CN110457171A - A kind of embedded apparatus debugging method and system - Google Patents

A kind of embedded apparatus debugging method and system Download PDF

Info

Publication number
CN110457171A
CN110457171A CN201910731779.7A CN201910731779A CN110457171A CN 110457171 A CN110457171 A CN 110457171A CN 201910731779 A CN201910731779 A CN 201910731779A CN 110457171 A CN110457171 A CN 110457171A
Authority
CN
China
Prior art keywords
file
debug command
debugging
signature
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910731779.7A
Other languages
Chinese (zh)
Inventor
魏勇涛
赵树升
张军昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN201910731779.7A priority Critical patent/CN110457171A/en
Publication of CN110457171A publication Critical patent/CN110457171A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2205Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing using arrangements specific to the hardware being tested
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2273Test methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of embedded apparatus debugging method and systems, wherein this method comprises: receiving the debug command file FCS with signature of remote debugging equipment or local commissioning device transmission;The debug command file FCS of band signature is parsed to obtain the debug command in debug command file FC, and generates the implementing result file for executing the debug command;It is encrypted the implementing result file to obtain debugging result file;The debugging result file is sent to debugging end, can solve the problem of embedded device debugging is unable to satisfy demand for security in the related technology, debugging safety is ensure that, reduces operation difficulty.

