CN110457171A - A kind of embedded apparatus debugging method and system - Google Patents
A kind of embedded apparatus debugging method and system Download PDFInfo
- Publication number
- CN110457171A CN110457171A CN201910731779.7A CN201910731779A CN110457171A CN 110457171 A CN110457171 A CN 110457171A CN 201910731779 A CN201910731779 A CN 201910731779A CN 110457171 A CN110457171 A CN 110457171A
- Authority
- CN
- China
- Prior art keywords
- file
- debug command
- debugging
- signature
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000005540 biological transmission Effects 0.000 claims abstract description 7
- 230000015654 memory Effects 0.000 claims description 18
- 238000004590 computer program Methods 0.000 claims description 17
- 235000013399 edible fruits Nutrition 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 abstract description 11
- 238000010586 diagram Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000004308 accommodation Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2205—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing using arrangements specific to the hardware being tested
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2273—Test methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of embedded apparatus debugging method and systems, wherein this method comprises: receiving the debug command file FCS with signature of remote debugging equipment or local commissioning device transmission;The debug command file FCS of band signature is parsed to obtain the debug command in debug command file FC, and generates the implementing result file for executing the debug command;It is encrypted the implementing result file to obtain debugging result file;The debugging result file is sent to debugging end, can solve the problem of embedded device debugging is unable to satisfy demand for security in the related technology, debugging safety is ensure that, reduces operation difficulty.
Description
Technical field
The present invention relates to system debug fields, in particular to a kind of embedded apparatus debugging method and system.
Background technique
With the fast development of information technology, embedded device has been widely used the every aspect of production, life.Embedding
While entering formula equipment fast development, user is using inevitably there is various problem, including human factor in device procedures
Or equipment self reason etc..How accurately and effectively to solve the problems, such as to become embedded device factory in the case where ensuring information security
The major issue that quotient faces.
Embedded device debugging in the related technology, usually equipment is actively connected to debugging server or equipment end is opened
It is debugged for client connection debugging port.Fig. 1 is the flow chart of the embedded apparatus debugging method of basis in the related technology,
As shown in Figure 1, comprising:
S101 establishes the two-way communication link between server based on WebSocket agreement;
S102 receives and executes the debugging instruction that the server is sent;
S103 will execute the implementing result that the debugging instruction obtains and be sent to the server, wherein is described to execute knot
Fruit is used to indicate subsequent debugging operations.
Above-mentioned adjustment method is unable to satisfy the demand of existing secure context, deposits although can solve the demand debugged in real time
The individual subscriber sensitive information leakage risk caused by equipment itself key message and network attack, it is convenient same providing debugging
When, also give attacker's opportunity.Meanwhile the equipment for not being deployed in public network environment, behaviour can not be debugged or debug by existing
Make the big problem of difficulty, can only by way of going on business field adjustable.
Aiming at the problem that debugging of embedded device in the related technology is unable to satisfy demand for security, solution is not yet proposed.
Summary of the invention
The embodiment of the invention provides a kind of embedded apparatus debugging method and systems, embedding in the related technology at least to solve
Enter the problem of formula equipment debugging is unable to satisfy demand for security.
According to one embodiment of present invention, a kind of embedded device debugging system is provided, the system comprises: debugging
End and debugged end, wherein
The debugging end, for obtaining the debug command file FCS with signature, the debug command file that the band is signed
FCS is sent to debugged end;
The debugged end, the debug command file FCS for signing to the band are parsed to obtain debug command text
Debug command in part FC generates the implementing result file for executing the debug command, the implementing result file is added
It is close to obtain debugging result file, the debugging result file is directly returned to the debugging end.
Optionally, the debugging end is also used to be arranged in the case where outer net at the debugged end, the band is signed
Debug command file FCS be transmitted directly to the debugged end;It is arranged in the case where private network at the debugged end, by institute
It states the debug command file FCS with signature and is sent to the corresponding outer net in the debugged end, be transferred to by the outer net described
The debugged end in private network.
Optionally, the system also includes:
Signature platform, the debug command file FC sent for receiving the debugging end, to the debug command text
Part FC is signed to obtain the debug command file FCS of the band signature, and the debug command file FCS that the band is signed is returned
Back to the debugging end.
Optionally, the signature platform is also used to calculate the cryptographic Hash of the debug command file FC, obtains described adjusted
The corresponding private key P in end is tried, the cryptographic Hash of the debug command file FC is signed S and the debug command by the private key P
File FC splices to obtain the debug command file FCS of the band signature.
Optionally, the debugged end is also used to obtain the debug command file FC by the public key U decryption FCS
Cryptographic Hash sign S, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the private key P is with the public key U
A pair of secret keys;
Judge whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
In the case where the judgment result is yes, the debug command file FCS of band signature is parsed to obtain described
Debug command in debug command file FC, and generate the implementing result file FR.
Optionally, the debugged end is also used to generate symmetric key K at random and encrypts the implementing result file FR,
Obtain encrypted implementing result file FRK;
The symmetric key K is encrypted by the public key U, obtains encrypted symmetric key UK;
The encrypted symmetric key UK and the encrypted implementing result file FRK are spliced, institute is generated
State debugging result file FRUK.
Optionally, the debugging end, being also used to will be described encrypted symmetrical close in the debugging result file FRUK
Key UK is sent to the signature platform;The symmetric key K returned according to the signature platform is to the encrypted execution
Destination file FRK is decrypted, and obtains the implementing result file FR;
The signature platform is also used to carry out the encrypted symmetric key UK received by the private key P
Decryption, obtains the symmetric key K, and the symmetric key K is returned to the debugging end.
According to another embodiment of the invention, a kind of embedded apparatus debugging method is additionally provided, comprising:
Obtain the debug command file FCS with signature;
The debug command file FCS that the band is signed is sent to the debugged end, wherein the debugging of the band signature
Command file FCS, which is used to indicate the debugged end and is parsed to the debug command file FCS that the band is signed, to be debugged
Debug command in command file FC, and the implementing result file for executing the debug command is generated, by the implementing result text
Part is encrypted to obtain debugging result file;
Receive the debugging result file.
Optionally, the debug command file FCS that the band is signed is sent to the debugged end includes:
It is arranged in the case where outer net at debugged end, the debug command file FCS that the band is signed is transmitted directly to
The debugged end;
It is arranged in the case where private network at the debugged end, the debug command file FCS that the band is signed is sent to
The corresponding outer net in the debugged end, the debugged end in the private network is transferred to by the outer net.
