CN106599729A - Safety verification method and system for driving program - Google Patents
Safety verification method and system for driving program Download PDFInfo
- Publication number
- CN106599729A CN106599729A CN201611131335.2A CN201611131335A CN106599729A CN 106599729 A CN106599729 A CN 106599729A CN 201611131335 A CN201611131335 A CN 201611131335A CN 106599729 A CN106599729 A CN 106599729A
- Authority
- CN
- China
- Prior art keywords
- driver
- digital signature
- feature value
- driving program
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
The application discloses a safety verification method for a driving program. The method comprises the following steps: encrypting the driving program provided by a driving program issuer and generating a digital signature; decrypting the digital signature through a public key issued by the driving program issuer when the driving program is installed and obtaining standard feature value of the driving program; calculating the decrypted driving program and obtaining verification feature value; and determining whether the standard feature value is the same as the verification feature value and passing safety verification on the driving program if so. The safety verification method for the driving program helps ensure that the driving program is an original file issued by the issuer. Meanwhile, the original file is not tampered by other programs or covered so that installation safety of the driving program is ensured. The application further provides a safety verification system for the driving program with the above beneficial effect.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of driver safe verification method, further relate to one kind
Driver security authentication systems.
Background technology
At present, some operating systems provide driver digital signature policy, such as Microsoft Windows operations system
System.Device driver and operating system file in Windows all has Microsoft digital signature.Digital signature shows
Certain special driver or file are strictly publisher's issue, it is ensured that this driver is the original text that publisher issues
Part, and by the installation process change of other programs or do not cover.Driver digital signature policy is protected to a certain extent
The safety of driver is demonstrate,proved.However, for (SuSE) Linux OS, and a collection of class UNIX operating system, then without corresponding
Driver Sign Policies.The driver of these operating systems is in the form of kernel extensions, it is considered that be operation
The publisher of system provides, and the installation process with operating system is installed to host computer system simultaneously.But for some device fabrications
Business, or system integrator, when needing to provide external equipment driving support, publish the driver on these platforms
Bag, there is safety problem.Verifier not can confirm that driver file is exactly the original document that publisher issues, while
The driver for publishing not can confirm that with the presence or absence of being tampered, it is counterfeiting.
Therefore, how to verify that driver is the original document that publisher issues, at the same do not distorted by other programs or
Person covers, and the safety in order to ensure to install driver is those skilled in the art's technical issues that need to address.
The content of the invention
It is an object of the invention to provide a kind of driver safe verification method, can effectively verify that driver is to issue
The original document of Fang Fabu, while do not distorted or covered by other programs, in order to ensure to install the safety of driver
Property.
To solve above-mentioned technical problem, the present invention provides a kind of driver safe verification method, including:
The driver that driver publisher provides is encrypted, digital signature is generated;
When the driver is installed, the public key issued by the driver publisher is entered to the digital signature
Row decryption, obtains the Standard Eigenvalue of the driver;
The driver after to decryption is calculated, and obtains calibration feature value;
Judge whether the Standard Eigenvalue is consistent with the calibration feature value, if unanimously, the driver passes through
Safety verification.
Preferably, in above-mentioned driver safe verification method, the driver that driver publisher provides is entered
Row encryption, generates digital signature, including:
The Standard Eigenvalue of the driver is extracted, and the Standard Eigenvalue is encrypted, by the institute after encryption
Standard Eigenvalue is stated as the digital signature of the driver publisher.
Preferably, in above-mentioned driver safe verification method, the Standard Eigenvalue for extracting the driver,
Including:
The image file summary of the driver is extracted by SHA-1 SHA summarization generations algorithm.
Preferably, it is described that the Standard Eigenvalue is encrypted in above-mentioned driver safe verification method, bag
Include:
Image file summary is encrypted by RSA public key encryption algorithms.
Preferably, in above-mentioned driver safe verification method, if the Standard Eigenvalue and the calibration feature value
Inconsistent, then the driver exits installation.