Description

A kind of embedded apparatus debugging method and system
Technical field
The present invention relates to system debug fields, in particular to a kind of embedded apparatus debugging method and system.
Background technique
With the fast development of information technology, embedded device has been widely used the every aspect of production, life.Embedding While entering formula equipment fast development, user is using inevitably there is various problem, including human factor in device procedures Or equipment self reason etc..How accurately and effectively to solve the problems, such as to become embedded device factory in the case where ensuring information security The major issue that quotient faces.
Embedded device debugging in the related technology, usually equipment is actively connected to debugging server or equipment end is opened It is debugged for client connection debugging port.Fig. 1 is the flow chart of the embedded apparatus debugging method of basis in the related technology, As shown in Figure 1, comprising:
S101 establishes the two-way communication link between server based on WebSocket agreement;
S102 receives and executes the debugging instruction that the server is sent;
S103 will execute the implementing result that the debugging instruction obtains and be sent to the server, wherein is described to execute knot Fruit is used to indicate subsequent debugging operations.
Above-mentioned adjustment method is unable to satisfy the demand of existing secure context, deposits although can solve the demand debugged in real time The individual subscriber sensitive information leakage risk caused by equipment itself key message and network attack, it is convenient same providing debugging When, also give attacker's opportunity.Meanwhile the equipment for not being deployed in public network environment, behaviour can not be debugged or debug by existing Make the big problem of difficulty, can only by way of going on business field adjustable.
Aiming at the problem that debugging of embedded device in the related technology is unable to satisfy demand for security, solution is not yet proposed.
Summary of the invention
The embodiment of the invention provides a kind of embedded apparatus debugging method and systems, embedding in the related technology at least to solve Enter the problem of formula equipment debugging is unable to satisfy demand for security.
According to one embodiment of present invention, a kind of embedded device debugging system is provided, the system comprises: debugging End and debugged end, wherein
The debugging end, for obtaining the debug command file FCS with signature, the debug command file that the band is signed FCS is sent to debugged end;
The debugged end, the debug command file FCS for signing to the band are parsed to obtain debug command text Debug command in part FC generates the implementing result file for executing the debug command, the implementing result file is added It is close to obtain debugging result file, the debugging result file is directly returned to the debugging end.
Optionally, the debugging end is also used to be arranged in the case where outer net at the debugged end, the band is signed Debug command file FCS be transmitted directly to the debugged end;It is arranged in the case where private network at the debugged end, by institute It states the debug command file FCS with signature and is sent to the corresponding outer net in the debugged end, be transferred to by the outer net described The debugged end in private network.
Optionally, the system also includes:
Signature platform, the debug command file FC sent for receiving the debugging end, to the debug command text Part FC is signed to obtain the debug command file FCS of the band signature, and the debug command file FCS that the band is signed is returned Back to the debugging end.
Optionally, the signature platform is also used to calculate the cryptographic Hash of the debug command file FC, obtains described adjusted The corresponding private key P in end is tried, the cryptographic Hash of the debug command file FC is signed S and the debug command by the private key P File FC splices to obtain the debug command file FCS of the band signature.
Optionally, the debugged end is also used to obtain the debug command file FC by the public key U decryption FCS Cryptographic Hash sign S, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the private key P is with the public key U A pair of secret keys;
Judge whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
In the case where the judgment result is yes, the debug command file FCS of band signature is parsed to obtain described Debug command in debug command file FC, and generate the implementing result file FR.
Optionally, the debugged end is also used to generate symmetric key K at random and encrypts the implementing result file FR, Obtain encrypted implementing result file FRK;
The symmetric key K is encrypted by the public key U, obtains encrypted symmetric key UK;
The encrypted symmetric key UK and the encrypted implementing result file FRK are spliced, institute is generated State debugging result file FRUK.
Optionally, the debugging end, being also used to will be described encrypted symmetrical close in the debugging result file FRUK Key UK is sent to the signature platform;The symmetric key K returned according to the signature platform is to the encrypted execution Destination file FRK is decrypted, and obtains the implementing result file FR;
The signature platform is also used to carry out the encrypted symmetric key UK received by the private key P Decryption, obtains the symmetric key K, and the symmetric key K is returned to the debugging end.
According to another embodiment of the invention, a kind of embedded apparatus debugging method is additionally provided, comprising:
Obtain the debug command file FCS with signature;
The debug command file FCS that the band is signed is sent to the debugged end, wherein the debugging of the band signature Command file FCS, which is used to indicate the debugged end and is parsed to the debug command file FCS that the band is signed, to be debugged Debug command in command file FC, and the implementing result file for executing the debug command is generated, by the implementing result text Part is encrypted to obtain debugging result file;
Receive the debugging result file.
Optionally, the debug command file FCS that the band is signed is sent to the debugged end includes:
It is arranged in the case where outer net at debugged end, the debug command file FCS that the band is signed is transmitted directly to The debugged end;
It is arranged in the case where private network at the debugged end, the debug command file FCS that the band is signed is sent to The corresponding outer net in the debugged end, the debugged end in the private network is transferred to by the outer net.
Optionally, obtaining the debug command file FCS with signature includes:
The debug command file FC is sent to signature platform;
Receive the debug command file FCS for the band signature that the signature platform returns, wherein the tune of the band signature Trying command file FCS is obtained after the signature platform signs to the debug command file FC.
Optionally, after receiving the debugging result file, the method also includes:
Encrypted symmetric key UK in debugging result file FRUK is sent to the signature platform, wherein described Debugging result file FRUK is that the debugged end generates symmetric key K at random and encrypts the implementing result file FR, is obtained Encrypted implementing result file FRK;The symmetric key K is encrypted by public key U, obtains encrypted symmetric key UK;It will The encrypted symmetric key UK and encrypted implementing result file FRK carries out splicing generation;
The encrypted implementing result file FRK is carried out according to the symmetric key K that the signature platform returns Decryption, obtains the implementing result file FR, wherein the symmetric key K is that the signature platform is added by private key P to described What the symmetric key UK after close was decrypted, the private key P and the public key U are a pair of secret keys.
According to another embodiment of the invention, a kind of embedded apparatus debugging method is additionally provided, comprising:
Receive the debug command file FCS with signature;
The debug command file FCS of band signature is parsed to obtain the debug command in debug command file FC, And generate the implementing result file for executing the debug command;
It is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end.
Optionally, the debugging result file is sent to the debugging end includes:
The debugging result file is transmitted directly to debugging end;Alternatively,
The debugging result file is transferred to outer net, the debugging end is sent to by the outer net.
Optionally, the debug command file FCS of band signature is parsed to obtain the tune in debug command file FC Examination order, and generate and execute the implementing result file of the debug command and include:
The cryptographic Hash label of debug command file FC are obtained by the debug command file FCS that public key U decrypts the band signature Name S, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the debug command file FCS of the band signature is signature The cryptographic Hash of the debug command file FC is signed what the S and debug command file FC spliced by private key P by platform, The private key P and public key U is a pair of secret keys;
Judge whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
In the case where the judgment result is yes, the debug command file FCS of band signature is parsed to obtain described Debug command in debug command file FC, and generate the implementing result file FR for executing the debug command.
Optionally, encrypted the implementing result file to obtain the debugging result file include:
It is random to generate symmetric key K and encrypt the implementing result file FR, obtain encrypted implementing result file FRK;
