apply sign test device, institute State device and include processing unit, memory element, encryption/decryption element, start unit and verification unit, described Processing unit and encryption/decryption element connect, and described processing unit is connected with memory element, described memory element Being connected with encryption/decryption element, described start unit is connected with encryption/decryption element, described verification unit with add solution Close unit connects;Described memory element includes the first memory block and the second memory block;Described method includes:
Processing unit obtains application and performs code, and encryption/decryption element performs code to application and is encrypted, To PKI and private key, and generate the signing messages that application execution code is corresponding, and described application is performed generation Code and this application perform signing messages corresponding to code and are stored in the second memory block storage, this application are held The PKI that line code is corresponding is stored in the first memory block;
Processing unit arranges the configuration information of memory element, and described configuration information is stored in the first storage District;
Start unit receives the private key of the first instruction and user's transmission and adds confidential information, and from described first storage District reads PKI to encryption/decryption element;
Encryption/decryption element adds confidential information to the private key that user sends and is decrypted, and obtains decryption information;
Verification unit judges that the signing messages in decryption information and the second memory block is the most identical, if then leading to Cross verification, the most not by verification.
7. application sign test method as claimed in claim 6, it is characterised in that described first instruction is for answering With enabled instruction, the most described method also includes:
Start unit receives the second instruction, and processing unit updates the application in memory element and performs code and label Name information, described second instruction is application download instruction.
8. application sign test method as claimed in claim 6, it is characterised in that described configuration information includes Download information, reading writing information and erasure information;It is then described that " processing unit arranges the configuration of memory element Information " specifically include:
The download information of memory element is set to download by processing unit, the read-write of memory element is believed Breath is set to read-only and forbids write, is set to non-erasable by the erasure information of memory element.
9. application sign test method as claimed in claim 6, it is characterised in that described device also includes carrying Show that unit, described method include: Tip element out-of-date sends information verification unit verification is obstructed.
10. application sign test method as claimed in claim 6, it is characterised in that described memory element is Nonvolatile memory.
CN201610164129.5A 2016-03-22 2016-03-22 Application attestation method and apparatus Pending CN105844147A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610164129.5A CN105844147A (en) 2016-03-22 2016-03-22 Application attestation method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610164129.5A CN105844147A (en) 2016-03-22 2016-03-22 Application attestation method and apparatus

Publications (1)

Publication Number Publication Date
CN105844147A true CN105844147A (en) 2016-08-10

Family

ID=56587896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610164129.5A Pending CN105844147A (en) 2016-03-22 2016-03-22 Application attestation method and apparatus

Country Status (1)

Country Link
CN (1) CN105844147A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112214795A (en) * 2020-10-13 2021-01-12 天津津航计算技术研究所 Encryption module suitable for various data bandwidths
CN113139197A (en) * 2021-04-27 2021-07-20 上海淇玥信息技术有限公司 Project signature checking method and device and electronic equipment
CN114721729A (en) * 2020-12-22 2022-07-08 中国科学院沈阳自动化研究所 ZYNQ trusted starting method based on JTAG transmission protocol

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609665A (en) * 2012-01-19 2012-07-25 福建三元达软件有限公司 Method and device for signing user program and method and device for verifying signature of user program
CN103049694A (en) * 2013-01-14 2013-04-17 上海慧银信息科技有限公司 Core safety architecture implementation method of intelligent financial transaction terminal
CN103914658A (en) * 2013-01-05 2014-07-09 展讯通信(上海)有限公司 Safe starting method of terminal equipment, and terminal equipment
CN104866343A (en) * 2015-05-15 2015-08-26 长城信息产业股份有限公司 Security startup method for embedded equipment and securely-started embedded equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609665A (en) * 2012-01-19 2012-07-25 福建三元达软件有限公司 Method and device for signing user program and method and device for verifying signature of user program
CN103914658A (en) * 2013-01-05 2014-07-09 展讯通信(上海)有限公司 Safe starting method of terminal equipment, and terminal equipment
CN103049694A (en) * 2013-01-14 2013-04-17 上海慧银信息科技有限公司 Core safety architecture implementation method of intelligent financial transaction terminal
CN104866343A (en) * 2015-05-15 2015-08-26 长城信息产业股份有限公司 Security startup method for embedded equipment and securely-started embedded equipment

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112214795A (en) * 2020-10-13 2021-01-12 天津津航计算技术研究所 Encryption module suitable for various data bandwidths
CN112214795B (en) * 2020-10-13 2022-08-16 天津津航计算技术研究所 Encryption module suitable for various data bandwidths
CN114721729A (en) * 2020-12-22 2022-07-08 中国科学院沈阳自动化研究所 ZYNQ trusted starting method based on JTAG transmission protocol
CN114721729B (en) * 2020-12-22 2024-07-16 中国科学院沈阳自动化研究所 ZYNQ trusted starting method based on JTAG transmission protocol
CN113139197A (en) * 2021-04-27 2021-07-20 上海淇玥信息技术有限公司 Project signature checking method and device and electronic equipment
CN113139197B (en) * 2021-04-27 2024-05-28 上海淇玥信息技术有限公司 Project label checking method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN105391840B (en) Automatically create destination application
KR101712784B1 (en) System and method for key management for issuer security domain using global platform specifications
CN104156642B (en) A kind of security password input system and method based on safe touch screen control chip
US9407636B2 (en) Method and apparatus for securely saving and restoring the state of a computing platform
US8543838B1 (en) Cryptographic module with secure processor
CN114218592A (en) Sensitive data encryption and decryption method and device, computer equipment and storage medium
CN100456200C (en) Multi-token seal and unseal
US10536274B2 (en) Cryptographic protection for trusted operating systems
CN106104557B (en) For obtaining secret System and method for from the master key for the application being tied in equipment
CN109858265A (en) A kind of encryption method, device and relevant device
CN105718807B (en) Android system and its authentic authentication system based on soft TCM and credible software stack and method
CN108140093A (en) Secret is migrated using for the hardware root of trust of equipment
CN106605233A (en) Providing a trusted execution environment using a processor
CN108345806A (en) A kind of hardware encryption card and encryption method
Arfaoui et al. Trusted execution environments: A look under the hood
US10691627B2 (en) Avoiding redundant memory encryption in a cryptographic protection system
CN102609665B (en) Method and device for signing user program and method and device for verifying signature of user program
CN103902915B (en) Trustable industrial control terminal and establishing method thereof
CN104462965A (en) Method for verifying integrity of application program and network device
US10949537B2 (en) Secure firmware provisioning and device binding mechanism
TW201706899A (en) Security device and method of providing security service to host therein, security apparatus and computer software product
CN101004719A (en) Embedded system and method for increasing embedded system security
CN103649964A (en) Secure hosted execution architecture
CN110401539A (en) A kind of certificate data processing method, server, terminal and system
CN109460639A (en) A kind of license authentication control method, device, terminal and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160810