Optionally, obtaining the debug command file FCS with signature includes:
The debug command file FC is sent to signature platform;
Receive the debug command file FCS for the band signature that the signature platform returns, wherein the tune of the band signature
Trying command file FCS is obtained after the signature platform signs to the debug command file FC.
Optionally, after receiving the debugging result file, the method also includes:
Encrypted symmetric key UK in debugging result file FRUK is sent to the signature platform, wherein described
Debugging result file FRUK is that the debugged end generates symmetric key K at random and encrypts the implementing result file FR, is obtained
Encrypted implementing result file FRK;The symmetric key K is encrypted by public key U, obtains encrypted symmetric key UK;It will
The encrypted symmetric key UK and encrypted implementing result file FRK carries out splicing generation;
The encrypted implementing result file FRK is carried out according to the symmetric key K that the signature platform returns
Decryption, obtains the implementing result file FR, wherein the symmetric key K is that the signature platform is added by private key P to described
What the symmetric key UK after close was decrypted, the private key P and the public key U are a pair of secret keys.
According to another embodiment of the invention, a kind of embedded apparatus debugging method is additionally provided, comprising:
Receive the debug command file FCS with signature;
The debug command file FCS of band signature is parsed to obtain the debug command in debug command file FC,
And generate the implementing result file for executing the debug command;
It is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end.
Optionally, the debugging result file is sent to the debugging end includes:
The debugging result file is transmitted directly to debugging end;Alternatively,
The debugging result file is transferred to outer net, the debugging end is sent to by the outer net.
Optionally, the debug command file FCS of band signature is parsed to obtain the tune in debug command file FC
Examination order, and generate and execute the implementing result file of the debug command and include:
The cryptographic Hash label of debug command file FC are obtained by the debug command file FCS that public key U decrypts the band signature
Name S, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the debug command file FCS of the band signature is signature
The cryptographic Hash of the debug command file FC is signed what the S and debug command file FC spliced by private key P by platform,
The private key P and public key U is a pair of secret keys;
Judge whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
In the case where the judgment result is yes, the debug command file FCS of band signature is parsed to obtain described
Debug command in debug command file FC, and generate the implementing result file FR for executing the debug command.
Optionally, encrypted the implementing result file to obtain the debugging result file include:
It is random to generate symmetric key K and encrypt the implementing result file FR, obtain encrypted implementing result file
FRK;
The symmetric key K is encrypted by the public key U, obtains encrypted symmetric key UK;
The encrypted symmetric key UK and the encrypted implementing result file FRK are spliced, institute is generated
State debugging result file FRUK.
According to another embodiment of the invention, a kind of embedded device debugging apparatus is additionally provided, comprising:
Module is obtained, for obtaining the debug command file FCS with signature;
First sending module, the debug command file FCS for the band to be signed are sent to the debugged end,
In, the debug command file FCS of the band signature is used to indicate the debug command file that the debugged end signs to the band
FCS is parsed to obtain the debug command in debug command file FC, and generates the implementing result text for executing the debug command
Part is encrypted the implementing result file to obtain debugging result file;
First receiving module, for receiving the debugging result file.
Optionally, first sending module, is also used to
It is arranged in the case where outer net at debugged end, the debug command file FCS that the band is signed is transmitted directly to
The debugged end;
It is arranged in the case where private network at the debugged end, the debug command file FCS that the band is signed is sent to
The corresponding outer net in the debugged end, the debugged end in the private network is transferred to by the outer net.
Optionally, the acquisition module includes:
Transmission unit, for sending the debug command file FC to signature platform;
Receiving unit, for receiving the debug command file FCS for the band signature that the signature platform returns, wherein
The debug command file FCS of the band signature is obtained after the signature platform signs to the debug command file FC
's.
Optionally, described device further include:
Second sending module, for the encrypted symmetric key UK in debugging result file FRUK to be sent to the label
Name platform, wherein the debugging result file FRUK is that the debugged end generates symmetric key K at random and encrypts the execution
Destination file FR obtains encrypted implementing result file FRK;The symmetric key K is encrypted by public key U, after obtaining encryption
Symmetric key UK;The encrypted symmetric key UK and the encrypted implementing result file FRK are subjected to splicing life
At;
Deciphering module, the symmetric key K for being returned according to the signature platform encrypted execute knot to described
Fruit file FRK is decrypted, and obtains the implementing result file FR, wherein the symmetric key K is that the signature platform passes through
The encrypted symmetric key UK is decrypted in private key P, and the private key P and the public key U are a pair of secret keys.
According to another embodiment of the invention, a kind of embedded device debugging apparatus is additionally provided, comprising:
Second receiving module, for receiving the debug command file FCS with signature;
Generation module, the debug command file FCS for signing to the band are parsed to obtain debug command file FC
In debug command, and generate the implementing result file for executing the debug command;
Encrypting module, for being encrypted the implementing result file to obtain debugging result file;
Third sending module, for the debugging result file to be sent to debugging end.
Optionally, the third sending module, is also used to
The debugging result file is transmitted directly to debugging end;Alternatively,
The debugging result file is transferred to outer net, the debugging end is sent to by the outer net.
Optionally, the generation module includes:
Computing unit, the debug command file FCS for decrypting the band signature by public key U obtain debug command file
The cryptographic Hash signature S of FC, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the debug command of the band signature
File FCS is that signature platform passes through private key P for the cryptographic Hash signature S of the debug command file FC and the debug command file
What FC spliced, the private key P and the public key U are a pair of secret keys;
Judging unit, for judging whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
First generation unit is used in the case where the judgment result is yes, to the debug command file FCS of band signature
It is parsed to obtain the debug command in the debug command file FC, and generates the implementing result text for executing the debug command
Part FR.
Optionally, the encrypting module includes:
First encryption unit, for generating symmetric key K at random and encrypting the implementing result file FR, after obtaining encryption
Implementing result file FRK;
Second encryption unit obtains encrypted symmetric key for encrypting the symmetric key K by the public key U
UK;
Second generation unit is used for the encrypted symmetric key UK and the encrypted implementing result file
FRK is spliced, and the debugging result file FRUK is generated.