The symmetric key K is encrypted by the public key U, obtains encrypted symmetric key UK;
The encrypted symmetric key UK and the encrypted implementing result file FRK are spliced, institute is generated State debugging result file FRUK.
According to another embodiment of the invention, a kind of embedded device debugging apparatus is additionally provided, comprising:
Module is obtained, for obtaining the debug command file FCS with signature;
First sending module, the debug command file FCS for the band to be signed are sent to the debugged end, In, the debug command file FCS of the band signature is used to indicate the debug command file that the debugged end signs to the band FCS is parsed to obtain the debug command in debug command file FC, and generates the implementing result text for executing the debug command Part is encrypted the implementing result file to obtain debugging result file;
First receiving module, for receiving the debugging result file.
Optionally, first sending module, is also used to
It is arranged in the case where outer net at debugged end, the debug command file FCS that the band is signed is transmitted directly to The debugged end;
It is arranged in the case where private network at the debugged end, the debug command file FCS that the band is signed is sent to The corresponding outer net in the debugged end, the debugged end in the private network is transferred to by the outer net.
Optionally, the acquisition module includes:
Transmission unit, for sending the debug command file FC to signature platform;
Receiving unit, for receiving the debug command file FCS for the band signature that the signature platform returns, wherein The debug command file FCS of the band signature is obtained after the signature platform signs to the debug command file FC 's.
Optionally, described device further include:
Second sending module, for the encrypted symmetric key UK in debugging result file FRUK to be sent to the label Name platform, wherein the debugging result file FRUK is that the debugged end generates symmetric key K at random and encrypts the execution Destination file FR obtains encrypted implementing result file FRK;The symmetric key K is encrypted by public key U, after obtaining encryption Symmetric key UK;The encrypted symmetric key UK and the encrypted implementing result file FRK are subjected to splicing life At;
Deciphering module, the symmetric key K for being returned according to the signature platform encrypted execute knot to described Fruit file FRK is decrypted, and obtains the implementing result file FR, wherein the symmetric key K is that the signature platform passes through The encrypted symmetric key UK is decrypted in private key P, and the private key P and the public key U are a pair of secret keys.
According to another embodiment of the invention, a kind of embedded device debugging apparatus is additionally provided, comprising:
Second receiving module, for receiving the debug command file FCS with signature;
Generation module, the debug command file FCS for signing to the band are parsed to obtain debug command file FC In debug command, and generate the implementing result file for executing the debug command;
Encrypting module, for being encrypted the implementing result file to obtain debugging result file;
Third sending module, for the debugging result file to be sent to debugging end.
Optionally, the third sending module, is also used to
The debugging result file is transmitted directly to debugging end;Alternatively,
The debugging result file is transferred to outer net, the debugging end is sent to by the outer net.
Optionally, the generation module includes:
Computing unit, the debug command file FCS for decrypting the band signature by public key U obtain debug command file The cryptographic Hash signature S of FC, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the debug command of the band signature File FCS is that signature platform passes through private key P for the cryptographic Hash signature S of the debug command file FC and the debug command file What FC spliced, the private key P and the public key U are a pair of secret keys;
Judging unit, for judging whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
First generation unit is used in the case where the judgment result is yes, to the debug command file FCS of band signature It is parsed to obtain the debug command in the debug command file FC, and generates the implementing result text for executing the debug command Part FR.
Optionally, the encrypting module includes:
First encryption unit, for generating symmetric key K at random and encrypting the implementing result file FR, after obtaining encryption Implementing result file FRK;
Second encryption unit obtains encrypted symmetric key for encrypting the symmetric key K by the public key U UK;
Second generation unit is used for the encrypted symmetric key UK and the encrypted implementing result file FRK is spliced, and the debugging result file FRUK is generated.
According to still another embodiment of the invention, a kind of storage medium is additionally provided, meter is stored in the storage medium Calculation machine program, wherein the computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
According to still another embodiment of the invention, a kind of electronic device, including memory and processor are additionally provided, it is described Computer program is stored in memory, the processor is arranged to run the computer program to execute any of the above-described Step in embodiment of the method.
Through the invention, the debug command file FCS with signature is received;To the debug command file FCS of band signature It is parsed to obtain the debug command in debug command file FC, and generates the implementing result file for executing the debug command; It is encrypted the implementing result file to obtain debugging result file;The debugging result file is returned into debugging end, it can To solve the problems, such as that embedded device debugging is unable to satisfy demand for security in the related technology, it ensure that debugging safety, reduce behaviour Make difficulty.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart according to embedded apparatus debugging method in the related technology;
Fig. 2 is a kind of hardware block diagram of the mobile terminal of embedded apparatus debugging method of the embodiment of the present invention;
Fig. 3 is a kind of flow chart one of embedded apparatus debugging method according to an embodiment of the present invention;
Fig. 4 is a kind of flowchart 2 of embedded apparatus debugging method according to an embodiment of the present invention;
Fig. 5 is the block diagram of embedded device debugging system according to an embodiment of the present invention;
Fig. 6 is the schematic diagram of embedded device debugging system according to an embodiment of the present invention;
Fig. 7 is the flow chart one of embedded device remote debugging according to an embodiment of the present invention;
Fig. 8 is the flowchart 2 of embedded device remote debugging according to an embodiment of the present invention;
Fig. 9 is the block diagram one of embedded device debugging apparatus according to an embodiment of the present invention;
Figure 10 is the block diagram two of embedded device debugging apparatus according to an embodiment of the present invention.
Specific embodiment
Hereinafter, the present invention will be described in detail with reference to the accompanying drawings and in combination with Examples.It should be noted that not conflicting In the case of, the features in the embodiments and the embodiments of the present application can be combined with each other.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.
Embodiment of the method provided by the embodiment of the present application one can be in mobile terminal, terminal or similar fortune It calculates and is executed in device.For running on mobile terminals, Fig. 2 is a kind of embedded apparatus debugging method of the embodiment of the present invention Mobile terminal hardware block diagram, as shown in Fig. 2, mobile terminal 10 may include one or more (only showing one in Fig. 2 It is a) (processor 102 can include but is not limited to the processing of Micro-processor MCV or programmable logic device FPGA etc. to processor 102 Device) and memory 104 for storing data, optionally, above-mentioned mobile terminal can also include the biography for communication function Transfer device 106 and input-output equipment 108.It will appreciated by the skilled person that structure shown in Fig. 2 is only to show Meaning, does not cause to limit to the structure of above-mentioned mobile terminal.For example, mobile terminal 10 may also include it is more than shown in Fig. 2 Perhaps less component or with the configuration different from shown in Fig. 2.
Memory 104 can be used for storing computer program, for example, the software program and module of application software, such as this hair The corresponding computer program of message method of reseptance in bright embodiment, processor 102 are stored in memory 104 by operation Computer program realizes above-mentioned method thereby executing various function application and data processing.Memory 104 may include High speed random access memory, may also include nonvolatile memory, as one or more magnetic storage device, flash memory or its His non-volatile solid state memory.In some instances, memory 104 can further comprise remotely setting relative to processor 102 The memory set, these remote memories can pass through network connection to mobile terminal 10.The example of above-mentioned network includes but not It is limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include The wireless network that the communication providers of mobile terminal 10 provide.In an example, transmitting device 106 includes a Network adaptation Device (Network Interface Controller, referred to as NIC), can be connected by base station with other network equipments to It can be communicated with internet.In an example, transmitting device 106 can for radio frequency (Radio Frequency, referred to as RF) module is used to wirelessly be communicated with internet.