The present invention also provides a kind of driver security authentication systems, including:
Digital signature generation module, for being encrypted to the driver that driver publisher provides, generates numeral
Signature;
Public key, for when the driver is installed, being decrypted to the digital signature, obtains the driver
Standard Eigenvalue;
Computing module, calculates for the driver after to decryption, obtains calibration feature value;
Secure verification module, for judging whether the Standard Eigenvalue is consistent with the calibration feature value, if unanimously,
The driver passes through safety verification.
Preferably, in above-mentioned driver security authentication systems, the digital signature generation module includes:
Extraction unit, for extracting the mirror image of the driver by SHA-1 SHA summarization generations algorithm
Document.
Preferably, in above-mentioned driver security authentication systems, the digital signature generation module includes:Encryption is single
Unit, for being encrypted to image file summary by RSA public key encryption algorithms.
A kind of driver safe verification method provided by the present invention, including:The driving that driver publisher is provided
Program is encrypted, and generates digital signature;When the driver is installed, the public affairs issued by the driver publisher
Key is decrypted to the digital signature, obtains the Standard Eigenvalue of the driver;The driver after to decryption
Calculated, obtained calibration feature value;Judge whether the Standard Eigenvalue is consistent with the calibration feature value, if unanimously,
The driver passes through safety verification.
The publisher of driver to generate digital signature in the way of to driver encrypt, prevent in installation process by
Distort, driver provides the public key that can untie digital signature simultaneously, after installation, driver is solved using public key
It is close, the Standard Eigenvalue of driver is obtained, while the driver after to decryption is calculated, obtain calibration feature
Value, Standard Eigenvalue is contrasted with calibration feature value, if unanimously, the driver demonstrated in installation process does not have quilt
Distort.Ensure that driver is the original document that publisher issues, while do not distorted or covered by other programs, so as to
In the safety for ensureing to install driver.
The present invention also provides a kind of driver security authentication systems, with above-mentioned beneficial effect, will not be described here.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can be with basis
The accompanying drawing of offer obtains other accompanying drawings.
The flow chart of the driver safe verification method that Fig. 1 is provided by the embodiment of the present invention;
The driver security authentication systems structured flowchart that Fig. 2 is provided by the embodiment of the present invention.
Specific embodiment
To make purpose, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
The a part of embodiment of the present invention, rather than the embodiment of whole.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Refer to Fig. 1, the flow chart of the driver safe verification method that Fig. 1 is provided by the embodiment of the present invention, the party
Method specifically can include:
The present invention provides a kind of driver safe verification method, including:
Step S1:The driver that driver publisher provides is encrypted, digital signature is generated;
Wherein, the digital signature method that driver publisher provides is digitally signed to the driving bag to be issued, drives
The Standard Eigenvalue of driver and the precalculated driver of driver publisher is included in dynamic bag.Standard Eigenvalue
After encrypted, together issue with driver package as digital signature, the digital signature before installing for driver file is tested
Card operation.
Step S2:When the driver is installed, by the public key of driver publisher issue to the number
Word signature is decrypted, and obtains the Standard Eigenvalue of the driver;
Wherein, driver publisher provides digital signature keys Core Generator, feature of this instrument according to user input
Value, generates for the public key (pub-key) and private key (pri-key) needed for public key encryption algorithm, and public key is used as can
Untie the key of digital signature.
Step S3:The driver after to decryption is calculated, and obtains calibration feature value;
The driver after decryption is calculated using SHA-1 SHAs, obtains calibration feature value, it is therefore an objective to
Whether the calibration feature value for obtaining has deviation, if having, illustrate the driver encrypted may in installation process still by
Distort or attacked, if not having, illustrate that driver passes through safety verification.
Step S4:Judge whether the Standard Eigenvalue is consistent with the calibration feature value, if unanimously, the driving journey
Sequence passes through safety verification.