According to still another embodiment of the invention, a kind of storage medium is additionally provided, meter is stored in the storage medium
Calculation machine program, wherein the computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
According to still another embodiment of the invention, a kind of electronic device, including memory and processor are additionally provided, it is described
Computer program is stored in memory, the processor is arranged to run the computer program to execute any of the above-described
Step in embodiment of the method.
Through the invention, the debug command file FCS with signature is received;To the debug command file FCS of band signature
It is parsed to obtain the debug command in debug command file FC, and generates the implementing result file for executing the debug command;
It is encrypted the implementing result file to obtain debugging result file;The debugging result file is returned into debugging end, it can
To solve the problems, such as that embedded device debugging is unable to satisfy demand for security in the related technology, it ensure that debugging safety, reduce behaviour
Make difficulty.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair
Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart according to embedded apparatus debugging method in the related technology;
Fig. 2 is a kind of hardware block diagram of the mobile terminal of embedded apparatus debugging method of the embodiment of the present invention;
Fig. 3 is a kind of flow chart one of embedded apparatus debugging method according to an embodiment of the present invention;
Fig. 4 is a kind of flowchart 2 of embedded apparatus debugging method according to an embodiment of the present invention;
Fig. 5 is the block diagram of embedded device debugging system according to an embodiment of the present invention;
Fig. 6 is the schematic diagram of embedded device debugging system according to an embodiment of the present invention;
Fig. 7 is the flow chart one of embedded device remote debugging according to an embodiment of the present invention;
Fig. 8 is the flowchart 2 of embedded device remote debugging according to an embodiment of the present invention;
Fig. 9 is the block diagram one of embedded device debugging apparatus according to an embodiment of the present invention;
Figure 10 is the block diagram two of embedded device debugging apparatus according to an embodiment of the present invention.
Specific embodiment
Hereinafter, the present invention will be described in detail with reference to the accompanying drawings and in combination with Examples.It should be noted that not conflicting
In the case of, the features in the embodiments and the embodiments of the present application can be combined with each other.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.
Embodiment of the method provided by the embodiment of the present application one can be in mobile terminal, terminal or similar fortune
It calculates and is executed in device.For running on mobile terminals, Fig. 2 is a kind of embedded apparatus debugging method of the embodiment of the present invention
Mobile terminal hardware block diagram, as shown in Fig. 2, mobile terminal 10 may include one or more (only showing one in Fig. 2
It is a) (processor 102 can include but is not limited to the processing of Micro-processor MCV or programmable logic device FPGA etc. to processor 102
Device) and memory 104 for storing data, optionally, above-mentioned mobile terminal can also include the biography for communication function
Transfer device 106 and input-output equipment 108.It will appreciated by the skilled person that structure shown in Fig. 2 is only to show
Meaning, does not cause to limit to the structure of above-mentioned mobile terminal.For example, mobile terminal 10 may also include it is more than shown in Fig. 2
Perhaps less component or with the configuration different from shown in Fig. 2.
Memory 104 can be used for storing computer program, for example, the software program and module of application software, such as this hair
The corresponding computer program of message method of reseptance in bright embodiment, processor 102 are stored in memory 104 by operation
Computer program realizes above-mentioned method thereby executing various function application and data processing.Memory 104 may include
High speed random access memory, may also include nonvolatile memory, as one or more magnetic storage device, flash memory or its
His non-volatile solid state memory.In some instances, memory 104 can further comprise remotely setting relative to processor 102
The memory set, these remote memories can pass through network connection to mobile terminal 10.The example of above-mentioned network includes but not
It is limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include
The wireless network that the communication providers of mobile terminal 10 provide.In an example, transmitting device 106 includes a Network adaptation
Device (Network Interface Controller, referred to as NIC), can be connected by base station with other network equipments to
It can be communicated with internet.In an example, transmitting device 106 can for radio frequency (Radio Frequency, referred to as
RF) module is used to wirelessly be communicated with internet.
A kind of embedded device debugging side for running on above-mentioned mobile terminal or the network architecture is provided in the present embodiment
Method, Fig. 3 is a kind of flow chart one of embedded apparatus debugging method according to an embodiment of the present invention, as shown in figure 3, the process packet
Include following steps:
Step S302 receives the debug command file FCS with signature;
Step S304 is parsed to obtain in debug command file FC to the debug command file FCS of band signature
Debug command, and generate the implementing result file for executing the debug command;
Step S306 is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end by step S308.
S302 to S308 through the above steps receives the debug command file FCS with signature;Debugging to band signature
Command file FCS is parsed to obtain the debug command in debug command file FC, and is generated and executed holding for the debug command
Row destination file;It is encrypted the implementing result file to obtain debugging result file;The debugging result file is returned
Debugging end is given, can solve the problem of embedded device debugging is unable to satisfy demand for security in the related technology, ensure that debugging peace
Quan Xing, operation difficulty is reduced.
Outer net in present example can be internet, and even debugged apparatus is deployed in outer net and can directly couple mutually
Networking, Intranet or private network can be local area network, refer in the geographic range of a part, by various computers, external equipment and
Database etc. links up mutually the computer communication network of composition, if debugged apparatus is deployed in Intranet, jumps the file of section transmission
It cannot be transmitted directly to debugged end, the corresponding outer net of Intranet can only be sent to, then file is transferred to the quilt of Intranet from outer net
End is debugged, the file at debugged end is wanted to be sent to debugging end, after needing the file of Intranet being transferred to outer net, ability
It is sent to debugging end.
In the embodiment of the present invention, above-mentioned deployment S208 be can specifically include:, will be described when debugged end is deployed on outer net
Debugging result file is transmitted directly to debugging end;When debugged end is deployed on Intranet or private network, by the debugging result file
It is transferred to outer net, the debugging end is sent to by the outer net.It can solve in the related technology for being deployed in setting for Intranet
The standby problem that can not be debugged or debugging difficulty is big, no matter deployed with devices is in Intranet or outer net, simple and convenient can complete to set
Standby debugging operations, are intervened without professional.
In the embodiment of the present invention, above-mentioned steps S304 be can specifically include:
Debug command file is obtained by the debug command file FCS that public key U corresponding with private key P decrypts the band signature
The cryptographic Hash signature S of FC, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the debug command of the band signature
File FCS is that signature server will pass through private key P to the cryptographic Hash signature S of the debug command file FC and the debug command
File FC splices;
Judge whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
In the case where the judgment result is yes, the debug command file FCS of the band signature is parsed to obtain debugging life
The debug command in file FC is enabled, and generates the implementing result file FR for executing the debug command.