A kind of embedded device debugging side for running on above-mentioned mobile terminal or the network architecture is provided in the present embodiment Method, Fig. 3 is a kind of flow chart one of embedded apparatus debugging method according to an embodiment of the present invention, as shown in figure 3, the process packet Include following steps:
Step S302 receives the debug command file FCS with signature;
Step S304 is parsed to obtain in debug command file FC to the debug command file FCS of band signature Debug command, and generate the implementing result file for executing the debug command;
Step S306 is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end by step S308.
S302 to S308 through the above steps receives the debug command file FCS with signature;Debugging to band signature Command file FCS is parsed to obtain the debug command in debug command file FC, and is generated and executed holding for the debug command Row destination file;It is encrypted the implementing result file to obtain debugging result file;The debugging result file is returned Debugging end is given, can solve the problem of embedded device debugging is unable to satisfy demand for security in the related technology, ensure that debugging peace Quan Xing, operation difficulty is reduced.
Outer net in present example can be internet, and even debugged apparatus is deployed in outer net and can directly couple mutually Networking, Intranet or private network can be local area network, refer in the geographic range of a part, by various computers, external equipment and Database etc. links up mutually the computer communication network of composition, if debugged apparatus is deployed in Intranet, jumps the file of section transmission It cannot be transmitted directly to debugged end, the corresponding outer net of Intranet can only be sent to, then file is transferred to the quilt of Intranet from outer net End is debugged, the file at debugged end is wanted to be sent to debugging end, after needing the file of Intranet being transferred to outer net, ability It is sent to debugging end.
In the embodiment of the present invention, above-mentioned deployment S208 be can specifically include:, will be described when debugged end is deployed on outer net Debugging result file is transmitted directly to debugging end;When debugged end is deployed on Intranet or private network, by the debugging result file It is transferred to outer net, the debugging end is sent to by the outer net.It can solve in the related technology for being deployed in setting for Intranet The standby problem that can not be debugged or debugging difficulty is big, no matter deployed with devices is in Intranet or outer net, simple and convenient can complete to set Standby debugging operations, are intervened without professional.
In the embodiment of the present invention, above-mentioned steps S304 be can specifically include:
Debug command file is obtained by the debug command file FCS that public key U corresponding with private key P decrypts the band signature The cryptographic Hash signature S of FC, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the debug command of the band signature File FCS is that signature server will pass through private key P to the cryptographic Hash signature S of the debug command file FC and the debug command File FC splices;
Judge whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
In the case where the judgment result is yes, the debug command file FCS of the band signature is parsed to obtain debugging life The debug command in file FC is enabled, and generates the implementing result file FR for executing the debug command.
In the embodiment of the present invention, above-mentioned steps S306 be can specifically include:
It is random to generate symmetric key K and encrypt the implementing result file FR, obtain encrypted implementing result file FRK;
The symmetric key K is encrypted by public key U corresponding with the private key P, obtains encrypted symmetric key UK;
The encrypted symmetric key UK and the encrypted implementing result file FRK are spliced, institute is generated State debugging result file FRUK.
The embodiment of the present invention, additionally provides a kind of embedded apparatus debugging method, and Fig. 4 is according to an embodiment of the present invention one The flowchart 2 of kind embedded apparatus debugging method, as shown in figure 4, the process includes the following steps:
Step S402 obtains the debug command file FCS with signature;
The debug command file FCS that the band is signed is sent to the debugged end, wherein the band by step S404 The debug command file FCS of signature is used to indicate the debugged end and solves to the debug command file FCS that the band is signed Analysis obtains the debug command in debug command file FC, and generates the implementing result file for executing the debug command, will be described Implementing result file is encrypted to obtain debugging result file;
Step S406 receives the debugging result file.
Through the invention, the debug command file FCS with signature is obtained;The debug command file FCS that the band is signed It is sent to the debugged end, wherein the debug command file FCS of the band signature is used to indicate the debugged end and parses To the debug command in debug command file FC, and the implementing result file for executing the debug command is generated, by the execution Destination file is encrypted to obtain debugging result file;The debugging result file is received, can solve and be embedded in the related technology The problem of formula equipment debugging is unable to satisfy demand for security ensure that debugging safety, reduce operation difficulty.
In the embodiment of the present invention, above-mentioned steps S404 be can specifically include:
It is arranged in the case where outer net at debugged end, the debug command file FCS that the band is signed is transmitted directly to The debugged end;
It is arranged in the case where private network at the debugged end, the debug command file FCS that the band is signed is sent to The corresponding outer net in the debugged end, the debugged end in the private network is transferred to by the outer net.
In the embodiment of the present invention, above-mentioned steps S402 be can specifically include:
The debug command file FC is sent to signature platform;
Receive the debug command file FCS for the band signature that the signature platform returns, wherein the tune of the band signature Trying command file FCS is obtained after the signature platform signs to the debug command file FC.
The embodiment of the present invention, after receiving the debugging result file, after the encryption in debugging result file FRUK Symmetric key UK be sent to the signature platform, wherein the debugging result file FRUK is that the debugged end is given birth at random At symmetric key K and the implementing result file FR is encrypted, obtains encrypted implementing result file FRK;It is encrypted by public key U The symmetric key K obtains encrypted symmetric key UK;The encrypted symmetric key UK encrypted is held with described Row destination file FRK carries out splicing generation;The symmetric key K returned according to the signature platform is to described encrypted Implementing result file FRK is decrypted, and obtains the implementing result file FR, wherein the symmetric key K is that the signature is flat Platform is decrypted the encrypted symmetric key UK by private key P, and the private key P and the public key U are a pair Key.
The embodiment of the present invention, provides a kind of embedded device debugging system, and Fig. 5 is insertion according to an embodiment of the present invention The block diagram of formula equipment debugging system, as shown in figure 5, the system comprises: the system comprises: debugging end 52 and debugged end 54, wherein
The debugging end 52, for obtaining the debug command file FCS with signature, the debug command that the band is signed is literary Part FCS is sent to debugged end 54;
The debugged end 54, the debug command file FCS for signing to the band are parsed to obtain debug command Debug command in file FC generates the implementing result file for executing the debug command, and the implementing result file is carried out Encryption obtains debugging result file, and the debugging result file is directly returned to the debugging end 52.
Optionally, the debugging end 52 is also used to be arranged in the case where outer net at the debugged end 54, by the band The debug command file FCS of signature is transmitted directly to the debugged end 54;At the debugged end 54, the feelings of private network are set Under condition, the debug command file FCS that the band is signed is sent to the corresponding outer net in the debugged end 54, passes through the outer net It is transferred to the debugged end 54 in the private network.
Optionally, the system also includes:
Signature platform, the debug command file FC sent for receiving the debugging end 52, to the debug command File FC is signed to obtain the debug command file FCS of the band signature, and the debug command file FCS that the band is signed Return to the debugging end 52.
Optionally, the signature platform is also used to calculate the cryptographic Hash of the debug command file FC, obtains described adjusted The corresponding private key P in end 54 is tried, is ordered the cryptographic Hash signature S of the debug command file FC and the debugging by the private key P File FC is enabled to splice to obtain the debug command file FCS of the band signature.
Optionally, the debugged end 54 is also used to obtain the debug command file by the public key U decryption FCS The cryptographic Hash signature S of FC, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the private key P and public key U For a pair of secret keys;
