CN108154025A - Method, the method and device of application program mirror image processing of embedded device startup - Google Patents

Method, the method and device of application program mirror image processing of embedded device startup Download PDF

Info

Publication number
CN108154025A
CN108154025A CN201711406066.0A CN201711406066A CN108154025A CN 108154025 A CN108154025 A CN 108154025A CN 201711406066 A CN201711406066 A CN 201711406066A CN 108154025 A CN108154025 A CN 108154025A
Authority
CN
China
Prior art keywords
mirror image
application program
key
program mirror
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711406066.0A
Other languages
Chinese (zh)
Inventor
牛凡
杨金伟
梁锋文
杨海强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
STAR SOFTWARE TECHNOLOGY CO LTD
Original Assignee
STAR SOFTWARE TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by STAR SOFTWARE TECHNOLOGY CO LTD filed Critical STAR SOFTWARE TECHNOLOGY CO LTD
Priority to CN201711406066.0A priority Critical patent/CN108154025A/en
Publication of CN108154025A publication Critical patent/CN108154025A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application discloses method, method, embedded device starter and the program image processing unit of program image processing that a kind of embedded device starts, close and verification is decrypted during for starting in embedded device to program image, improves the safety in program image start-up course.The embodiment of the present application method includes:Run BOOT program images;The key of symmetric encipherment algorithm is read, the key is for the corresponding decruption key of the encrypted key of application program mirror image;It is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;The application program mirror image after decryption is verified;If being verified successfully to the application program mirror image after decryption, start the corresponding application program of the application program mirror image.