In the embodiment of the present invention, above-mentioned steps S306 be can specifically include:
It is random to generate symmetric key K and encrypt the implementing result file FR, obtain encrypted implementing result file
FRK;
The symmetric key K is encrypted by public key U corresponding with the private key P, obtains encrypted symmetric key UK;
The encrypted symmetric key UK and the encrypted implementing result file FRK are spliced, institute is generated
State debugging result file FRUK.
The embodiment of the present invention, additionally provides a kind of embedded apparatus debugging method, and Fig. 4 is according to an embodiment of the present invention one
The flowchart 2 of kind embedded apparatus debugging method, as shown in figure 4, the process includes the following steps:
Step S402 obtains the debug command file FCS with signature;
The debug command file FCS that the band is signed is sent to the debugged end, wherein the band by step S404
The debug command file FCS of signature is used to indicate the debugged end and solves to the debug command file FCS that the band is signed
Analysis obtains the debug command in debug command file FC, and generates the implementing result file for executing the debug command, will be described
Implementing result file is encrypted to obtain debugging result file;
Step S406 receives the debugging result file.
Through the invention, the debug command file FCS with signature is obtained;The debug command file FCS that the band is signed
It is sent to the debugged end, wherein the debug command file FCS of the band signature is used to indicate the debugged end and parses
To the debug command in debug command file FC, and the implementing result file for executing the debug command is generated, by the execution
Destination file is encrypted to obtain debugging result file;The debugging result file is received, can solve and be embedded in the related technology
The problem of formula equipment debugging is unable to satisfy demand for security ensure that debugging safety, reduce operation difficulty.
In the embodiment of the present invention, above-mentioned steps S404 be can specifically include:
It is arranged in the case where outer net at debugged end, the debug command file FCS that the band is signed is transmitted directly to
The debugged end;
It is arranged in the case where private network at the debugged end, the debug command file FCS that the band is signed is sent to
The corresponding outer net in the debugged end, the debugged end in the private network is transferred to by the outer net.
In the embodiment of the present invention, above-mentioned steps S402 be can specifically include:
The debug command file FC is sent to signature platform;
Receive the debug command file FCS for the band signature that the signature platform returns, wherein the tune of the band signature
Trying command file FCS is obtained after the signature platform signs to the debug command file FC.
The embodiment of the present invention, after receiving the debugging result file, after the encryption in debugging result file FRUK
Symmetric key UK be sent to the signature platform, wherein the debugging result file FRUK is that the debugged end is given birth at random
At symmetric key K and the implementing result file FR is encrypted, obtains encrypted implementing result file FRK;It is encrypted by public key U
The symmetric key K obtains encrypted symmetric key UK;The encrypted symmetric key UK encrypted is held with described
Row destination file FRK carries out splicing generation;The symmetric key K returned according to the signature platform is to described encrypted
Implementing result file FRK is decrypted, and obtains the implementing result file FR, wherein the symmetric key K is that the signature is flat
Platform is decrypted the encrypted symmetric key UK by private key P, and the private key P and the public key U are a pair
Key.
The embodiment of the present invention, provides a kind of embedded device debugging system, and Fig. 5 is insertion according to an embodiment of the present invention
The block diagram of formula equipment debugging system, as shown in figure 5, the system comprises: the system comprises: debugging end 52 and debugged end
54, wherein
The debugging end 52, for obtaining the debug command file FCS with signature, the debug command that the band is signed is literary
Part FCS is sent to debugged end 54;
The debugged end 54, the debug command file FCS for signing to the band are parsed to obtain debug command
Debug command in file FC generates the implementing result file for executing the debug command, and the implementing result file is carried out
Encryption obtains debugging result file, and the debugging result file is directly returned to the debugging end 52.
Optionally, the debugging end 52 is also used to be arranged in the case where outer net at the debugged end 54, by the band
The debug command file FCS of signature is transmitted directly to the debugged end 54;At the debugged end 54, the feelings of private network are set
Under condition, the debug command file FCS that the band is signed is sent to the corresponding outer net in the debugged end 54, passes through the outer net
It is transferred to the debugged end 54 in the private network.
Optionally, the system also includes:
Signature platform, the debug command file FC sent for receiving the debugging end 52, to the debug command
File FC is signed to obtain the debug command file FCS of the band signature, and the debug command file FCS that the band is signed
Return to the debugging end 52.
Optionally, the signature platform is also used to calculate the cryptographic Hash of the debug command file FC, obtains described adjusted
The corresponding private key P in end 54 is tried, is ordered the cryptographic Hash signature S of the debug command file FC and the debugging by the private key P
File FC is enabled to splice to obtain the debug command file FCS of the band signature.
Optionally, the debugged end 54 is also used to obtain the debug command file by the public key U decryption FCS
The cryptographic Hash signature S of FC, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the private key P and public key U
For a pair of secret keys;
Judge whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
In the case where the judgment result is yes, the debug command file FCS of band signature is parsed to obtain described
Debug command in debug command file FC, and generate the implementing result file FR.
Optionally, the debugged end 54 is also used to generate symmetric key K at random and encrypts the implementing result file
FR obtains encrypted implementing result file FRK;
The symmetric key K is encrypted by the public key U, obtains encrypted symmetric key UK;
The encrypted symmetric key UK and the encrypted implementing result file FRK are spliced, institute is generated
State debugging result file FRUK.
Optionally, the debugging end 52, being also used to will be described encrypted symmetrical in the debugging result file FRUK
Key UK is sent to the signature platform;It encrypted is held according to the symmetric key K that the signature platform returns to described
Row destination file FRK is decrypted, and obtains the implementing result file FR;
The signature platform is also used to carry out the encrypted symmetric key UK received by the private key P
Decryption, obtains the symmetric key K, and the symmetric key K is returned to the debugging end 52.
It as signature server, debugged end include below debugged set so as to debug end be remote debugging equipment, signature platform
The embodiment of the present invention is illustrated for standby and local commissioning device.