The publisher of driver to generate digital signature in the way of to driver encrypt, prevent in installation process by
Distort, driver provides the public key that can untie digital signature simultaneously, after installation, driver is solved using public key
It is close, the Standard Eigenvalue of driver is obtained, while the driver after to decryption is calculated, obtain calibration feature
Value, Standard Eigenvalue is contrasted with calibration feature value, if unanimously, the driver demonstrated in installation process does not have quilt
Distort.Ensure that driver is the original document that publisher issues, while do not distorted or covered by other programs, so as to
In the safety for ensureing to install driver.
On the basis of above-mentioned driver safe verification method, the driver that driver publisher provides is carried out
Encryption, generates digital signature, including:
The Standard Eigenvalue of the driver is extracted, and the Standard Eigenvalue is encrypted, by the institute after encryption
Standard Eigenvalue is stated as the digital signature of the driver publisher.
Wherein, digital signing tool using SHA-1 algorithms either other algorithms and RSA public key encryption algorithms or
Other AESs generate digital signature.It is pointed out that including but not limited to above-mentioned algorithm, if can realize encrypting with
And the effect of decryption, in protection domain.
On the basis of above-mentioned driver safe verification method, the Standard Eigenvalue for extracting the driver,
Including:The image file summary of the driver is extracted by SHA-1 SHA summarization generations algorithm.
Wherein, SHA1 (Secure Hash Algorithm Secure Hash Algorithm) summaries AES is primarily adapted for use in number
The Digital Signature Algorithm that word signature standard the inside defines.For length is less than the message of 2^64 positions, SHA1 can produce one 160
Eap-message digest, the avalanche effect (change a message data output valve can be made significantly to change) due to SHA1 algorithms with can not
Inverse property, can be used for verification of data integrity and information authentication.
It is described that the Standard Eigenvalue is encrypted on the basis of above-mentioned driver safe verification method, including:
Image file summary is encrypted by RSA public key encryption algorithms.
Wherein, RSA is current most influential public key encryption algorithm, and it can resist up to the present known big absolutely
Most cryptographic attacks, RSA Algorithm is first and specifically can be disclosed using RSA close while be used for the algorithm of encrypted and digitally signed
Key AES refer to prior art to the process that image file summary is encrypted, and will not be described here.
On the basis of above-mentioned driver safe verification method, if the Standard Eigenvalue is with the calibration feature value not
Unanimously, then the driver exits installation.
If the Standard Eigenvalue is inconsistent with calibration feature value, the driver exits installation, illustrates to drive
Dynamic program was attacked or was tampered, therefore, release install in time, it is ensured that the safety of local host.
Driver security authentication systems provided in an embodiment of the present invention are introduced below, driving journey described below
Sequence security authentication systems can be mutually to should refer to method.
Fig. 2 is refer to, Fig. 2 is driver security authentication systems structured flowchart provided in an embodiment of the present invention.
The present invention also provides a kind of driver security authentication systems, including:
Digital signature generation module 100, for being encrypted to the driver that driver publisher provides, generates number
Word is signed;
Public key 200, for when the driver is installed, being decrypted to the digital signature, obtains the driving
The Standard Eigenvalue of program;
Computing module 300, calculates for the driver after to decryption, obtains calibration feature value;
Secure verification module 400, for judging whether the Standard Eigenvalue is consistent with the calibration feature value, if one
Cause, then the driver passes through safety verification.
Further, in above-mentioned driver security authentication systems, the digital signature generation module includes:
Extraction unit, for extracting the mirror image of the driver by SHA-1 SHA summarization generations algorithm
Document.
Further, in above-mentioned driver security authentication systems, the digital signature generation module includes:
Ciphering unit, for being encrypted to image file summary by RSA public key encryption algorithms.It is each in description
Individual embodiment is described by the way of progressive, and what each embodiment was stressed is the difference with other embodiment, respectively
Between individual embodiment identical similar portion mutually referring to.For device disclosed in embodiment, due to itself and embodiment
Disclosed method is corresponding, so description is fairly simple, related part is referring to method part illustration.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description
And algorithm steps, can with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware and
The interchangeability of software, according to function has generally described the composition and step of each example in the above description.These
Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty
Technical staff can use different methods to realize described function to each specific application, but this realization should not
Think beyond the scope of this invention.
