CN112214415B - Trusted management method for executable files of airborne embedded system - Google Patents

Trusted management method for executable files of airborne embedded system Download PDF

Info

Publication number
CN112214415B
CN112214415B CN202011215012.8A CN202011215012A CN112214415B CN 112214415 B CN112214415 B CN 112214415B CN 202011215012 A CN202011215012 A CN 202011215012A CN 112214415 B CN112214415 B CN 112214415B
Authority
CN
China
Prior art keywords
information
file
abstract
list
curing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011215012.8A
Other languages
Chinese (zh)
Other versions
CN112214415A (en
Inventor
戴小氐
郝玉锴
牛玥瑶
孙志颖
吴姣
朱文斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Aeronautics Computing Technique Research Institute of AVIC
Original Assignee
Xian Aeronautics Computing Technique Research Institute of AVIC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Aeronautics Computing Technique Research Institute of AVIC filed Critical Xian Aeronautics Computing Technique Research Institute of AVIC
Priority to CN202011215012.8A priority Critical patent/CN112214415B/en
Publication of CN112214415A publication Critical patent/CN112214415A/en
Application granted granted Critical
Publication of CN112214415B publication Critical patent/CN112214415B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3608Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a trusted management method for executable files of an airborne embedded system, which comprises the following steps: when an executable file of the airborne embedded software is put in storage, an upper computer end generates a first information abstract corresponding to the executable file, and an information abstract list is generated according to the first information abstract of all the executable files; when an executable file of airborne embedded software is exported, an upper computer end generates a second information abstract corresponding to the executable file, and whether the first information abstract and the second information abstract are consistent or not is checked; if the information is consistent with the information, the upper computer end generates a curing information list for the airborne embedded software; and at the target terminal, solidifying the solidification information list and the airborne embedded software into an airborne embedded system.