The embodiment of the present invention is based on the credible running environment of equipment end, passes through the machines such as login authentication, trusted signature, symmetric cryptography
System guarantees debugging safety, reduces operation difficulty.Fig. 6 is the signal of embedded device debugging system according to an embodiment of the present invention
Figure, as shown in Figure 6, comprising: remote debugging equipment, local commissioning device, debugged apparatus and signature server, wherein institute
It states remote debugging equipment to connect with the local commissioning device, the debugged apparatus, signature server respectively, the local tune
Examination equipment is connect with the debugged apparatus, for the function of remote debugging equipment, local commissioning device and debugged apparatus
With shown in Fig. 5, signature server is to FC file signature, specifically, the cryptographic Hash of debug command file FC is calculated, according to debugged
The number of equipment obtains corresponding private key P, is signed using cryptographic Hash of the private key P to FC, and by cryptographic Hash signature S splicing FC it
After obtain FCS.The tail portion UK for receiving the debugging result file FRUK that remote debugging equipment is sent, by private key P to encrypted
Symmetric key UK is decrypted, and obtains the symmetric key K, and symmetric key K is returned to the remote debugging equipment.
Debugged apparatus in the embodiment of the present invention is arranged in the case where private network or Intranet, and Fig. 7 is real according to the present invention
The flow chart one of the embedded device remote debugging of example is applied, as shown in fig. 7, comprises:
Step S1, remote debugging equipment send debug command file FC to signature server (or signature platform), specifically,
Commissioning staff is written in file FC in remote debugging equipment according to debugged apparatus problem or phenomenon configuration debug command, it
This document company's signature server is submitted to afterwards to sign;
Step S2, signature server is to FC file signature;Specifically, the maintenance of company's signature server has plant correspondence out
Public private key pair is mapped by number.After receiving FC file, this document Hash is calculated first, is compiled later according to equipment is corresponding
It number obtains and private key P and to sign to Hash, obtain signature result S splicing and return to remote debugging equipment after file FC.
In above-mentioned steps S2, signature server can specifically include debugging command file FC signature:
S21 calculates the cryptographic Hash of debug command file FC;
S22 obtains corresponding private key P according to the number of debugged apparatus;
S23 is signed using cryptographic Hash of the private key P to FC, and cryptographic Hash signature S splicing is obtained FCS after FC.
Step S3 returns to the debug command file FCS with signature to remote debugging equipment, and remote debugging equipment passes through local
FCS is sent to debugged apparatus by commissioning device, specifically, commissioning staff takes signed debug command file FCS after, due to
FCS is then sent to on-site technical support or user in Intranet by deployed with devices, by passing through after technical support or user's beaching accommodation
Debugging services upload to equipment;
Step S4 after debugged apparatus receives the debug command file FCS with signature, executes the debug command in FCS, tool
Body the following steps are included:
S41, using public key U decryption tail of file signature S (corresponding with private key P) and calculation document FC (does not include tail portion to sign
Name) Hash;
S42, matching decrypted result S and file Hash S1, if mismatching, refusal is parsed and is unsuccessfully returned;If matching executes
Step S43;
S43, parsing, which executes, orders in file FC and generates final result FR.
S44, equipment, which generates symmetric key K at random and encrypts command execution results FR, later obtains FRK;
S45 generates final debugging result text using equipment public key U encrypted symmetric key K splicing after ciphertext result FRK
Part FRUK.
Step S5 returns to debugging result file FRUK, and debugging result file is sent to local commissioning device, local to debug
Debugging result file is sent to remote debugging equipment by equipment, specifically, since debugged apparatus is Intranet deployment, export
Remote debugging equipment is transmitted to by local commissioning device afterwards, i.e., commissioning staff's forwarding is transmitted to by technical support/user;
Step S6, commissioning staff send Digital signature service for debugging result file FRUK tail portion UK by remote debugging equipment
Device;
Step S7, signature server obtain symmetric cryptographic key K using device private P decryption;
Symmetric cryptographic key K is returned to remote debugging equipment by step S8;
Step S9, remote debugging equipment obtain plaintext result FR using symmetric cryptographic key K decryption ciphertext debugging result FRK
And it is analyzed.
Debugged apparatus in the embodiment of the present invention is arranged in the case where public network, and Fig. 8 is according to an embodiment of the present invention
The flowchart 2 of embedded device remote debugging, as shown in Figure 8, comprising:
Step S1, remote debugging equipment send debug command file FC to signature server, and specifically, commissioning staff is remote
On journey commissioning device, according in debugged apparatus problem or phenomenon configuration debug command write-in file FC, this document is mentioned later
The company signature server of being sent to is signed;
Step S2, signature server is to FC file signature;Specifically, the maintenance of company's signature server has plant correspondence out
Public private key pair is mapped by number.After receiving FC file, this document Hash is calculated first, is compiled later according to equipment is corresponding
It number obtains and private key P and to sign to Hash, obtain signature result S splicing and return to remote debugging equipment after file FC.
In above-mentioned steps S2, signature server can specifically include debugging command file FC signature:
S21 calculates the cryptographic Hash of debug command file FC;
S22 obtains corresponding private key P according to the number of debugged apparatus;
S23 is signed using cryptographic Hash of the private key P to FC, and cryptographic Hash signature S splicing is obtained FCS after FC.
Step S3 returns to the debug command file FCS with signature to remote debugging equipment, and remote debugging equipment passes through local
FCS is sent to debugged apparatus by commissioning device, specifically, commissioning staff takes signed debug command file FCS after, directly
FCS is uploaded to equipment by debugging services by beaching accommodation;
Step S4 after debugged apparatus receives the debug command file FCS with signature, executes the debug command in FCS, tool
Body the following steps are included:
S41, using public key U decryption tail of file signature S (corresponding with private key P) and calculation document FC (does not include tail portion to sign
Name) Hash;
S42, matching decrypted result S and file Hash S1, if mismatching, refusal is parsed and is unsuccessfully returned;If matching executes
Step S43;
S43, parsing, which executes, orders in file FC and generates final result FR.
S44, equipment, which generates symmetric key K at random and encrypts command execution results FR, later obtains FRK;
S45 generates final debugging result text using equipment public key U encrypted symmetric key K splicing after ciphertext result FRK
Part FRUK.
Step S5 returns to debugging result file FRUK, debugging result file is directly sent to remote debugging equipment;
Step S6, commissioning staff send Digital signature service for debugging result file FRUK tail portion UK by remote debugging equipment
Device;
Step S7, signature server obtain symmetric cryptographic key K using device private P decryption;
Symmetric cryptographic key K is returned to remote debugging equipment by step S8;
Step S9, remote debugging equipment obtain plaintext result FR using symmetric cryptographic key K decryption ciphertext debugging result FRK
And it is analyzed.