Judge whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
In the case where the judgment result is yes, the debug command file FCS of band signature is parsed to obtain described Debug command in debug command file FC, and generate the implementing result file FR.
Optionally, the debugged end 54 is also used to generate symmetric key K at random and encrypts the implementing result file FR obtains encrypted implementing result file FRK;
The symmetric key K is encrypted by the public key U, obtains encrypted symmetric key UK;
The encrypted symmetric key UK and the encrypted implementing result file FRK are spliced, institute is generated State debugging result file FRUK.
Optionally, the debugging end 52, being also used to will be described encrypted symmetrical in the debugging result file FRUK Key UK is sent to the signature platform;It encrypted is held according to the symmetric key K that the signature platform returns to described Row destination file FRK is decrypted, and obtains the implementing result file FR;
The signature platform is also used to carry out the encrypted symmetric key UK received by the private key P Decryption, obtains the symmetric key K, and the symmetric key K is returned to the debugging end 52.
It as signature server, debugged end include below debugged set so as to debug end be remote debugging equipment, signature platform The embodiment of the present invention is illustrated for standby and local commissioning device.
The embodiment of the present invention is based on the credible running environment of equipment end, passes through the machines such as login authentication, trusted signature, symmetric cryptography System guarantees debugging safety, reduces operation difficulty.Fig. 6 is the signal of embedded device debugging system according to an embodiment of the present invention Figure, as shown in Figure 6, comprising: remote debugging equipment, local commissioning device, debugged apparatus and signature server, wherein institute It states remote debugging equipment to connect with the local commissioning device, the debugged apparatus, signature server respectively, the local tune Examination equipment is connect with the debugged apparatus, for the function of remote debugging equipment, local commissioning device and debugged apparatus With shown in Fig. 5, signature server is to FC file signature, specifically, the cryptographic Hash of debug command file FC is calculated, according to debugged The number of equipment obtains corresponding private key P, is signed using cryptographic Hash of the private key P to FC, and by cryptographic Hash signature S splicing FC it After obtain FCS.The tail portion UK for receiving the debugging result file FRUK that remote debugging equipment is sent, by private key P to encrypted Symmetric key UK is decrypted, and obtains the symmetric key K, and symmetric key K is returned to the remote debugging equipment.
Debugged apparatus in the embodiment of the present invention is arranged in the case where private network or Intranet, and Fig. 7 is real according to the present invention The flow chart one of the embedded device remote debugging of example is applied, as shown in fig. 7, comprises:
Step S1, remote debugging equipment send debug command file FC to signature server (or signature platform), specifically, Commissioning staff is written in file FC in remote debugging equipment according to debugged apparatus problem or phenomenon configuration debug command, it This document company's signature server is submitted to afterwards to sign;
Step S2, signature server is to FC file signature;Specifically, the maintenance of company's signature server has plant correspondence out Public private key pair is mapped by number.After receiving FC file, this document Hash is calculated first, is compiled later according to equipment is corresponding It number obtains and private key P and to sign to Hash, obtain signature result S splicing and return to remote debugging equipment after file FC.
In above-mentioned steps S2, signature server can specifically include debugging command file FC signature:
S21 calculates the cryptographic Hash of debug command file FC;
S22 obtains corresponding private key P according to the number of debugged apparatus;
S23 is signed using cryptographic Hash of the private key P to FC, and cryptographic Hash signature S splicing is obtained FCS after FC.
Step S3 returns to the debug command file FCS with signature to remote debugging equipment, and remote debugging equipment passes through local FCS is sent to debugged apparatus by commissioning device, specifically, commissioning staff takes signed debug command file FCS after, due to FCS is then sent to on-site technical support or user in Intranet by deployed with devices, by passing through after technical support or user's beaching accommodation Debugging services upload to equipment;
Step S4 after debugged apparatus receives the debug command file FCS with signature, executes the debug command in FCS, tool Body the following steps are included:
S41, using public key U decryption tail of file signature S (corresponding with private key P) and calculation document FC (does not include tail portion to sign Name) Hash;
S42, matching decrypted result S and file Hash S1, if mismatching, refusal is parsed and is unsuccessfully returned;If matching executes Step S43;
S43, parsing, which executes, orders in file FC and generates final result FR.
S44, equipment, which generates symmetric key K at random and encrypts command execution results FR, later obtains FRK;
S45 generates final debugging result text using equipment public key U encrypted symmetric key K splicing after ciphertext result FRK Part FRUK.
Step S5 returns to debugging result file FRUK, and debugging result file is sent to local commissioning device, local to debug Debugging result file is sent to remote debugging equipment by equipment, specifically, since debugged apparatus is Intranet deployment, export Remote debugging equipment is transmitted to by local commissioning device afterwards, i.e., commissioning staff's forwarding is transmitted to by technical support/user;
Step S6, commissioning staff send Digital signature service for debugging result file FRUK tail portion UK by remote debugging equipment Device;
Step S7, signature server obtain symmetric cryptographic key K using device private P decryption;
Symmetric cryptographic key K is returned to remote debugging equipment by step S8;
Step S9, remote debugging equipment obtain plaintext result FR using symmetric cryptographic key K decryption ciphertext debugging result FRK And it is analyzed.
Debugged apparatus in the embodiment of the present invention is arranged in the case where public network, and Fig. 8 is according to an embodiment of the present invention The flowchart 2 of embedded device remote debugging, as shown in Figure 8, comprising:
Step S1, remote debugging equipment send debug command file FC to signature server, and specifically, commissioning staff is remote On journey commissioning device, according in debugged apparatus problem or phenomenon configuration debug command write-in file FC, this document is mentioned later The company signature server of being sent to is signed;
Step S2, signature server is to FC file signature;Specifically, the maintenance of company's signature server has plant correspondence out Public private key pair is mapped by number.After receiving FC file, this document Hash is calculated first, is compiled later according to equipment is corresponding It number obtains and private key P and to sign to Hash, obtain signature result S splicing and return to remote debugging equipment after file FC.
In above-mentioned steps S2, signature server can specifically include debugging command file FC signature:
S21 calculates the cryptographic Hash of debug command file FC;
S22 obtains corresponding private key P according to the number of debugged apparatus;
S23 is signed using cryptographic Hash of the private key P to FC, and cryptographic Hash signature S splicing is obtained FCS after FC.
Step S3 returns to the debug command file FCS with signature to remote debugging equipment, and remote debugging equipment passes through local FCS is sent to debugged apparatus by commissioning device, specifically, commissioning staff takes signed debug command file FCS after, directly FCS is uploaded to equipment by debugging services by beaching accommodation;
Step S4 after debugged apparatus receives the debug command file FCS with signature, executes the debug command in FCS, tool Body the following steps are included:
S41, using public key U decryption tail of file signature S (corresponding with private key P) and calculation document FC (does not include tail portion to sign Name) Hash;
S42, matching decrypted result S and file Hash S1, if mismatching, refusal is parsed and is unsuccessfully returned;If matching executes Step S43;
S43, parsing, which executes, orders in file FC and generates final result FR.
S44, equipment, which generates symmetric key K at random and encrypts command execution results FR, later obtains FRK;
S45 generates final debugging result text using equipment public key U encrypted symmetric key K splicing after ciphertext result FRK Part FRUK.
Step S5 returns to debugging result file FRUK, debugging result file is directly sent to remote debugging equipment;
Step S6, commissioning staff send Digital signature service for debugging result file FRUK tail portion UK by remote debugging equipment Device;
Step S7, signature server obtain symmetric cryptographic key K using device private P decryption;
Symmetric cryptographic key K is returned to remote debugging equipment by step S8;
Step S9, remote debugging equipment obtain plaintext result FR using symmetric cryptographic key K decryption ciphertext debugging result FRK And it is analyzed.