The step of method described with reference to the embodiments described herein or algorithm, directly can be held with hardware, processor
Capable software module, or the combination of the two is implementing.Software module can be placed in random access memory (RAM), internal memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, depositor, hard disk, moveable magnetic disc, CD-ROM or technology
In field in known any other form of storage medium.
Specific case used herein is set forth to the principle and embodiment of the present invention, and above example is said
It is bright to be only intended to help and understand the method for the present invention and its core concept.It should be pointed out that for the ordinary skill of the art
For personnel, under the premise without departing from the principles of the invention, some improvement and modification can also be carried out to the present invention, these improvement
Also fall in the protection domain of the claims in the present invention with modification.
Claims (8)
1. a kind of driver safe verification method, it is characterised in that include:
The driver that driver publisher provides is encrypted, digital signature is generated;
When the driver is installed, the public key issued by the driver publisher is solved to the digital signature
It is close, obtain the Standard Eigenvalue of the driver;
The driver after to decryption is calculated, and obtains calibration feature value;
Judge whether the Standard Eigenvalue is consistent with the calibration feature value, if unanimously, the driver is by safety
Checking.
2. driver safe verification method as claimed in claim 1, it is characterised in that driver publisher is provided
Driver is encrypted, and generates digital signature, including:
Extract the Standard Eigenvalue of the driver, and the Standard Eigenvalue be encrypted, by encryption after the mark
Digital signature of the quasi- eigenvalue as the driver publisher.
3. driver safe verification method as claimed in claim 2, it is characterised in that the extraction driver
Standard Eigenvalue, including:
The image file summary of the driver is extracted by SHA-1 SHA summarization generations algorithm.
4. driver safe verification method as claimed in claim 3, it is characterised in that described that the Standard Eigenvalue is entered
Row encryption, including:
Image file summary is encrypted by RSA public key encryption algorithms.
5. driver safe verification method as claimed in claim 4, it is characterised in that if the Standard Eigenvalue with it is described
Calibration feature value is inconsistent, then the driver exits installation.
6. a kind of driver security authentication systems, it is characterised in that include:
Digital signature generation module, for being encrypted to the driver that driver publisher provides, generates digital signature;
Public key, for when the driver is installed, being decrypted to the digital signature, obtains the mark of the driver
Quasi- eigenvalue;
Computing module, calculates for the driver after to decryption, obtains calibration feature value;
Secure verification module, it is if unanimously, described for judging whether the Standard Eigenvalue is consistent with the calibration feature value
Driver passes through safety verification.
7. driver security authentication systems as claimed in claim 6, it is characterised in that the digital signature generation module bag
Include:
Extraction unit, for extracting the image file of the driver by SHA-1 SHA summarization generations algorithm
Summary.