By above-mentioned debud mode, debugging services/safe operation is credible, and attacker can not be obtained sensitive by debugging services
Information or malicious operation equipment, lifting means safety;Debugging result encryption, attacker can not by sniff, the modes such as steal
Debugging result information is obtained, information leakage is avoided;No matter deployed with devices, can simple and convenient completion equipment in public network or Intranet
Debugging operations are intervened without professional, solve the problems, such as that the debugging embedded equipment of telesecurity is difficult.
The embodiment of the present invention, additionally provides a kind of embedded device debugging apparatus, and Fig. 9 is according to an embodiment of the present invention embedding
Enter the block diagram one of formula equipment debugging device, as shown in Figure 9, comprising:
Module 92 is obtained, for obtaining the debug command file FCS with signature;
First sending module 94, the debug command file FCS for the band to be signed are sent to the debugged end,
In, the debug command file FCS of the band signature is used to indicate the debug command file that the debugged end signs to the band
FCS is parsed to obtain the debug command in debug command file FC, and generates the implementing result text for executing the debug command
Part is encrypted the implementing result file to obtain debugging result file;
First receiving module 96, for receiving the debugging result file.
Optionally, first sending module 94, is also used to
It is arranged in the case where outer net at debugged end, the debug command file FCS that the band is signed is transmitted directly to
The debugged end;
It is arranged in the case where private network at the debugged end, the debug command file FCS that the band is signed is sent to
The corresponding outer net in the debugged end, the debugged end in the private network is transferred to by the outer net.
Optionally, the acquisition module 92 includes:
Transmission unit, for sending the debug command file FC to signature platform;
Receiving unit, for receiving the debug command file FCS for the band signature that the signature platform returns, wherein
The debug command file FCS of the band signature is obtained after the signature platform signs to the debug command file FC
's.
Optionally, described device further include:
Second sending module, for the encrypted symmetric key UK in debugging result file FRUK to be sent to the label
Name platform, wherein the debugging result file FRUK is that the debugged end generates symmetric key K at random and encrypts the execution
Destination file FR obtains encrypted implementing result file FRK;The symmetric key K is encrypted by public key U, after obtaining encryption
Symmetric key UK;The encrypted symmetric key UK and the encrypted implementing result file FRK are subjected to splicing life
At;
Deciphering module, the symmetric key K for being returned according to the signature platform encrypted execute knot to described
Fruit file FRK is decrypted, and obtains the implementing result file FR, wherein the symmetric key K is that the signature platform passes through
The encrypted symmetric key UK is decrypted in private key P, and the private key P and the public key U are a pair of secret keys.
The embodiment of the present invention, additionally provides a kind of embedded device debugging apparatus, and Figure 10 is according to an embodiment of the present invention
The block diagram two of embedded device debugging apparatus, as shown in Figure 10, comprising:
Second receiving module 102, for receiving the debug command file FCS with signature;
Generation module 104, the debug command file FCS for signing to the band are parsed to obtain debug command file
Debug command in FC, and generate the implementing result file for executing the debug command;
Encrypting module 106, for being encrypted the implementing result file to obtain debugging result file;
Third sending module 108, for the debugging result file to be sent to debugging end.
Optionally, the third sending module 108, is also used to
The debugging result file is transmitted directly to debugging end;Alternatively,
The debugging result file is transferred to outer net, the debugging end is sent to by the outer net.
Optionally, the generation module 104 includes:
Computing unit, the debug command file FCS for decrypting the band signature by public key U obtain debug command file
The cryptographic Hash signature S of FC, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the debug command of the band signature
File FCS is that signature platform passes through private key P for the cryptographic Hash signature S of the debug command file FC and the debug command file
What FC spliced, the private key P and the public key U are a pair of secret keys;
Judging unit, for judging whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
First generation unit is used in the case where the judgment result is yes, to the debug command file FCS of band signature
It is parsed to obtain the debug command in the debug command file FC, and generates the implementing result text for executing the debug command
Part FR.
Optionally, the encrypting module 106 includes:
First encryption unit, for generating symmetric key K at random and encrypting the implementing result file FR, after obtaining encryption
Implementing result file FRK;
Second encryption unit obtains encrypted symmetric key for encrypting the symmetric key K by the public key U
UK;
Second generation unit is used for the encrypted symmetric key UK and the encrypted implementing result file
FRK is spliced, and the debugging result file FRUK is generated.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong
Following manner realization is crossed, but not limited to this: above-mentioned module is respectively positioned in same processor;Alternatively, above-mentioned modules are with any
Combined form is located in different processors.
The embodiments of the present invention also provide a kind of storage medium, computer program is stored in the storage medium, wherein
The computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
Optionally, in the present embodiment, above-mentioned storage medium can be set to store by executing based on following steps
Calculation machine program:
S11 receives the debug command file FCS with signature;
S12 is parsed to obtain the life of the debugging in debug command file FC to the debug command file FCS of band signature
It enables, and generates the implementing result file for executing the debug command;
S13 is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end by S14.
Optionally, in the present embodiment, above-mentioned storage medium may be also configured to store for executing following steps
Computer program:
S21 obtains the debug command file FCS with signature;
The debug command file FCS that the band is signed is sent to the debugged end by S22, wherein the band signature
Debug command file FCS is used to indicate the debugged end and is parsed to obtain to the debug command file FCS that the band is signed
Debug command in debug command file FC, and the implementing result file for executing the debug command is generated, knot is executed by described
Fruit file is encrypted to obtain debugging result file;
S23 receives the debugging result file.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (Read-
Only Memory, referred to as ROM), it is random access memory (Random Access Memory, referred to as RAM), mobile hard
The various media that can store computer program such as disk, magnetic or disk.
The embodiments of the present invention also provide a kind of electronic device, including memory and processor, stored in the memory
There is computer program, which is arranged to run computer program to execute the step in any of the above-described embodiment of the method
Suddenly.
Optionally, above-mentioned electronic device can also include transmission device and input-output equipment, wherein the transmission device
It is connected with above-mentioned processor, which connects with above-mentioned processor.