Description

Method, the method and device of application program mirror image processing of embedded device startup
Technical field
The invention relates to the method for embedded device field more particularly to a kind of startup of embedded device, applications Method, embedded device starter and the application program mirror image processing device of program image processing.
Background technology
With the development of electronic technology, embedded device is widely used in all trades and professions, embedded device mainly by Embeded processor, associated support hardware and embedded system composition, embedded system have the convenient flexible, ratio of performance to price High, the features such as embeddability is strong.
It is the necessary hardware environment of initialization first, including right in the startup program of the embedded device of the prior art Embeded processor, memory, the initialization process of nonvolatile memory, secondly by being stored on nonvolatile memory Program image is loaded into memory, is then exactly run the program being already loaded on memory and is redirected operation.
But in the prior art, user is the operation function for paying close attention to embedded device startup program so that embedded Formula equipment normally initialization apparatus and loading procedure and can correctly be run, when embedded device institute's loading procedure is illegally used When family is distorted or the program of the loading is illegal program, embedded device is caused to can not work normally.
Invention content
The embodiment of the present application discloses a kind of method that embedded device the starts, method of application program mirror image processing, embedding Enter formula equipment starter and application program mirror image processing device, for starting in embedded device during to applying journey Sequence mirror image is decrypted and verifies, and improves the safety during application program image starting.
The embodiment of the present application first aspect provides a kind of method that embedded device starts, including:
Run BOOT program images;
The key of symmetric encipherment algorithm is read, the key is close for the corresponding decryption of the encrypted key of application program mirror image Key;
It is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
The application program mirror image after decryption is verified;
If being verified successfully to the application program mirror image after decryption, start the corresponding application of the application program mirror image Program.
It is described based on the embodiment of the present application in a first aspect, in the first realization method of the embodiment of the present application first aspect Verification is carried out to the application program mirror image after decryption to include:
Read RSA Algorithm public key, and using the RSA Algorithm public key to the application program mirror image after decryption into Row verification;
Alternatively,
The application program mirror image after decryption is verified using hash check method or HMAC methods of calibration.
It is described based on the embodiment of the present application in a first aspect, in second of realization method of the embodiment of the present application first aspect Using before application program mirror image is decrypted described in the key pair of the symmetric encipherment algorithm, the method further includes:
The upgrading mark of data partition is read, the data partition is the data partition of the nonvolatile memory;
Judge whether the application program mirror image is upgraded according to the upgrading mark;
If the application program mirror image is upgraded, the application program mirror image is upgraded;
Accordingly, it is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm, after decryption The application program mirror image carry out verification include:
It is decrypted using upgrade procedure mirror image described in the key pair of the symmetric encipherment algorithm;
The upgrade procedure mirror image after decryption is verified;
If being verified successfully to the upgrade procedure mirror image after decryption, the corresponding application of the upgrade procedure mirror image is run Program;
If verifying failure to the upgrade procedure mirror image after decryption, it is corresponding embedding to restart the upgrade procedure mirror Enter formula equipment.
It is described based on the embodiment of the present application in a first aspect, in the third realization method of the embodiment of the present application first aspect After being verified to the application program mirror image after decryption, the method further includes:
If verifying failure to the application program mirror image after decryption, upgrading mark is set to the application program mirror image And rerun the corresponding embedded device of the application program mirror image.
The embodiment of the present application second aspect provides a kind of method of application program mirror image processing, including:
Key resource is generated, the key resource includes the key of symmetric encipherment algorithm, and the key is used for applying journey Sequence mirror image is encrypted and decrypts;
It is encrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
The key of the symmetric encipherment algorithm and the encrypted application program mirror image programming are deposited to non-volatile In reservoir.
It is described in the first realization method of the embodiment of the present application second aspect based on the embodiment of the present application second aspect Using before application program mirror image is encrypted described in the key pair of the symmetric encipherment algorithm, the method further includes:
It is signed using the private key of RSA Algorithm to the application program mirror image;
Accordingly, by the key of the symmetric encipherment algorithm and the encrypted application program mirror image programming to it is non-easily The property lost memory includes:
By the public key of the RSA Algorithm, the key of the symmetric encipherment algorithm, the encrypted application program mirror image with And in signature programming to nonvolatile memory, the public key of the RSA Algorithm is used for the application program mirror image after signature It is verified.
The embodiment of the present application third aspect provides a kind of embedded device starter, embedded device starter tool There is the function of realizing embedded device starter behavior in above-mentioned first aspect.The function can also may be used by hardware realization It is realized with performing corresponding software by hardware.The hardware or software include the one or more and corresponding mould of above-mentioned function Block.
The embodiment of the present application fourth aspect provides a kind of application program mirror image processing device, application program mirror image processing device Have the function of to realize application program mirror image processing device behavior in above-mentioned second aspect.The function can by hardware realization, Corresponding software can also be performed by hardware to realize.The hardware or software include one or more corresponding with above-mentioned function Module
The 5th aspect of the embodiment of the present application provides a kind of computer storage media, which is used to store For the computer software instructions used in the embedded device starter of above-mentioned first aspect, performed including being used for as first party Program designed by the embedded device starter in face.
The 6th aspect of the embodiment of the present application provides a kind of computer storage media, which is used to store It is second including being used to perform for the computer software instructions used in the application program mirror image processing device of above-mentioned second aspect Program designed by the application program mirror image processing device of aspect.
The 7th aspect of the embodiment of the present application provides a kind of computer program product, which includes calculating Machine software instruction, the computer software instructions can be loaded to realize above-mentioned first aspect and second aspect by processor Method flow.
As can be seen from the above technical solutions, the embodiment of the present application has the following advantages:
In the present embodiment, during loading application programs mirror image, the key pair application journey of symmetric encipherment algorithm is used Sequence mirror image is decrypted, and promotes the confidentiality of application program mirror image, carries out signature verification to the application program mirror image after decryption, carries The high safety of the application program mirror image in start-up course, therefore, in the present embodiment to encrypted application program mirror image into Row decryption and verification improve the reliability of the application program mirror image of startup and cause the corresponding application of application program mirror image Normal program operation.
Description of the drawings
Fig. 1 is that embedded device starts block schematic illustration in the embodiment of the present application;
Fig. 2 is one embodiment schematic diagram of the method that embedded device starts in the embodiment of the present application;
Fig. 3 is one embodiment schematic diagram of the method for application program mirror image processing in the embodiment of the present application;
Fig. 4 is another embodiment schematic diagram of the method that embedded device starts in the embodiment of the present application;
Fig. 5 is another embodiment schematic diagram of the method for application program mirror image processing in the embodiment of the present application;
Fig. 6 is one embodiment schematic diagram of embedded device starter in the embodiment of the present application;
Fig. 7 is one embodiment schematic diagram of application program mirror image processing device in the embodiment of the present application;
Fig. 8 is another embodiment schematic diagram of embedded device starter in the embodiment of the present application;
Fig. 9 is another embodiment schematic diagram of application program mirror image processing device in the embodiment of the present application.