8. driver security authentication systems as claimed in claim 7, it is characterised in that the digital signature generation module bag
Include:
Ciphering unit, for being encrypted to image file summary by RSA public key encryption algorithms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611131335.2A CN106599729A (en) | 2016-12-09 | 2016-12-09 | Safety verification method and system for driving program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611131335.2A CN106599729A (en) | 2016-12-09 | 2016-12-09 | Safety verification method and system for driving program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106599729A true CN106599729A (en) | 2017-04-26 |
Family
ID=58598329
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611131335.2A Pending CN106599729A (en) | 2016-12-09 | 2016-12-09 | Safety verification method and system for driving program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106599729A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109240713A (en) * | 2018-08-27 | 2019-01-18 | 郑州云海信息技术有限公司 | Drive the encryption method of installation procedure, the installation method and device of driver |
CN109543397A (en) * | 2018-11-22 | 2019-03-29 | 福州符号信息科技有限公司 | A kind of encryption authorization scheme of algorithms library |
CN110378110A (en) * | 2019-06-28 | 2019-10-25 | 北京威努特技术有限公司 | Software cryptography processing method, software verification method and device |
WO2020019971A1 (en) * | 2018-07-25 | 2020-01-30 | 百富计算机技术(深圳)有限公司 | Active security protection method for operating system, system and terminal device |
CN111541553A (en) * | 2020-07-08 | 2020-08-14 | 支付宝(杭州)信息技术有限公司 | Trusted starting method and device of block chain all-in-one machine |
US11616636B2 (en) | 2020-07-08 | 2023-03-28 | Alipay (Hangzhou) Information Technology Co., Ltd. | Hash updating methods and apparatuses of blockchain integrated station |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020112161A1 (en) * | 2001-02-13 | 2002-08-15 | Thomas Fred C. | Method and system for software authentication in a computer system |
CN1558595A (en) * | 2004-01-18 | 2004-12-29 | 哈尔滨工业大学 | Method for making and verifying digital signature and digital watermark bar code |
CN1606270A (en) * | 2004-11-18 | 2005-04-13 | 耿健 | Method for implementing computer driving service security network system |
CN101382894A (en) * | 2007-09-05 | 2009-03-11 | 北京软通科技有限责任公司 | Method, system, computer, and server for downloading computer hardware device driver |
CN101626290A (en) * | 2008-07-09 | 2010-01-13 | 东莞市中大科教网络科技有限公司 | Method for signature and confidentiality by fingerprints |
CN101796766A (en) * | 2008-07-01 | 2010-08-04 | 松下电器产业株式会社 | Drive device, content reproduction device, recording device, data readout method, program, recording medium, and integrated circuit |
CN102317948A (en) * | 2011-06-23 | 2012-01-11 | 华为技术有限公司 | Protection method of chip and chip itself |
CN103530554A (en) * | 2013-10-29 | 2014-01-22 | 银联商务有限公司 | Driver package installation method, driver package generation method, payment device and driving server |
US20140365755A1 (en) * | 2013-06-07 | 2014-12-11 | Dell Inc. | Firmware authentication |
CN104932926A (en) * | 2015-07-09 | 2015-09-23 | 上海联彤网络通讯技术有限公司 | System and method for achieving dynamic matching of equipment and drives in intelligent operation system platform |
CN105827586A (en) * | 2015-01-27 | 2016-08-03 | 瑞萨电子株式会社 | Communication device, LSI, program, and communication system |
-
2016
- 2016-12-09 CN CN201611131335.2A patent/CN106599729A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020112161A1 (en) * | 2001-02-13 | 2002-08-15 | Thomas Fred C. | Method and system for software authentication in a computer system |
CN1558595A (en) * | 2004-01-18 | 2004-12-29 | 哈尔滨工业大学 | Method for making and verifying digital signature and digital watermark bar code |
CN1606270A (en) * | 2004-11-18 | 2005-04-13 | 耿健 | Method for implementing computer driving service security network system |
CN101382894A (en) * | 2007-09-05 | 2009-03-11 | 北京软通科技有限责任公司 | Method, system, computer, and server for downloading computer hardware device driver |
CN101796766A (en) * | 2008-07-01 | 2010-08-04 | 松下电器产业株式会社 | Drive device, content reproduction device, recording device, data readout method, program, recording medium, and integrated circuit |
CN101626290A (en) * | 2008-07-09 | 2010-01-13 | 东莞市中大科教网络科技有限公司 | Method for signature and confidentiality by fingerprints |