Optionally, in the present embodiment, above-mentioned processor can be set to execute following steps by computer program:
S11 receives the debug command file FCS with signature;
S12 is parsed to obtain the life of the debugging in debug command file FC to the debug command file FCS of band signature
It enables, and generates the implementing result file for executing the debug command;
S13 is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end by S14.
Optionally, in the present embodiment, above-mentioned processor may be also configured to execute following step by computer program
It is rapid:
S21 obtains the debug command file FCS with signature;
The debug command file FCS that the band is signed is sent to the debugged end by S22, wherein the band signature
Debug command file FCS is used to indicate the debugged end and is parsed to obtain to the debug command file FCS that the band is signed
Debug command in debug command file FC, and the implementing result file for executing the debug command is generated, knot is executed by described
Fruit file is encrypted to obtain debugging result file;
S23 receives the debugging result file.
Optionally, the specific example in the present embodiment can be with reference to described in above-described embodiment and optional embodiment
Example, details are not described herein for the present embodiment.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with general
Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed
Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored
It is performed by computing device in the storage device, and in some cases, it can be to be different from shown in sequence execution herein
Out or description the step of, perhaps they are fabricated to each integrated circuit modules or by them multiple modules or
Step is fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific hardware and softwares to combine.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.It is all within principle of the invention, it is made it is any modification, etc.
With replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (17)
1. a kind of embedded device debugging system, which is characterized in that the system comprises: debugging end and debugged end, wherein
The debug command file that the band is signed is sent to by the debugging end for obtaining the debug command file with signature
Debugged end;
The debugged end, the debug command file for signing to the band are parsed to obtain the tune in debug command file
Examination order, generates the implementing result file for executing the debug command, the implementing result file is encrypted and is debugged
The debugging result file is returned to the debugging end by destination file.
2. system according to claim 1, which is characterized in that
The debugging end is also used to be arranged in the case where outer net at the debugged end, the debug command that the band is signed
File is transmitted directly to the debugged end;It is arranged in the case where private network at the debugged end, the tune that the band is signed
Examination command file is sent to the corresponding outer net in the debugged end, described is adjusted by what the outer net was transferred in the private network
Try end.
3. system according to claim 1, which is characterized in that the system also includes:
Platform of signing carries out the debug command file for receiving the debug command file of debugging end transmission
Signature obtains the debug command file of the band signature, and the debug command file that the band is signed is returned to the debugging
End.
4. system according to claim 3, which is characterized in that
The signature platform is also used to calculate the cryptographic Hash of the debug command file, obtains the corresponding private in the debugged end
The cryptographic Hash signature of the debug command file is spliced to obtain the band by key by the private key with the debug command file
The debug command file of signature.
5. system according to claim 4, which is characterized in that
The debugged end is also used to obtain the debug command text by the debug command file with signature described in public key decryptions
The cryptographic Hash of part signs and calculates the cryptographic Hash of the debug command file, wherein the private key is a pair of close with the public key
Key;
Judge whether the cryptographic Hash signature matches with the cryptographic Hash;
In the case where the judgment result is yes, the debug command file of band signature is parsed to obtain the debug command
Debug command in file, and generate the implementing result file.
6. system according to claim 5, which is characterized in that
The debugged end is also used to generate symmetric key at random and encrypts the implementing result file, obtains encrypted hold
Row destination file;
By symmetric key described in the public key encryption, encrypted symmetric key is obtained;
The encrypted symmetric key and the encrypted implementing result file are spliced, the debugging result is generated
File.
7. system according to claim 6, which is characterized in that
The debugging end is also used to the encrypted symmetric key in the debugging result file being sent to the signature
Platform;The encrypted implementing result file is decrypted according to the symmetric key that the signature platform returns, is obtained
To the implementing result file;
The signature platform is also used to that the encrypted symmetric key received is decrypted by the private key, obtains
The debugging end is returned to the symmetric key, and by the symmetric key.
8. a kind of embedded apparatus debugging method characterized by comprising
Obtain the debug command file with signature;
The debug command file that the band is signed is sent to debugged end, wherein the debug command file of the band signature is used
The debug command file that the band is signed is parsed to obtain the debugging in debug command file in the instruction debugged end
Order generates the implementing result file for executing the debug command, and the implementing result file is encrypted to obtain debugging knot
Fruit file;
Receive the debugging result file.
9. according to the method described in claim 8, being adjusted it is characterized in that, the debug command file that the band is signed is sent to
Examination end includes:
It is arranged in the case where outer net at the debugged end, the debug command file that the band is signed is transmitted directly to described
Debugged end;
It is arranged in the case where private network at the debugged end, the debug command file that the band is signed is sent to described adjusted
The corresponding outer net in end is tried, the debugged end in the private network is transferred to by the outer net.
10. according to the method described in claim 8, it is characterized in that, debug command file of the acquisition with signature includes:
The debug command file is sent to signature platform;
Receive the debug command file for the band signature that the signature platform returns, wherein the debug command of the band signature
File is obtained after the signature platform signs to the debug command file.
11. according to the method described in claim 10, it is characterized in that, after receiving the debugging result file, the side
Method further include:
Encrypted symmetric key in debugging result file is sent to the signature platform, wherein the debugging result text
Part is that the debugged end generates symmetric key at random and encrypts the implementing result file, obtains encrypted implementing result text
Part;By symmetric key described in public key encryption, encrypted symmetric key is obtained;By the encrypted symmetric key with it is described
Encrypted implementing result file carries out splicing generation;
The encrypted implementing result file is decrypted according to the symmetric key that the signature platform returns, is obtained
The implementing result file, wherein the symmetric key is that the signature platform passes through private key to described encrypted symmetrical close
What key was decrypted, the private key and the public key are a pair of secret keys.
12. a kind of embedded apparatus debugging method characterized by comprising
Receive the debug command file with signature;
The debug command file of band signature is parsed to obtain the debug command in debug command file, and generates execution
The implementing result file of the debug command;
It is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end.
13. according to the method for claim 12, which is characterized in that the debugging result file is sent to the debugging end
Include:
The debugging result file is transmitted directly to debugging end;Alternatively,
The debugging result file is transferred to outer net, the debugging end is sent to by the outer net.