Specific embodiment
The embodiment of the present application discloses a kind of method that embedded device the starts, method of application program mirror image processing, embedding Enter formula equipment starter and application program mirror image processing device, for starting in embedded device during to applying journey Sequence mirror image is decrypted and verifies, and improves the safety during application program image starting.
The embodiment of the present application can start frame diagram in embedded device as shown in Figure 1, which starts frame Mainly include BOOTROM operation phase, BOOT operation phase, application program operation phase in figure.
The BOOTROM operation phase are mainly integrated in cured one section of code in chip, according to different embedded chips The crucial of chip is carried out to start code and create most basic hardware environment, and jump to the fortune of the BOOT codes in memory Row.
The BOOT operation phase mainly initialize soft hardware equipment, and loading system application program mirror image jumps to corresponding Application program.
The application program operation phase is mainly the application program for running embedded device, which can be for use Family is customized the primary application program of exploitation or application program is iterated the upgrade applications of upgrading.
In the embodiment of the present application, during embedded device starts, embeded processor (central is related generally to Processing unit, CPU), nonvolatile memory, these three devices of memory, it should be noted that memory can be Sdram memory or DDR memories, do not limit herein.
Embeded processor is mainly to provide hardware enciphering and deciphering and verifies relevant hardware resource.
Nonvolatile memory, which mainly stores program code and power down, needs data to be saved.
Sdram memory or DDR memories are mainly the storage for running related program code and interim operation data.
Embedded device based on above-mentioned Fig. 1 starts the BOOT operation phase of frame diagram, please refers to Fig.2, and the application is implemented Method one embodiment that embedded device starts in example includes:
201st, BOOT program images are run.
In the embedded device BOOTROM operation phase, the BOOT of the CPU reading non-volatile storages of embedded device On program image to DDR memories, then start BOOT program images, and a pair software and hardware corresponding with embedded device carries out initially Change is handled.
It should be noted that in this implementation, memory can also be sdram memory or other kinds of memory, herein not It limits, the present embodiment and subsequent embodiment are only illustrated as an example with DDR memories.
202nd, the key of symmetric encipherment algorithm is read.
After BOOT program images are run, CPU loading application programs mirror images, since the application program mirror image is by adding Close program is needed to being decrypted using program image, and therefore, CPU reads symmetric cryptography calculation from nonvolatile memory On the key of method to DDR memories, in addition, CPU can also read the key of symmetric encipherment algorithm to DDR from BOOT program images On memory, it should be noted that it is identical that application program image, which is encrypted with the key decrypted, using symmetric encipherment algorithm , i.e., encryption key is identical with decruption key in a symmetric encryption algorithm.
203rd, it is decrypted using the key pair application program mirror image of symmetric encipherment algorithm.
After CPU reads the key of symmetric encipherment algorithm, CPU uses the key pair application program mirror image of symmetric encipherment algorithm It is decrypted, obtains the application program mirror image of plaintext.Specifically, CPU uses symmetrically add with encrypted to the application program mirror image The application program mirror image of ciphertext is decrypted in the algorithm for inversion of close algorithm, and the application program mirror image is made to become the application program of plaintext Mirror image.
204th, the application program mirror image after decryption is verified;If verifying successfully, step 205 is performed, if verification is lost It loses, then performs step 206.
In order to enable the safe source for the application program mirror image that CPU is read is reliable, CPU carries out school to the application program mirror image It tests, specifically, CPU can verify the application program mirror image using RSA Algorithm, it should be noted that in the present embodiment Hash check method can also be used, and either HMAC methods of calibration verify the application program mirror image or other verification sides Method is not limited herein being verified to the greatest extent using program image.
In the present embodiment, it should be noted that step 203 and step 204 can be first carried out without specifically performing sequence Step 203 performs step 204 again, can also first carry out step 204 and perform step 203 again, not limit herein.
205th, start application program.
If CPU, which examines the application program mirror image after decryption, successfully, illustrates that the safe source of the application program mirror image can It leans on, then CPU can perform corresponding code and start the corresponding application program of application program mirror image so that the application program is just Normal operation function.
206th, other.
If CPU to after decryption application program mirror image examine failure, illustrate the application program mirror image source it is insincere or The program code of person's application program mirror image is distorted by Chu, then CPU does not start the corresponding application program of the application program, is performed Others operation, for example, reruning the corresponding embedded device of application program mirror image or being risen to application program image setting Grade label etc..
In the present embodiment, during CPU loading application programs mirror images, the key pair application journey of symmetric encipherment algorithm is used Sequence mirror image is decrypted, and CPU verifies the application program mirror image after decryption, verifies and successfully illustrates the application program mirror image Source is credible, therefore, in the present embodiment only encrypted application program mirror image is decrypted and verified could perform it is next Step operation, improves the security performance of the application program mirror image of CPU loadings, and causes the application program mirror image is corresponding to apply journey Sequence normal operation.
The method started above to the embedded device in the embodiment of the present application is described, and the application is implemented below The method of application program mirror image processing is described in example, please refers to Fig.3, application program mirror image processing in the embodiment of the present application One embodiment of method includes:
301st, key resource is generated.
Before loading application programs mirror image, the generation of application program mirror image processing device using program image to being encrypted And the key resource of decryption, the key resource include the key of symmetric encipherment algorithm, which is used for applying program image It is encrypted and decrypts, it should be noted that be identical key to being encrypted using program image with the key decrypted.
302nd, it is encrypted using the key pair application program mirror image of symmetric encipherment algorithm.
Application program mirror image processing device generation key resource after, using symmetric encipherment algorithm to application program image into Row encryption, specifically, is encrypted so that the application program mirror image using the key pair application program mirror image of symmetric encipherment algorithm It is stored in memory in the form of ciphertext, improves the confidentiality of the application program mirrored content.
303rd, by the key of symmetric encipherment algorithm and encrypted application program mirror image programming to nonvolatile memory In.
After to being encrypted using program image, application program mirror image processing device is by fever writes by symmetric cryptography In the key of algorithm and encrypted application program mirror image programming to nonvolatile memory, specifically, application program mirror image After the key of symmetric encipherment algorithm and encrypted application program mirror image are converted into its corresponding form by processing unit, By the key of the symmetric encipherment algorithm after format transformation and encrypted application program mirror image programming to nonvolatile memory In.
It should be noted that in the present embodiment, the key storage BOOT program images of symmetric encipherment algorithm can also be worked as In, then by the BOOT program image programmings to nonvolatile memory for storing key, reading symmetric cryptography calculation in this way During the key of method, the key of symmetric encipherment algorithm can be read in BOOT program images.
It should be noted that being only illustrated in this implementation with the encryption of application program mirror image, the present embodiment may be used also Upgrade procedure mirror image to be encrypted or other image programs are encrypted, it is not specifically limited herein.
In the present embodiment, by generating key resource, being answered using the key pair of the symmetric encipherment algorithm in key resource It is encrypted with program image, by the key of symmetric encipherment algorithm and encrypted application program mirror image programming to non-volatile In memory, the application program mirror image is encrypted in the present embodiment so that encrypted application program mirror image is non-volatile Property memory or other processing procedure in ensure that the confidentiality of application program mirrored content, improve the application program mirror The integrality of picture and safety.
Nonvolatile memory can be FLASH memory, or other kinds of memory, such as magnetic random Memory (magnetic random access memory, MRAM), in the present embodiment and subsequent embodiment, only with FLASH Memory is illustrated as the example of nonvolatile memory, in practice, can with when other kinds of business, it is specific this Place does not limit.