By above-mentioned debud mode, debugging services/safe operation is credible, and attacker can not be obtained sensitive by debugging services Information or malicious operation equipment, lifting means safety;Debugging result encryption, attacker can not by sniff, the modes such as steal Debugging result information is obtained, information leakage is avoided;No matter deployed with devices, can simple and convenient completion equipment in public network or Intranet Debugging operations are intervened without professional, solve the problems, such as that the debugging embedded equipment of telesecurity is difficult.
The embodiment of the present invention, additionally provides a kind of embedded device debugging apparatus, and Fig. 9 is according to an embodiment of the present invention embedding Enter the block diagram one of formula equipment debugging device, as shown in Figure 9, comprising:
Module 92 is obtained, for obtaining the debug command file FCS with signature;
First sending module 94, the debug command file FCS for the band to be signed are sent to the debugged end, In, the debug command file FCS of the band signature is used to indicate the debug command file that the debugged end signs to the band FCS is parsed to obtain the debug command in debug command file FC, and generates the implementing result text for executing the debug command Part is encrypted the implementing result file to obtain debugging result file;
First receiving module 96, for receiving the debugging result file.
Optionally, first sending module 94, is also used to
It is arranged in the case where outer net at debugged end, the debug command file FCS that the band is signed is transmitted directly to The debugged end;
It is arranged in the case where private network at the debugged end, the debug command file FCS that the band is signed is sent to The corresponding outer net in the debugged end, the debugged end in the private network is transferred to by the outer net.
Optionally, the acquisition module 92 includes:
Transmission unit, for sending the debug command file FC to signature platform;
Receiving unit, for receiving the debug command file FCS for the band signature that the signature platform returns, wherein The debug command file FCS of the band signature is obtained after the signature platform signs to the debug command file FC 's.
Optionally, described device further include:
Second sending module, for the encrypted symmetric key UK in debugging result file FRUK to be sent to the label Name platform, wherein the debugging result file FRUK is that the debugged end generates symmetric key K at random and encrypts the execution Destination file FR obtains encrypted implementing result file FRK;The symmetric key K is encrypted by public key U, after obtaining encryption Symmetric key UK;The encrypted symmetric key UK and the encrypted implementing result file FRK are subjected to splicing life At;
Deciphering module, the symmetric key K for being returned according to the signature platform encrypted execute knot to described Fruit file FRK is decrypted, and obtains the implementing result file FR, wherein the symmetric key K is that the signature platform passes through The encrypted symmetric key UK is decrypted in private key P, and the private key P and the public key U are a pair of secret keys.
The embodiment of the present invention, additionally provides a kind of embedded device debugging apparatus, and Figure 10 is according to an embodiment of the present invention The block diagram two of embedded device debugging apparatus, as shown in Figure 10, comprising:
Second receiving module 102, for receiving the debug command file FCS with signature;
Generation module 104, the debug command file FCS for signing to the band are parsed to obtain debug command file Debug command in FC, and generate the implementing result file for executing the debug command;
Encrypting module 106, for being encrypted the implementing result file to obtain debugging result file;
Third sending module 108, for the debugging result file to be sent to debugging end.
Optionally, the third sending module 108, is also used to
The debugging result file is transmitted directly to debugging end;Alternatively,
The debugging result file is transferred to outer net, the debugging end is sent to by the outer net.
Optionally, the generation module 104 includes:
Computing unit, the debug command file FCS for decrypting the band signature by public key U obtain debug command file The cryptographic Hash signature S of FC, and calculate the cryptographic Hash S1 of the debug command file FC, wherein the debug command of the band signature File FCS is that signature platform passes through private key P for the cryptographic Hash signature S of the debug command file FC and the debug command file What FC spliced, the private key P and the public key U are a pair of secret keys;
Judging unit, for judging whether the cryptographic Hash signature S matches with the cryptographic Hash S1;
First generation unit is used in the case where the judgment result is yes, to the debug command file FCS of band signature It is parsed to obtain the debug command in the debug command file FC, and generates the implementing result text for executing the debug command Part FR.
Optionally, the encrypting module 106 includes:
First encryption unit, for generating symmetric key K at random and encrypting the implementing result file FR, after obtaining encryption Implementing result file FRK;
Second encryption unit obtains encrypted symmetric key for encrypting the symmetric key K by the public key U UK;
Second generation unit is used for the encrypted symmetric key UK and the encrypted implementing result file FRK is spliced, and the debugging result file FRUK is generated.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong Following manner realization is crossed, but not limited to this: above-mentioned module is respectively positioned in same processor;Alternatively, above-mentioned modules are with any Combined form is located in different processors.
The embodiments of the present invention also provide a kind of storage medium, computer program is stored in the storage medium, wherein The computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
Optionally, in the present embodiment, above-mentioned storage medium can be set to store by executing based on following steps Calculation machine program:
S11 receives the debug command file FCS with signature;
S12 is parsed to obtain the life of the debugging in debug command file FC to the debug command file FCS of band signature It enables, and generates the implementing result file for executing the debug command;
S13 is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end by S14.
Optionally, in the present embodiment, above-mentioned storage medium may be also configured to store for executing following steps Computer program:
S21 obtains the debug command file FCS with signature;
The debug command file FCS that the band is signed is sent to the debugged end by S22, wherein the band signature Debug command file FCS is used to indicate the debugged end and is parsed to obtain to the debug command file FCS that the band is signed Debug command in debug command file FC, and the implementing result file for executing the debug command is generated, knot is executed by described Fruit file is encrypted to obtain debugging result file;
S23 receives the debugging result file.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (Read- Only Memory, referred to as ROM), it is random access memory (Random Access Memory, referred to as RAM), mobile hard The various media that can store computer program such as disk, magnetic or disk.
The embodiments of the present invention also provide a kind of electronic device, including memory and processor, stored in the memory There is computer program, which is arranged to run computer program to execute the step in any of the above-described embodiment of the method Suddenly.
Optionally, above-mentioned electronic device can also include transmission device and input-output equipment, wherein the transmission device It is connected with above-mentioned processor, which connects with above-mentioned processor.
Optionally, in the present embodiment, above-mentioned processor can be set to execute following steps by computer program:
S11 receives the debug command file FCS with signature;
S12 is parsed to obtain the life of the debugging in debug command file FC to the debug command file FCS of band signature It enables, and generates the implementing result file for executing the debug command;
S13 is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end by S14.
Optionally, in the present embodiment, above-mentioned processor may be also configured to execute following step by computer program It is rapid:
S21 obtains the debug command file FCS with signature;
The debug command file FCS that the band is signed is sent to the debugged end by S22, wherein the band signature Debug command file FCS is used to indicate the debugged end and is parsed to obtain to the debug command file FCS that the band is signed Debug command in debug command file FC, and the implementing result file for executing the debug command is generated, knot is executed by described Fruit file is encrypted to obtain debugging result file;
S23 receives the debugging result file.
Optionally, the specific example in the present embodiment can be with reference to described in above-described embodiment and optional embodiment Example, details are not described herein for the present embodiment.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with general Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored It is performed by computing device in the storage device, and in some cases, it can be to be different from shown in sequence execution herein Out or description the step of, perhaps they are fabricated to each integrated circuit modules or by them multiple modules or Step is fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific hardware and softwares to combine.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.It is all within principle of the invention, it is made it is any modification, etc. With replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (17)