14. according to the method for claim 12, which is characterized in that parsed to the debug command file of band signature
The debug command in debug command file is obtained, and is generated and is executed the implementing result file of the debug command and include:
The cryptographic Hash signature of debug command file is obtained by the debug command file with signature described in public key decryptions, and calculates institute
State the cryptographic Hash of debug command file, wherein the debug command file of the band signature is that signature platform will be described by private key
What the cryptographic Hash signature of debug command file spliced with the debug command file, the private key and the public key are a pair
Key;
Judge whether the cryptographic Hash signature matches with the cryptographic Hash;
In the case where the judgment result is yes, the debug command file of band signature is parsed to obtain the debug command
Debug command in file, and generate the implementing result file for executing the debug command.
15. according to the method for claim 14, which is characterized in that encrypted to obtain by the implementing result file described
Debugging result file includes:
It is random to generate symmetric key and encrypt the implementing result file, obtain encrypted implementing result file;
By symmetric key described in the public key encryption, encrypted symmetric key is obtained;
The encrypted symmetric key and the encrypted implementing result file are spliced, the debugging result is generated
File.
16. a kind of storage medium, which is characterized in that be stored with computer program in the storage medium, wherein the computer
Program is arranged to execute method described in the claim 8 to 11,12 to 15 any one when operation.
17. a kind of electronic device, including memory and processor, which is characterized in that be stored with computer journey in the memory
Sequence, the processor are arranged to run the computer program to execute the claim 8 to 11, in 12 to 15 any one
The method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910731779.7A CN110457171A (en) | 2019-08-08 | 2019-08-08 | A kind of embedded apparatus debugging method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910731779.7A CN110457171A (en) | 2019-08-08 | 2019-08-08 | A kind of embedded apparatus debugging method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110457171A true CN110457171A (en) | 2019-11-15 |
Family
ID=68485488
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910731779.7A Pending CN110457171A (en) | 2019-08-08 | 2019-08-08 | A kind of embedded apparatus debugging method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110457171A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113407434A (en) * | 2020-03-16 | 2021-09-17 | 腾讯科技(深圳)有限公司 | Processing method and device for debugging file |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101656962A (en) * | 2009-06-12 | 2010-02-24 | 中兴通讯股份有限公司 | Method and system for debugging equipment based on wireless local area network security foundation structure |
CN105635147A (en) * | 2015-12-30 | 2016-06-01 | 深圳市图雅丽特种技术有限公司 | Vehicle-mounted-special-equipment-system-based secure data transmission method and system |
CN106708489A (en) * | 2015-11-17 | 2017-05-24 | 杭州海康威视数字技术股份有限公司 | Debugging method and system of equipment |
CN106878016A (en) * | 2017-04-27 | 2017-06-20 | 上海木爷机器人技术有限公司 | Data is activation, method of reseptance and device |
CN107800791A (en) * | 2017-10-24 | 2018-03-13 | 海信集团有限公司 | A kind of method and apparatus debugged |
CN108958768A (en) * | 2018-06-26 | 2018-12-07 | 浪潮(北京)电子信息产业有限公司 | A kind of GPU firmware update, device, equipment and computer readable storage medium |
-
2019
- 2019-08-08 CN CN201910731779.7A patent/CN110457171A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101656962A (en) * | 2009-06-12 | 2010-02-24 | 中兴通讯股份有限公司 | Method and system for debugging equipment based on wireless local area network security foundation structure |
CN106708489A (en) * | 2015-11-17 | 2017-05-24 | 杭州海康威视数字技术股份有限公司 | Debugging method and system of equipment |
CN105635147A (en) * | 2015-12-30 | 2016-06-01 | 深圳市图雅丽特种技术有限公司 | Vehicle-mounted-special-equipment-system-based secure data transmission method and system |
CN106878016A (en) * | 2017-04-27 | 2017-06-20 | 上海木爷机器人技术有限公司 | Data is activation, method of reseptance and device |
CN107800791A (en) * | 2017-10-24 | 2018-03-13 | 海信集团有限公司 | A kind of method and apparatus debugged |
CN108958768A (en) * | 2018-06-26 | 2018-12-07 | 浪潮(北京)电子信息产业有限公司 | A kind of GPU firmware update, device, equipment and computer readable storage medium |
Non-Patent Citations (1)
Title |
---|
庞辽军等: "信息安全工程", 西安电子科技大学出版社, pages: 111 - 112 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113407434A (en) * | 2020-03-16 | 2021-09-17 | 腾讯科技(深圳)有限公司 | Processing method and device for debugging file |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8788802B2 (en) | Constrained cryptographic keys | |
CN110460439A (en) | Information transferring method, device, client, server-side and storage medium | |
CN101300806B (en) | System and method for processing secure transmissions | |
US11277444B2 (en) | System-on-chip for performing virtual private network function and system including the same | |
CN108566381A (en) | A kind of security upgrading method, device, server, equipment and medium | |
CN101409619B (en) | Flash memory card and method for implementing virtual special network key exchange | |
CN107294937A (en) | Data transmission method, client and server based on network service | |
CN103546289B (en) | USB (universal serial bus) Key based secure data transmission method and system | |
US11736304B2 (en) | Secure authentication of remote equipment | |
CN107172056A (en) | A kind of channel safety determines method, device, system, client and server | |
CN105553951A (en) | Data transmission method and data transmission device | |
EP3476078B1 (en) | Systems and methods for authenticating communications using a single message exchange and symmetric key | |
CN106656510A (en) | Encryption key acquisition method and system | |
CN107358441A (en) | Method, system and the mobile device and safety certificate equipment of payment verification | |
CN106576043A (en) | Virally distributable trusted messaging | |
JP2020530726A (en) | NFC tag authentication to remote servers with applications that protect supply chain asset management | |
CN105071935A (en) | Data processing method, heterogeneous system and integrated system | |
CN109891423A (en) | It is controlled using the data encryption of multiple control mechanisms | |
US9900296B2 (en) | Securing communication within a network endpoint | |
CN106302422A (en) | Business encryption and decryption method and device | |
CN107040536A (en) | Data ciphering method, device and system | |
CN110535641A (en) | Key management method and device, computer equipment and storage medium | |
CN109800588A (en) | Bar code dynamic encrypting method and device, bar code dynamic decryption method and device | |
CN115664659A (en) | Method, device, equipment and medium for supervising blockchain transaction data | |
CN107579964A (en) | Data transmission method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191115 |
|
RJ01 | Rejection of invention patent application after publication |