Above the method for the application program mirror image processing in the embodiment of the present application is described, below in practice The method that example starts embedded device in the embodiment of the present application is described, and please refers to Fig.4, embedded in the embodiment of the present application Another embodiment for the method that formula equipment starts includes:
401st, BOOT program images are run.
402nd, the key of symmetric encipherment algorithm is read.
In the present embodiment, step 401 to step 402 is similar to step 202 with the step 201 in earlier figures 2, herein no longer It repeats.
403rd, the upgrading mark of data partition is read.
CPU reads upgrading mark, the upgrading mark mark in a subregion of FLASH memory for upgrading mark is stored Know whether the application program mirror image needs to upgrade.
404th, judge whether application program mirror image is upgraded according to upgrading mark;If it is not, step 405 is then performed, If so, perform step 409.
After CPU has read the upgrading mark of application program mirror image, CPU judges the application program mirror according to the upgrading mark Seem it is no need to upgrade, specifically, whether CPU can judge the application program mirror image according to the mark of the carrying of the upgrading mark It needs to upgrade, does not need to upgrade if the application program mirror image is the application program mirror image of latest edition, otherwise, journey is applied to this Sequence mirror image is upgraded.
405th, it is decrypted using the key pair application program mirror image of symmetric encipherment algorithm.
If CPU judges that the application program mirror image does not need to be upgraded, CPU uses the key pair of symmetric encipherment algorithm Application program mirror image is decrypted, and obtains the application program mirror image of plaintext.Specifically, CPU uses with to the application program mirror image The application program mirror image of ciphertext is decrypted in the algorithm for inversion for encrypting identical symmetric encipherment algorithm, becomes the application program mirror image The application program mirror image of plaintext.
406th, the application program mirror image after decryption is verified, step 407 is performed if verifying successfully, if verification is lost It loses, then performs step 408.
For CPU in checking procedure is carried out to the application program mirror image after decryption, CPU reads RSA Algorithm from FLASH memory Public key, it should be noted that CPU can also read the public key of RSA Algorithm from BOOT program images, not limit herein, The private key of RSA Algorithm used during due to signing using program image, only the private key of the RSA Algorithm corresponds to Public key could to application program image decrypt.Read RSA Algorithm public key after, using the public key of RSA Algorithm to decryption after Application program mirror image carry out signature verification.Specifically, HASH calculating is carried out to application program image, obtains a number of targets According to, then using public key for signature be decrypted, the data after decryption are compared with target data, if decrypt after number According to consistent with target data, then success is verified, if the data after decryption and target data are inconsistent, otherwise verification fails.
It should be noted that in the present embodiment, after hash check method or HMAC methods of calibration also can be used to decryption Application program mirror image verified or other methods of calibration, do not limit herein.
407th, start application program.
Data after decryption are consistent with target data, then the application program mirror image after decryption are verified successfully, CPU is to school It tests successful application program mirror image and performs enabled instruction, start the corresponding application program of application program mirror image so that using journey Sequence is normally run.
408th, to application program image setting upgrading mark.
If the data and target data after decryption are inconsistent, failure is verified to the application program mirror image after decryption, then CPU Upgrading mark is set to the application program mirror image, which, which identifies the application program mirror image, needs to upgrade, and then reruns The BOOT program images, and perform corresponding upgrading flow.
409th, it is decrypted using the key pair upgrade applications mirror image of symmetric encipherment algorithm.
If CPU judges application program, mirror image is upgraded, which is upgraded, is then made It is decrypted with the key pair upgrade procedure mirror image of symmetric encipherment algorithm, obtains the upgrade procedure mirror image of plaintext.Specifically, CPU The upgrade procedure mirror image of ciphertext is carried out using the algorithm for inversion with the symmetric encipherment algorithm identical to the upgrade procedure mirror image encryption Decryption makes the upgrade procedure mirror image become the upgrade procedure mirror image of plaintext.
410th, the upgrade procedure mirror image after decryption is verified, step 411 is performed if verifying successfully, if verification is lost It loses, then performs step 412.
For CPU in checking procedure is carried out to the upgrade procedure mirror image after decryption, CPU reads RSA Algorithm from FLASH memory Public key, it should be noted that CPU can also read the public key of RSA Algorithm from BOOT program images, not limit herein. The public key is the corresponding public key of private key for upgrade procedure mirror image signature, due to carrying out what signature used to upgrade procedure mirror image It is the private key of RSA Algorithm, therefore, the corresponding public key of cipher key pair private key of the only RSA Algorithm could be decrypted.RSA is read to calculate After the public key of method, signature verification is carried out to the upgrade procedure mirror image after decryption using the public key of RSA Algorithm, specifically, to rising Grade program image carries out HASH calculating, obtains a target data, then signature is decrypted using public key, after decryption Data compared with target data, if decryption after data it is consistent with target data, verify success, if decrypt after number According to, otherwise verification failure inconsistent with target data.
It should be noted that in the present embodiment, after hash check method or HMAC methods of calibration also can be used to decryption Upgrade procedure mirror image verified or other methods of calibration, do not limit herein.
411st, start upgrade procedure.
Data after decryption are consistent with target data, then the upgrade procedure mirror image after decryption are verified successfully, CPU is to school It tests successful upgrade procedure mirror image and performs enabled instruction, start the corresponding upgrade procedure of upgrade procedure mirror image so that upgrading journey Sequence is normally run.
412nd, restart BOOT program images.
If to after decryption application program mirror image verify failure, illustrate to signature decrypt after data and target data into Row is inconsistent, and therefore, CPU performs instruction of restarting, the corresponding embedded device of re-launching applications mirror image.
In the present embodiment, before the application program mirror image of the CPU loadings of embedded device, CPU pairs of application program mirror image It is decrypted and verifies, since decryption needs the corresponding decruption key of encryption key, only correct key could be right Application program mirror image is decrypted so that application program mirror image, can not when lacking decruption key or decruption key mistake Start the corresponding application program of application program mirror image, application program image is carried out in checking procedure, CPU reads RSA Algorithm Public key carry out signature verification, the corresponding application program of application program mirror image could successfully be run by only verify, therefore, our In case, CPU pairs of application program mirror image is decrypted and verifies the secrecy of reliability and content for improving application program mirror image Property.
The example of the method for the embedded device startup in the embodiment of the present application in practice is described above, under Method example in practice in face of application program mirror image processing is described, and please refers to Fig. 5, is applied in the embodiment of the present application Another embodiment of the method for program image processing includes:
501st, key resource is generated.
Before loading application programs mirror image, the generation of application program mirror image processing device using program image to being encrypted And the key resource of decryption, the key resource include the key of symmetric encipherment algorithm and the private key and public key of RSA Algorithm, it should Key is used for being encrypted and decrypted using program image, and the private key of the RSA Algorithm signs to application program, the RSA The public key of algorithm carries out signature verification to application program, it should be noted that being encrypted and decryption using program image Key is identical key, and the private key and public key of RSA Algorithm are different keys.
502nd, using the private key of RSA Algorithm to signing using program image.
After key resource is generated, application program mirror image processing device is using the private key of RSA Algorithm to application program mirror As signing, specifically, HASH calculating is carried out to application program image, obtains HASH values, application program mirror image processing device HASH values are encrypted using private key and are signed.
503rd, it is encrypted using the key pair application program mirror image of symmetric encipherment algorithm.