CN102317948A (en) * | 2011-06-23 | 2012-01-11 | 华为技术有限公司 | Protection method of chip and chip itself |
US20140365755A1 (en) * | 2013-06-07 | 2014-12-11 | Dell Inc. | Firmware authentication |
CN103530554A (en) * | 2013-10-29 | 2014-01-22 | 银联商务有限公司 | Driver package installation method, driver package generation method, payment device and driving server |
CN105827586A (en) * | 2015-01-27 | 2016-08-03 | 瑞萨电子株式会社 | Communication device, LSI, program, and communication system |
CN104932926A (en) * | 2015-07-09 | 2015-09-23 | 上海联彤网络通讯技术有限公司 | System and method for achieving dynamic matching of equipment and drives in intelligent operation system platform |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020019971A1 (en) * | 2018-07-25 | 2020-01-30 | 百富计算机技术(深圳)有限公司 | Active security protection method for operating system, system and terminal device |
CN109240713A (en) * | 2018-08-27 | 2019-01-18 | 郑州云海信息技术有限公司 | Drive the encryption method of installation procedure, the installation method and device of driver |
CN109543397A (en) * | 2018-11-22 | 2019-03-29 | 福州符号信息科技有限公司 | A kind of encryption authorization scheme of algorithms library |
CN109543397B (en) * | 2018-11-22 | 2022-02-11 | 福州符号信息科技有限公司 | Method and system for encrypting and authorizing algorithm library |
CN110378110A (en) * | 2019-06-28 | 2019-10-25 | 北京威努特技术有限公司 | Software cryptography processing method, software verification method and device |
CN111541553A (en) * | 2020-07-08 | 2020-08-14 | 支付宝(杭州)信息技术有限公司 | Trusted starting method and device of block chain all-in-one machine |
US11604633B2 (en) | 2020-07-08 | 2023-03-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted startup methods and apparatuses of blockchain integrated station |
US11616636B2 (en) | 2020-07-08 | 2023-03-28 | Alipay (Hangzhou) Information Technology Co., Ltd. | Hash updating methods and apparatuses of blockchain integrated station |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106599729A (en) | Safety verification method and system for driving program | |
Dunn et al. | Cloaking malware with the trusted platform module | |
CN101369889B (en) | Method for electronic endorsement of document | |
EP2465246B1 (en) | Layered protection and validation of identity data delivered online via multiple intermediate clients | |
CN104123508B (en) | Design method based on intranet data security protection engine | |
US20080235521A1 (en) | Method and encryption tool for securing electronic data storage devices | |
TWI486808B (en) | System for validating electronic insurance policy with certificate and method thereof | |
WO2008145058A1 (en) | An implement method and a device of electronic seal | |
CN107294710B (en) | Key migration method and device for vTPM2.0 | |
US8010804B2 (en) | Method to protect secrets against encrypted section attack | |
KR101269089B1 (en) | Software modulation prevention method using own encryption | |
Mladenov et al. | 1 trillion dollar refund: How to spoof pdf signatures | |
CN110837634B (en) | Electronic signature method based on hardware encryption machine | |
US8499357B1 (en) | Signing a library file to verify a callback function | |
JP4739404B2 (en) | Electronic bidding / bid opening program, electronic bidding / bid opening system, and electronic bidding / bid opening method | |
US20110145568A1 (en) | Handling of the usage of software in a disconnected computing environment | |
JP2011133967A (en) | Measurement device | |
KR20100106110A (en) | Secure boot data total management system, methods for generating and verifying a verity of matadata for managing secure boot data, computer-readable recording medium storing program for executing any of such methods | |
US8756433B2 (en) | Associating policy with unencrypted digital content | |
KR100734600B1 (en) | Method of system authentication and security enforcement using self-integrity checking based on the tamper-proof H/W | |
TWM508733U (en) | Authentication system of electronic insurance policy | |
CN109981612B (en) | Method and system for preventing cipher machine equipment from being illegally copied and cipher machine equipment | |
CN112528269B (en) | Method and device for realizing kernel cipher machine and electronic equipment | |
JP2019186848A (en) | Information processing system and program execution control method | |
Karter et al. | Security evaluation of embedded hardware implementation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170426 |