Description

Trusted management method for executable files of airborne embedded system
Technical Field
The invention belongs to the field of embedded system software, and particularly relates to a trusted management method for an executable file of an airborne embedded system.
Background
The onboard embedded system is used as a high-reliability and high-security embedded system, and the software code of the onboard embedded system requires high quality, high reliability and high security. To improve execution speed and system reliability, the software of the on-board embedded system is generally fixed in a memory chip or a memory inside the processor, and is not stored in an external carrier such as a disk.
For an airborne embedded system, when software is delivered from a factory or upgraded in an outfield, the condition that the state of a product is uncontrollable due to filling of informal version software is easy to occur; in addition, the Flash property determines that certain bits jump with a certain probability in the operation process, and an unknown result is caused.
Disclosure of Invention
Aiming at the problems, the invention provides a credible management method for executable files of an airborne embedded system by closely combining with a software development process, and carries out correctness check on the executable files needing to be solidified of the airborne embedded system. Through the inspection process, the problem of uncontrollable software filling caused by manual misoperation or not strictly following the flow is greatly reduced, a great deal of troubleshooting time is saved, the product quality is improved, and the difficulty of field upgrading is reduced.
The application provides a trusted management method for executable files of an airborne embedded system, which comprises the following steps:
when executable files of airborne embedded software are put in storage, an upper computer terminal generates first information summaries corresponding to the executable files, and an information summary list is generated according to the first information summaries of all the executable files;
when an executable file of the airborne embedded software is delivered out of a warehouse, an upper computer end generates a second information abstract corresponding to the executable file, and whether the first information abstract and the second information abstract are consistent or not is checked;
if the information is consistent with the information, the upper computer end generates a curing information list for the airborne embedded software;
and at the target terminal, solidifying the solidification information list and the airborne embedded software into an airborne embedded system.
Specifically, the upper computer end generates a first information abstract corresponding to the executable file, and generates an information abstract list according to the first information abstract of all the executable files, which specifically includes:
the upper computer generates a first information abstract corresponding to the executable file by adopting a message abstract algorithm;
and generating an information abstract list according to the file names of all executable files and the first information abstract.
Specifically, the generation of the curing information list of the airborne embedded software by the upper computer terminal specifically comprises the following steps:
presetting solidification information of each executable file, wherein the solidification information comprises a file name, a file solidification starting address and a file length;
and the upper computer generates a curing information list for the airborne embedded software according to the curing information and the second information abstract, wherein the curing information list comprises the curing information, the number of executable files, the second information abstract and the serial number of the executable files.
Specifically, the method further comprises:
according to the solidification information list, determining whether the current version is the latest version;
and if not, updating the version of the onboard embedded software.
Specifically, determining whether the current version is the latest version according to the solidification information list specifically includes:
acquiring the curing information list at the designated address of the target machine;
reading out an executable file according to the file curing starting address and the file length in the curing information list;
generating a third message abstract corresponding to the read executable file by adopting a message abstract algorithm;
comparing the third information abstract with the second information abstract, and judging whether the files are consistent;
if the version is consistent with the current version, the current version is determined to be the latest version; otherwise, the current version is not the latest version.
Specifically, when the onboard embedded software is debugged, whether the executable file in the onboard embedded software is a controlled file is verified.
Specifically, when the onboard embedded software is debugged, verifying whether an executable file therein is a controlled file specifically includes:
acquiring the curing information list at the designated address of the target machine;
reading out an executable file according to the file curing starting address and the file length in the curing information list;
generating a third information abstract corresponding to the read executable file by adopting a message abstract algorithm;
comparing the third information abstract with the second information abstract, and judging whether the files are consistent;
if the two files are consistent, the executable file is a controlled file; otherwise, the executable file is not a controlled file.
Specifically, after checking whether the first information digest and the second information digest are consistent, before generating the solidified information list, the method further includes:
before the on-board embedded software is filled, an upper computer end generates a fourth information abstract corresponding to the executable file, and whether the fourth information abstract is consistent with the first information abstract or not is checked;
and if the information is consistent with the information, the upper computer terminal generates a curing information list for the airborne embedded software.
In summary, the invention is based on the file message digest algorithm, and the functions of calculating the file message digest, generating the file message digest list, checking the message digest list and generating the solidified message list are realized in the upper computer design; the calculation of the file information abstract and the verification function of the solidified information list are realized at the design of a target machine end, so that the correctness and the transportability of all executable files are ensured in the whole software development process.
The invention has the following advantages and effects:
1) The problem of uncontrollable software filling caused by manual misoperation or not strictly following the process is greatly reduced;
2) A large amount of troubleshooting time is saved, and the quality of the product is improved;
3) The difficulty of external field upgrading is reduced;
drawings
FIG. 1 is a software development stage application instruction;
FIG. 2 is a list of file information summaries;
fig. 3 is a table of curing information.
Detailed Description
The invention belongs to the field of embedded system software, and particularly relates to a trusted management method for an executable file of an airborne embedded system.