After application program mirror image processing device using program image to signing, using symmetric encipherment algorithm to application Program image is encrypted, and specifically, is encrypted using the key pair application program mirror image of symmetric encipherment algorithm so that should answer It is stored in memory in the form of ciphertext with program image, increases the confidentiality of the application program mirror image.
504th, by the public key of RSA Algorithm, the key of symmetric encipherment algorithm and signature and encrypted application program mirror image In programming to nonvolatile memory.
After to being signed and being encrypted using program image, application program mirror image processing device will by fever writes The public key of RSA Algorithm, the key of symmetric encipherment algorithm, encrypted application program mirror image and signature programming are deposited to non-volatile In reservoir, specifically, application program mirror image processing device is by the public key of RSA Algorithm, the key, encrypted of symmetric encipherment algorithm Application program mirror image and signature are converted into its corresponding form and then by the public keys of the RSA Algorithm after format transformation, symmetrical In the key of Encryption Algorithm, encrypted application program mirror image and signature programming to nonvolatile memory.
It should be noted that in the present embodiment, it can also be by the public key of RSA Algorithm, the key storage of symmetric encipherment algorithm In BOOT program images, the BOOT program mirrors of the key of the public key and symmetric encipherment algorithm of RSA Algorithm then will be stored It, can in this way when reading the key of symmetric encipherment algorithm or reading RSA Algorithm key in picture programming to nonvolatile memory To read the key of symmetric encipherment algorithm or RSA Algorithm key in BOOT program images.
It should be noted that the encryption and signature in this implementation only with application program mirror image are illustrated, this implementation Example can also upgrade procedure mirror image is encrypted and be signed or other image programs are encrypted and sign, and does not do herein It is specific to limit.
In the present embodiment, by generation encryption key resource and signature key resource, using signature key resource Private key using program image to signing, then using the key pair application program mirror of the symmetric encipherment algorithm in key resource As being encrypted, the public key of RSA Algorithm, the key of symmetric encipherment algorithm, encrypted application program mirror image and signature are burnt It writes in nonvolatile memory, the application program mirror image is encrypted and signed in the technical program, it is ensured that is embedded to set The safe source of the application program mirror image of standby loading.
The method of the application program mirror image processing in the embodiment of the present application is described above, below to the application reality The embedded device starter applied in example is described:
Please refer to Fig. 6, one embodiment of embedded device starter includes in the embodiment of the present application:
Running unit 601, for running BOOT program images;
First reading unit 602, for reading the key of symmetric encipherment algorithm, key is encrypted for application program mirror image The corresponding decruption key of key;
Decryption unit 603, for being decrypted using the key pair application program mirror image of symmetric encipherment algorithm;
Verification unit 604, for being verified to the application program mirror image after decryption;
Start unit 605, for when being verified successfully to the application program mirror image after decryption, starting application program mirror image pair The application program answered.
In the present embodiment, verification unit 604 is specifically used for:
The public key of RSA Algorithm is read, and the application program mirror image after decryption is verified using the public key of RSA Algorithm;
Alternatively,
The application program mirror image after decryption is verified using hash check method or HMAC methods of calibration.
In the present embodiment, embedded device starter further includes:
Second reading unit 606, for reading the upgrading mark of data partition, data partition is nonvolatile memory Data partition;
Judging unit 607, for judging whether application program mirror image is upgraded according to upgrading mark;
Upgrade unit 608, for when application program mirror image is upgraded, upgrading to application program image;
Accordingly, decryption unit 603 is used to be decrypted using the key pair upgrade procedure mirror image of symmetric encipherment algorithm;
Verification unit 604 is used to verify the upgrade procedure mirror image after decryption;
Start unit 605 is used for when being verified successfully to the upgrade procedure mirror image after decryption, starts the upgrade procedure mirror image Corresponding upgrade procedure;
Restart unit 609, for verifying failure to the upgrade procedure mirror image after decryption, then restart upgrade procedure mirror pair The embedded device answered.
In the present embodiment, embedded device starter further includes:
Setting unit 610, for when verifying failure to the application program mirror image after decryption, being set to application program image Upgrading indicates and restarts application program mirror image.
In the present embodiment, before the application program mirror image that start unit 605 loads, decryption unit 603 is to application program mirror As being decrypted, verification unit 604 using program image to verifying, since decryption needs the corresponding decryption of encryption key Key, therefore only correct decruption key could ensure that application program mirrored content to being decrypted using program image Confidentiality, to application program image carry out checking procedure in, the first reading unit 602 read RSA Algorithm public key carry out school It tests, the corresponding application program of application program mirror image could successfully be started by only verifying, therefore, in the present solution, running unit 601 Application program mirror image after starting decryption and verifying, improves the reliability of application program mirror image and the confidentiality of content.
The embedded device starter in the embodiment of the present application is described above, below to the embodiment of the present application In application program mirror image processing device be described:
Please refer to Fig. 7, one embodiment of application program mirroring apparatus includes in the embodiment of the present application:
Generation unit 701, for generating key resource, key resource includes the key of symmetric encipherment algorithm, and key is used for To being encrypted and decrypting using program image;
Encryption unit 702, for being encrypted using the key pair application program mirror image of symmetric encipherment algorithm;
Programming unit 703, for by the key of symmetric encipherment algorithm and encrypted application program mirror image programming to non- In volatile memory.
In the present embodiment, application program mirror image processing device further includes:
Signature unit 704, for being signed using the private key of RSA Algorithm to application program image;
Accordingly, 703 programming unit of programming unit be used for by the key of symmetric encipherment algorithm and it is encrypted apply journey Sequence mirror image programming includes to nonvolatile memory:
Programming unit 703 is used for the public key of RSA Algorithm, the key of symmetric encipherment algorithm, encrypted application program mirror In picture and signature programming to nonvolatile memory, the public key of RSA Algorithm is used to carry out the application program mirror image after signature Verification.
In the present embodiment, encryption key resource and signature key resource, signature unit are generated by generation unit 701 704 sign to application program image using private key, and then encryption unit 702 uses the symmetric encipherment algorithm in key resource Encryption key to being encrypted using program image, programming unit 703 by the public key of RSA Algorithm, symmetric encipherment algorithm it is close In key, encrypted application program mirror image and signature programming to nonvolatile memory, journey is applied to this in the technical program Sequence mirror image is encrypted and signs, and improves the safety of the application program mirror image and the confidentiality of content.
Please refer to Fig. 8, another embodiment of embedded device starter includes in the embodiment of the present application:
Fig. 8 is a kind of embedded device starter structure diagram provided in an embodiment of the present invention, the embedded device Starter 800 can generate bigger difference due to configuration or different performance, can include one or more centres Device (central processing units, CPU) 801 (for example, one or more processors) and memory 805 is managed, One or more program or data are stored in the memory 805.
Wherein, memory 805 can be volatile storage or persistent storage.Being stored in the program of memory 805 can wrap One or more modules are included, each module can include operating the series of instructions in embedded device starter. Further, central processing unit 801 could be provided as communicating with memory 805, be held in embedded device starter 800 Series of instructions operation in line storage 805.
Embedded device starter 800 can also include one or more power supplys 802, one or more have Line or radio network interface 803, one or more input/output interfaces 804 and/or, one or more operation system System, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
It can be shown in Fig. 8 embedded based on this as the step performed by embedded device starter in above-described embodiment Equipment starter structure.
Embedded device starter in the present embodiment, flow and earlier figures 2 and figure performed by central processing unit 701 The method flow described in embodiment shown in 4 is similar, and details are not described herein again.
Please refer to Fig. 9, another embodiment of application program mirror image processing device includes in the embodiment of the present application:
Fig. 9 is a kind of application program mirror image processing apparatus structure schematic diagram provided in an embodiment of the present invention, the application program Mirror image processing device 900 can generate bigger difference due to configuration or different performance, can include in one or more Central processor (central processing units, CPU) 901 (for example, one or more processors) and memory 905, one or more program or data are stored in the memory 905.
Wherein, memory 905 can be volatile storage or persistent storage.Being stored in the program of memory 905 can wrap One or more modules are included, each module can include grasping the series of instructions in application program image processing unit Make.Further, central processing unit 901 could be provided as communicating with memory 905, in application program mirror image processing device The series of instructions operation in memory 905 is performed on 900.
Application program mirror image processing device 900 can also include one or more power supplys 902, one or more Wired or wireless network interface 903, one or more input/output interfaces 904 and/or, one or more operation System, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The application shown in Fig. 9 can be based on as the step performed by application program mirror image processing device in above-described embodiment Program image processing unit structure.
Application program mirror image processing device in the present embodiment, flow performed by central processing unit 901 and earlier figures 3 and Method flow described in embodiment shown in fig. 5 is similar, and details are not described herein again.
The embodiment of the present application also provides a kind of computer storage media, and the computer storage media is aforementioned embedding for saving as Enter the computer software instructions used in formula equipment starter, including being designed by embedded device starter for performing Program.
The embodiment of the present application also provides a kind of computer storage media, which is used to save as aforementioned answer It is application program mirror image processing device institute including being used to perform with the computer software instructions used in program image processing unit The program of design.
The embodiment of the present application also provides a kind of computer program product, which refers to including computer software It enables, which can be loaded to realize the method stream in the embodiment shown in earlier figures 2 to 5 by processor Journey.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit can refer to the corresponding process in preceding method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of division of logic function can have other dividing mode, such as multiple units or component in actual implementation It may be combined or can be integrated into another system or some features can be ignored or does not redirect.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also That each unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses When, it can be stored in a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products It embodies, which is stored in a storage medium, is used including some instructions so that a computer Equipment (can be personal computer, server or the network equipment etc.) redirects the complete of each embodiment the method for the application Portion or part steps.And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, above example are only to illustrate the technical solution of the application, rather than its limitations;Although with reference to before Embodiment is stated the application is described in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding The technical solution recorded in each embodiment is stated to modify or carry out equivalent replacement to which part technical characteristic;And these Modification is replaced, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of method that embedded device starts, which is characterized in that including:
Run BOOT program images;
The key of symmetric encipherment algorithm is read, the key is for the corresponding decruption key of the encrypted key of application program mirror image;
It is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
The application program mirror image after decryption is verified;
If being verified successfully to the application program mirror image after decryption, it is corresponding using journey to start the application program mirror image Sequence.
2. according to the method described in claim 1, it is characterized in that, the application program mirror image after described pair of decryption carries out school Test including:
The public key of RSA Algorithm is read, and school is carried out to the application program mirror image after decryption using the public key of the RSA Algorithm It tests;
Alternatively,
The application program mirror image after decryption is verified using hash check method or HMAC methods of calibration.
3. method according to claim 1 or 2, which is characterized in that the key pair using the symmetric encipherment algorithm Before the application program mirror image is decrypted, the method further includes:
The upgrading mark of data partition is read, the data partition is the data partition of the nonvolatile memory;
Judge whether the application program mirror image is upgraded according to the upgrading mark;
If the application program mirror image is upgraded, the application program mirror image is upgraded;
Accordingly, it is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm, to the institute after decryption It states application program mirror image and verify and include:
It is decrypted using the key pair upgrade procedure mirror image of the symmetric encipherment algorithm;
The upgrade procedure mirror image after decryption is verified;
If being verified successfully to the upgrade procedure mirror image after decryption, the corresponding upgrading journey of the upgrade procedure mirror image is run Sequence;
If verifying failure to the upgrade procedure mirror image after decryption, it is corresponding embedded to restart the upgrade procedure mirror Equipment.
4. according to the method described in claim 3, it is characterized in that, the application program mirror image after described pair of decryption carries out school After testing, the method further includes:
If verifying failure to the application program mirror image after decryption, upgrading mark is set to lay equal stress on to the application program mirror image Newly run the corresponding embedded device of the application program mirror image.
A kind of 5. method of application program mirror image processing, which is characterized in that including:
Key resource is generated, the key resource includes the key of symmetric encipherment algorithm, and the key is used for application program mirror As being encrypted and decrypting;
It is encrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
By the key of the symmetric encipherment algorithm and the encrypted application program mirror image programming to nonvolatile memory In.
6. according to the method described in right 5, which is characterized in that applied described in the key pair using the symmetric encipherment algorithm Before program image is encrypted, the method further includes:
It is signed using the private key of RSA Algorithm to the application program mirror image;
Accordingly, by the key of the symmetric encipherment algorithm and the encrypted application program mirror image programming to non-volatile Memory includes:
By the public key of the RSA Algorithm, the key of the symmetric encipherment algorithm, the encrypted application program mirror image and label In name programming to nonvolatile memory, the public key of the RSA Algorithm is used to carry out the application program mirror image after signature Verification.
7. a kind of embedded device starter, which is characterized in that including:
Running unit, for running BOOT program images;
First reading unit, for reading the key of symmetric encipherment algorithm, the key is encrypted close for application program mirror image The corresponding decruption key of key;
Decryption unit, for being decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
Verification unit, for being verified to the application program mirror image after decryption;
Start unit, for when being verified successfully to the application program mirror image after decryption, starting the application program mirror image Corresponding application program.
8. a kind of application program mirror image processing device, which is characterized in that including:
Generation unit, for generating key resource, the key resource includes the key of symmetric encipherment algorithm, and the key is used for To being encrypted and decrypting using program image;
Encryption unit, for being encrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
Programming unit, for by the key of the symmetric encipherment algorithm and the encrypted application program mirror image programming to non- In volatile memory.
9. a kind of embedded device processing unit, which is characterized in that including:Memory, transceiver and at least one processor, institute It states and instruction is stored in memory;The memory, the transceiver and at least one processor are interconnected by circuit;
At least one processor calls described instruction, redirects in Claims 1-4 any one of them method described embedding Enter the Message Processing of formula equipment starter side progress or control operation;
Alternatively,
At least one processor calls described instruction, redirects in claim 5 to 6 any one of them method and is answered described The Message Processing carried out with program image processing unit side or control operation.
10. a kind of computer readable storage medium, which is characterized in that including instructing, when described instruction is run on computers, So that computer redirects method according to any one of claims 1 to 6.
CN201711406066.0A 2017-12-22 2017-12-22 Method, the method and device of application program mirror image processing of embedded device startup Pending CN108154025A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711406066.0A CN108154025A (en) 2017-12-22 2017-12-22 Method, the method and device of application program mirror image processing of embedded device startup