1. a kind of embedded device debugging system, which is characterized in that the system comprises: debugging end and debugged end, wherein
The debug command file that the band is signed is sent to by the debugging end for obtaining the debug command file with signature Debugged end;
The debugged end, the debug command file for signing to the band are parsed to obtain the tune in debug command file Examination order, generates the implementing result file for executing the debug command, the implementing result file is encrypted and is debugged The debugging result file is returned to the debugging end by destination file.
2. system according to claim 1, which is characterized in that
The debugging end is also used to be arranged in the case where outer net at the debugged end, the debug command that the band is signed File is transmitted directly to the debugged end;It is arranged in the case where private network at the debugged end, the tune that the band is signed Examination command file is sent to the corresponding outer net in the debugged end, described is adjusted by what the outer net was transferred in the private network Try end.
3. system according to claim 1, which is characterized in that the system also includes:
Platform of signing carries out the debug command file for receiving the debug command file of debugging end transmission Signature obtains the debug command file of the band signature, and the debug command file that the band is signed is returned to the debugging End.
4. system according to claim 3, which is characterized in that
The signature platform is also used to calculate the cryptographic Hash of the debug command file, obtains the corresponding private in the debugged end The cryptographic Hash signature of the debug command file is spliced to obtain the band by key by the private key with the debug command file The debug command file of signature.
5. system according to claim 4, which is characterized in that
The debugged end is also used to obtain the debug command text by the debug command file with signature described in public key decryptions The cryptographic Hash of part signs and calculates the cryptographic Hash of the debug command file, wherein the private key is a pair of close with the public key Key;
Judge whether the cryptographic Hash signature matches with the cryptographic Hash;
In the case where the judgment result is yes, the debug command file of band signature is parsed to obtain the debug command Debug command in file, and generate the implementing result file.
6. system according to claim 5, which is characterized in that
The debugged end is also used to generate symmetric key at random and encrypts the implementing result file, obtains encrypted hold Row destination file;
By symmetric key described in the public key encryption, encrypted symmetric key is obtained;
The encrypted symmetric key and the encrypted implementing result file are spliced, the debugging result is generated File.
7. system according to claim 6, which is characterized in that
The debugging end is also used to the encrypted symmetric key in the debugging result file being sent to the signature Platform;The encrypted implementing result file is decrypted according to the symmetric key that the signature platform returns, is obtained To the implementing result file;
The signature platform is also used to that the encrypted symmetric key received is decrypted by the private key, obtains The debugging end is returned to the symmetric key, and by the symmetric key.
8. a kind of embedded apparatus debugging method characterized by comprising
Obtain the debug command file with signature;
The debug command file that the band is signed is sent to debugged end, wherein the debug command file of the band signature is used The debug command file that the band is signed is parsed to obtain the debugging in debug command file in the instruction debugged end Order generates the implementing result file for executing the debug command, and the implementing result file is encrypted to obtain debugging knot Fruit file;
Receive the debugging result file.
9. according to the method described in claim 8, being adjusted it is characterized in that, the debug command file that the band is signed is sent to Examination end includes:
It is arranged in the case where outer net at the debugged end, the debug command file that the band is signed is transmitted directly to described Debugged end;
It is arranged in the case where private network at the debugged end, the debug command file that the band is signed is sent to described adjusted The corresponding outer net in end is tried, the debugged end in the private network is transferred to by the outer net.
10. according to the method described in claim 8, it is characterized in that, debug command file of the acquisition with signature includes:
The debug command file is sent to signature platform;
Receive the debug command file for the band signature that the signature platform returns, wherein the debug command of the band signature File is obtained after the signature platform signs to the debug command file.
11. according to the method described in claim 10, it is characterized in that, after receiving the debugging result file, the side Method further include:
Encrypted symmetric key in debugging result file is sent to the signature platform, wherein the debugging result text Part is that the debugged end generates symmetric key at random and encrypts the implementing result file, obtains encrypted implementing result text Part;By symmetric key described in public key encryption, encrypted symmetric key is obtained;By the encrypted symmetric key with it is described Encrypted implementing result file carries out splicing generation;
The encrypted implementing result file is decrypted according to the symmetric key that the signature platform returns, is obtained The implementing result file, wherein the symmetric key is that the signature platform passes through private key to described encrypted symmetrical close What key was decrypted, the private key and the public key are a pair of secret keys.
12. a kind of embedded apparatus debugging method characterized by comprising
Receive the debug command file with signature;
The debug command file of band signature is parsed to obtain the debug command in debug command file, and generates execution The implementing result file of the debug command;
It is encrypted the implementing result file to obtain debugging result file;
The debugging result file is sent to debugging end.
13. according to the method for claim 12, which is characterized in that the debugging result file is sent to the debugging end Include:
The debugging result file is transmitted directly to debugging end;Alternatively,
The debugging result file is transferred to outer net, the debugging end is sent to by the outer net.
14. according to the method for claim 12, which is characterized in that parsed to the debug command file of band signature The debug command in debug command file is obtained, and is generated and is executed the implementing result file of the debug command and include:
The cryptographic Hash signature of debug command file is obtained by the debug command file with signature described in public key decryptions, and calculates institute State the cryptographic Hash of debug command file, wherein the debug command file of the band signature is that signature platform will be described by private key What the cryptographic Hash signature of debug command file spliced with the debug command file, the private key and the public key are a pair Key;
Judge whether the cryptographic Hash signature matches with the cryptographic Hash;
In the case where the judgment result is yes, the debug command file of band signature is parsed to obtain the debug command Debug command in file, and generate the implementing result file for executing the debug command.
15. according to the method for claim 14, which is characterized in that encrypted to obtain by the implementing result file described Debugging result file includes:
It is random to generate symmetric key and encrypt the implementing result file, obtain encrypted implementing result file;
By symmetric key described in the public key encryption, encrypted symmetric key is obtained;
The encrypted symmetric key and the encrypted implementing result file are spliced, the debugging result is generated File.
16. a kind of storage medium, which is characterized in that be stored with computer program in the storage medium, wherein the computer Program is arranged to execute method described in the claim 8 to 11,12 to 15 any one when operation.
17. a kind of electronic device, including memory and processor, which is characterized in that be stored with computer journey in the memory Sequence, the processor are arranged to run the computer program to execute the claim 8 to 11, in 12 to 15 any one The method.
CN201910731779.7A 2019-08-08 2019-08-08 A kind of embedded apparatus debugging method and system Pending CN110457171A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910731779.7A CN110457171A (en) 2019-08-08 2019-08-08 A kind of embedded apparatus debugging method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910731779.7A CN110457171A (en) 2019-08-08 2019-08-08 A kind of embedded apparatus debugging method and system