The invention provides a file credible management method based on a file message digest algorithm, which is closely combined with software development and development processes according to the specific requirements of high quality, high reliability and high safety of software codes of an airborne embedded system. The method mainly aims at the executable file of the airborne embedded system after engineering verification, the correctness of the executable file is checked in each stage of warehouse entry and exit, solidification and upgrading, the problem of uncontrollable software filling caused by manual misoperation or not strictly according to the flow is greatly reduced through the checking process, a large amount of troubleshooting time is saved, the product quality is improved, and the difficulty of field upgrading is reduced. The method mainly comprises the following steps:
1. in the product warehouse control stage, in order to verify and confirm the warehouse-in and warehouse-out process of the product and facilitate subsequent processing, a file message abstract algorithm is used for calculation and generating an information abstract list of warehouse-in software during warehouse-in; and when the software is delivered out of the warehouse, calculating and comparing the software with the list, and checking the correctness of the software delivered out of the warehouse to determine whether the software is the version to be delivered out of the warehouse.
2. And a software delivery stage, wherein pre-delivery inspection is carried out and software information is filled together with the software executable file. Before filling, verifying the information abstract and confirming whether the information abstract is consistent with the state of the ex-warehouse software; and during delivery, filling the software passing the inspection and verifying the filling result.
3. And in the software maintenance stage, whether the solidified software is a controlled file or not, and whether human tampering or bit jump occurs or not is checked and verified at any time in the ground loading and debugging states. When the version is updated, checking the curing information list and confirming the current version; when the software is debugged, whether the solidified software is a controlled file is verified.
Example one
In the process of software development and development, the invention mainly assists developers through the following steps to ensure the correctness of executable files:
1) When the product is put in storage, generating an information abstract list of the software to be put in storage;
2) When the product is delivered out of the warehouse, checking the correctness of the delivery software, and judging whether the correctness is consistent with that of the delivery software when the product is delivered into the warehouse;
3) Before filling the product, verifying the information abstract and confirming whether the information abstract is consistent with the ex-warehouse software;
4) When the product is delivered, generating a curing information list for the software passing the inspection, and curing the curing information list into the product along with the software;
5) When the product version is updated, checking the curing information list and confirming the current version;
6) And when the product software is debugged, verifying whether the solidified software is a controlled file.
As shown in figure 1.
The design is carried out from two angles of an upper computer and a target machine end respectively.
Host computer terminal
The invention designs and realizes the function requirements of the product library management and control stage and the software delivery stage developed by software on the upper computer, and the specific functions comprise:
and (3) calculating the file information abstract: when the software is verified to be controlled to be put in storage, the information abstract of the executable file is calculated by adopting a file information abstract algorithm, and a 128-bit file information abstract is obtained through calculation and can be used as a check code for file checking.
Generating a file information abstract list: and performing batch processing on all executable files contained in the software to generate a file information abstract list in the txt format. The information stored in the list includes file names of all executable files in the warehousing software, information abstracts corresponding to all the files and specific time for generating the list. As shown in fig. 2.
Checking the information abstract list: after the software is delivered from the warehouse and before the software is filled, file information abstract calculation is carried out on all executable files, and comparison and verification are carried out on a file information abstract list generated before the software is delivered into the warehouse, so that the correctness of all files is ensured.
Generating a curing information list: before filling, batch processing is carried out on all executable files contained in software, and a solidification information list in a bin format is generated. The information stored in the list comprises the number of files in the list, the serial number, the file name, the file curing starting address, the file length and the information abstract check code of each curing file. For the convenience of reading at the target end, the list is stored in binary format, and the specific format is shown in fig. 3.
Target machine end
The invention is designed and realized at a target machine end according to the functional requirements in the software maintenance stage, and the specific functions are as follows:
and (3) calculating the file information abstract: on the target machine, the information abstract of the solidified file is calculated by adopting a file information abstract algorithm, and a solidified file information abstract of 128bit is obtained through calculation, namely the solidified file information abstract can be used as a check code for checking the solidified file.
And (4) checking a curing information list: and during filling, the software and a corresponding curing information list generated on the upper computer are cured into the product. And comparing the information abstract obtained by calculating the solidified file with the record in the solidified information list during version verification and software updating, and outputting a comparison result. Displaying the name of the output file, the storage address of the file and a verification result, and outputting the information abstract of the file if the verification result is consistent; and if the verification results are inconsistent, outputting the list storage abstract and the specific file calculation abstract together.
In order to realize the above functions on the target machine, during filling, the software and the corresponding curing information list generated on the upper computer need to be cured into a product, and the functions of summary calculation of file information and verification of the curing information list are integrated into a BOOT program (BOOT). In the ground loading and debugging states, the calculation of the file information abstract and the display of the verification result can be realized through the BOOT menu.
Example two
The specific work implementation steps are as follows:
step 1, when the product is put in storage, an information abstract list of the storage software is generated.
Generating the information abstract of each executable file by adopting a file information abstract calculation function, wherein the input is all files required to be subjected to information abstract calculation; and outputting the file name and the calculation result of the corresponding check code.
And carrying out batch processing operation on all executable files in the software and calculation results thereof to generate a txt format information abstract list. The information stored in the list includes file names of all executable files in the warehousing software, information abstracts corresponding to all the files and specific time for generating the list.
And 2, when the product is delivered out of the warehouse, checking the correctness of the delivery software, and judging whether the product is consistent with the product delivered in the warehouse.