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711406066.0A CN108154025A (en) 2017-12-22 2017-12-22 Method, the method and device of application program mirror image processing of embedded device startup

Publications (1)

Publication Number Publication Date
CN108154025A true CN108154025A (en) 2018-06-12

Family

ID=62464332

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711406066.0A Pending CN108154025A (en) 2017-12-22 2017-12-22 Method, the method and device of application program mirror image processing of embedded device startup

Country Status (1)

Country Link
CN (1) CN108154025A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109308195A (en) * 2018-08-22 2019-02-05 青岛海信电器股份有限公司 Starting method, embedded device and the computer storage medium of embedded device
CN109683985A (en) * 2018-12-19 2019-04-26 中国电子科技集团公司第五十四研究所 A kind of more image starting methods of DSP based on AIS order
CN110555309A (en) * 2019-09-10 2019-12-10 深圳市英博超算科技有限公司 Starting method, starting device, terminal and computer readable storage medium
WO2020037612A1 (en) * 2018-08-23 2020-02-27 深圳市汇顶科技股份有限公司 Embedded program secure boot method, apparatus and device, and storage medium
CN110990084A (en) * 2019-12-20 2020-04-10 紫光展讯通信(惠州)有限公司 Chip secure starting method and device, storage medium and terminal
CN111158771A (en) * 2019-12-30 2020-05-15 联想(北京)有限公司 Processing method and device and computer equipment
CN111177752A (en) * 2019-12-20 2020-05-19 全球能源互联网研究院有限公司 Credible file storage method, device and equipment based on static measurement
CN111177705A (en) * 2019-12-20 2020-05-19 全球能源互联网研究院有限公司 Credible guarantee method, device and equipment for execution component of embedded operating system
CN111309512A (en) * 2020-01-16 2020-06-19 广东九联科技股份有限公司 Equipment, high-security encryption method thereof and storage medium
CN113056726A (en) * 2020-06-30 2021-06-29 深圳市大疆创新科技有限公司 Method for starting and activating camera, camera and holder