Publications (1)

Publication Number Publication Date
CN110457171A true CN110457171A (en) 2019-11-15

Family

ID=68485488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910731779.7A Pending CN110457171A (en) 2019-08-08 2019-08-08 A kind of embedded apparatus debugging method and system

Country Status (1)

Country Link
CN (1) CN110457171A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407434A (en) * 2020-03-16 2021-09-17 腾讯科技(深圳)有限公司 Processing method and device for debugging file

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656962A (en) * 2009-06-12 2010-02-24 中兴通讯股份有限公司 Method and system for debugging equipment based on wireless local area network security foundation structure
CN105635147A (en) * 2015-12-30 2016-06-01 深圳市图雅丽特种技术有限公司 Vehicle-mounted-special-equipment-system-based secure data transmission method and system
CN106708489A (en) * 2015-11-17 2017-05-24 杭州海康威视数字技术股份有限公司 Debugging method and system of equipment
CN106878016A (en) * 2017-04-27 2017-06-20 上海木爷机器人技术有限公司 Data is activation, method of reseptance and device
CN107800791A (en) * 2017-10-24 2018-03-13 海信集团有限公司 A kind of method and apparatus debugged
CN108958768A (en) * 2018-06-26 2018-12-07 浪潮(北京)电子信息产业有限公司 A kind of GPU firmware update, device, equipment and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656962A (en) * 2009-06-12 2010-02-24 中兴通讯股份有限公司 Method and system for debugging equipment based on wireless local area network security foundation structure
CN106708489A (en) * 2015-11-17 2017-05-24 杭州海康威视数字技术股份有限公司 Debugging method and system of equipment
CN105635147A (en) * 2015-12-30 2016-06-01 深圳市图雅丽特种技术有限公司 Vehicle-mounted-special-equipment-system-based secure data transmission method and system
CN106878016A (en) * 2017-04-27 2017-06-20 上海木爷机器人技术有限公司 Data is activation, method of reseptance and device
CN107800791A (en) * 2017-10-24 2018-03-13 海信集团有限公司 A kind of method and apparatus debugged
CN108958768A (en) * 2018-06-26 2018-12-07 浪潮(北京)电子信息产业有限公司 A kind of GPU firmware update, device, equipment and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
庞辽军等: "信息安全工程", 西安电子科技大学出版社, pages: 111 - 112 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407434A (en) * 2020-03-16 2021-09-17 腾讯科技(深圳)有限公司 Processing method and device for debugging file

Similar Documents

Publication Publication Date Title
US8788802B2 (en) Constrained cryptographic keys
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN101300806B (en) System and method for processing secure transmissions
US11277444B2 (en) System-on-chip for performing virtual private network function and system including the same
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
CN101409619B (en) Flash memory card and method for implementing virtual special network key exchange
CN107294937A (en) Data transmission method, client and server based on network service
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
US11736304B2 (en) Secure authentication of remote equipment
CN107172056A (en) A kind of channel safety determines method, device, system, client and server
CN105553951A (en) Data transmission method and data transmission device
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN106656510A (en) Encryption key acquisition method and system
CN107358441A (en) Method, system and the mobile device and safety certificate equipment of payment verification
CN106576043A (en) Virally distributable trusted messaging
JP2020530726A (en) NFC tag authentication to remote servers with applications that protect supply chain asset management
CN105071935A (en) Data processing method, heterogeneous system and integrated system
CN109891423A (en) It is controlled using the data encryption of multiple control mechanisms
US9900296B2 (en) Securing communication within a network endpoint
CN106302422A (en) Business encryption and decryption method and device
CN107040536A (en) Data ciphering method, device and system
CN110535641A (en) Key management method and device, computer equipment and storage medium
CN109800588A (en) Bar code dynamic encrypting method and device, bar code dynamic decryption method and device
CN115664659A (en) Method, device, equipment and medium for supervising blockchain transaction data
CN107579964A (en) Data transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191115

RJ01 Rejection of invention patent application after publication