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231115A (en) * 2011-06-07 2011-11-02 深圳市九洲电器有限公司 Method and system for safely starting set top box
CN102693139A (en) * 2011-03-25 2012-09-26 比亚迪股份有限公司 Method and system for wirelessly upgrading mobile phone software
CN103873440A (en) * 2012-12-11 2014-06-18 北京旋极信息技术股份有限公司 Application program upgrading method and system
CN103888835A (en) * 2014-04-17 2014-06-25 江苏银河电子股份有限公司 Safety certification method of intelligent set top box
CN104156659A (en) * 2014-08-14 2014-11-19 电子科技大学 Embedded system secure start method
US20170293484A1 (en) * 2016-04-11 2017-10-12 Endress+Hauser Conducta Gmbh+Co. Kg Method for updating a firmware component and device of measurement and control technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693139A (en) * 2011-03-25 2012-09-26 比亚迪股份有限公司 Method and system for wirelessly upgrading mobile phone software
CN102231115A (en) * 2011-06-07 2011-11-02 深圳市九洲电器有限公司 Method and system for safely starting set top box
CN103873440A (en) * 2012-12-11 2014-06-18 北京旋极信息技术股份有限公司 Application program upgrading method and system
CN103888835A (en) * 2014-04-17 2014-06-25 江苏银河电子股份有限公司 Safety certification method of intelligent set top box
CN104156659A (en) * 2014-08-14 2014-11-19 电子科技大学 Embedded system secure start method
US20170293484A1 (en) * 2016-04-11 2017-10-12 Endress+Hauser Conducta Gmbh+Co. Kg Method for updating a firmware component and device of measurement and control technology

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109308195A (en) * 2018-08-22 2019-02-05 青岛海信电器股份有限公司 Starting method, embedded device and the computer storage medium of embedded device
WO2020037612A1 (en) * 2018-08-23 2020-02-27 深圳市汇顶科技股份有限公司 Embedded program secure boot method, apparatus and device, and storage medium
US11562075B2 (en) 2018-08-23 2023-01-24 Shenzhen GOODIX Technology Co., Ltd. Secure booting method, apparatus, device for embedded program, and storage medium
CN109683985A (en) * 2018-12-19 2019-04-26 中国电子科技集团公司第五十四研究所 A kind of more image starting methods of DSP based on AIS order
CN110555309A (en) * 2019-09-10 2019-12-10 深圳市英博超算科技有限公司 Starting method, starting device, terminal and computer readable storage medium
CN110990084A (en) * 2019-12-20 2020-04-10 紫光展讯通信(惠州)有限公司 Chip secure starting method and device, storage medium and terminal
CN111177752A (en) * 2019-12-20 2020-05-19 全球能源互联网研究院有限公司 Credible file storage method, device and equipment based on static measurement
CN111177705A (en) * 2019-12-20 2020-05-19 全球能源互联网研究院有限公司 Credible guarantee method, device and equipment for execution component of embedded operating system
CN111158771A (en) * 2019-12-30 2020-05-15 联想(北京)有限公司 Processing method and device and computer equipment
CN111309512A (en) * 2020-01-16 2020-06-19 广东九联科技股份有限公司 Equipment, high-security encryption method thereof and storage medium
CN111309512B (en) * 2020-01-16 2024-01-02 广东九联科技股份有限公司 Internet of things equipment, high-security encryption method thereof and storage medium
CN113056726A (en) * 2020-06-30 2021-06-29 深圳市大疆创新科技有限公司 Method for starting and activating camera, camera and holder

Similar Documents

Publication Publication Date Title
CN108154025A (en) Method, the method and device of application program mirror image processing of embedded device startup
CN109313690B (en) Self-contained encrypted boot policy verification
US10474823B2 (en) Controlled secure code authentication
ES2917183T3 (en) Mobile device that has a secure execution environment
CN101951316B (en) Protected network boot of operating system
CN102208000B (en) Method and system for providing security mechanisms for virtual machine images
US8250373B2 (en) Authenticating and verifying an authenticable and verifiable module
RU2542930C2 (en) Booting and configuring subsystem securely from non-local storage
ES2692900T3 (en) Cryptographic certification of secure hosted execution environments
TW202009778A (en) Firmware upgrade method and device
US8560823B1 (en) Trusted modular firmware update using digital certificate
KR101795457B1 (en) Method of initializing device and method of updating firmware of device having enhanced security function
CN110688660B (en) Method and device for safely starting terminal and storage medium
CN104156659A (en) Embedded system secure start method
CN111264044A (en) Chip, method for generating private key and method for trustable certification
CN101983375A (en) Binding a cryptographic module to a platform
KR102013983B1 (en) Method and server for authenticating an application integrity
EP2547135A2 (en) Apparatus and method for preventing copying of terminal unique information in portable terminal
CN109814934B (en) Data processing method, device, readable medium and system
US20230351056A1 (en) Sram physically unclonable function (puf) memory for generating keys based on device owner
CN105893837A (en) Application program installation method, security encryption chip and terminal
CN116070217A (en) Safe starting system and method for chip module
CN114296873A (en) Virtual machine image protection method, related device, chip and electronic equipment
CN113360857A (en) Code starting method and system for software
CN111400771A (en) Target partition checking method and device, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180612

RJ01 Rejection of invention patent application after publication