And calculating the file information abstract of the file needing to be delivered by adopting a file information abstract calculating function.
And (3) comparing and verifying the calculation result obtained in the step (1) with the information abstract list generated before the software is put in storage by adopting an information abstract list verification function, and ensuring the correctness of all files. The input of the function is a file information abstract list and files needing to be verified in the list; and outputting the specific checking result. If The verification is correct, the result is displayed as "The file is corrected! "; if The files are not consistent, the result is displayed as "The file is fake! "; if The file to be verified is not in The input verification list, the result is displayed as "The file files not have had Digest in this list! ".
In practical application, the message digest algorithm is a widely used cryptographic hash function, and can be used for file information verification, cryptographic management, electronic signature, spam screening and the like. The basic principle of the file information summarization algorithm is as follows: taking file information with any finite length as input, dividing the input information into N groups by taking 512bit as a unit, and dividing each group into 16 32-bit sub-groups. Defining four link variables, wherein each group participates in four rounds of operation on the link variables, outputting four 32-bit message digests at last, and outputting a 128-bit hash value after cascading the four message digests.
And 3, before filling the product, verifying the information abstract and confirming whether the information abstract is consistent with ex-warehouse software.
And calculating the file information abstract of the file to be filled by adopting a file information abstract calculating function.
And (3) comparing and verifying the calculation result in the step (1) with an information abstract list attached when the software is delivered out of the warehouse by adopting an information abstract list checking function, and ensuring the correctness of all files. The input of the function is a file information abstract list and files needing to be verified in the list; and outputting a specific checking result. If The verification is correct, the result is displayed as "The file is corrected! "; if The files are not consistent, the result is displayed as "The file is fake! "; if The file to be verified is not in The input verification list, the result is displayed as "The file files not have had Digest in this list! ".
And 4, when the product is delivered, generating a curing information list for the software passing the inspection, and curing the curing information list into the product along with the software.
Inputting file solidification information in The solidified file information filling, wherein The file verification result is' The file is correct! "is a curable document.
Selecting a file needing curing, and inputting relevant curing information. If the address format of the input information is correct and the file storage space is available, displaying the input information in a solidifiable file list; if the input information is wrong, the wrong prompt is displayed in a text box of the generation condition of the solidification list.
And selecting the files needing to be solidified in the solidifiable list, and clicking the 'generation of the solidified list' to realize the function of generating the solidified information list.
The generate solidification list function will perform a batch operation on all successfully verified executables to generate a. Bin formatted solidification information list. The information stored in the list comprises the number of files in the list, the serial number, the file name, the file curing starting address, the file length and the information abstract check code of each curing file. For the convenience of reading at the target end, the list is stored in a binary form, so the readability is poor compared with the file information summary list.
And during filling, the software and a corresponding curing information list generated on the upper computer are cured to a product at the end of a target machine.
And 5, checking the curing information list when the product version is updated, and confirming the current version.
Acquiring a curing information list generated by an upper computer at a designated address;
reading out the files in the list according to the address information in the acquisition list, and performing information abstract calculation of the files;
comparing the calculation result with the file information abstract in the list, and judging whether the files are consistent;
displaying the name of the output file, the storage address of the file and a verification result, and outputting the information abstract of the file if the verification result is consistent; and if the verification results are inconsistent, outputting the list storage abstract and the specific file calculation abstract together.
And judging the updating state of the current version according to the checking display result.
And 6, when the product software is debugged, verifying whether the solidified software is a controlled file.
Acquiring a curing information list generated by an upper computer at a designated address;
reading out the files in the list according to the address information in the acquisition list, and performing information abstract calculation of the files;
comparing the calculation result with the file information abstract in the list, and judging whether the files are consistent;
displaying the name of the output file, the storage address of the file and a verification result, and outputting the information abstract of the file if the verification result is consistent; and if the verification results are not consistent, outputting the list storage abstract and the specific file calculation abstract together.
And judging whether the current software is a controlled file or not, and whether artificial tampering or bit jump occurs or not according to the verification display result.

Claims (6)

1. An executable file trusted management method of an airborne embedded system is characterized by comprising the following steps:
when an executable file of airborne embedded software is put in storage, an upper computer end generates a first information abstract corresponding to the executable file, and an information abstract list is generated according to the first information abstract of all executable files, and the method specifically comprises the following steps:
the upper computer generates a first information abstract corresponding to the executable file by adopting a message abstract algorithm;
generating an information abstract list according to the file names of all executable files and the first information abstract;
when an executable file of the airborne embedded software is delivered out of a warehouse, an upper computer end generates a second information abstract corresponding to the executable file, and whether the first information abstract and the second information abstract are consistent or not is checked;
if the information is consistent with the information, the upper computer end generates a curing information list for the airborne embedded software, and the method specifically comprises the following steps: presetting solidification information of each executable file, wherein the solidification information comprises a file name, a file solidification starting address and a file length; the upper computer generates a curing information list for the airborne embedded software according to the curing information and the second information abstract, wherein the curing information list comprises the curing information, the number of executable files, the second information abstract and the serial number of the executable files;
and at the target terminal, solidifying the solidification information list and the airborne embedded software into an airborne embedded system.
2. The method of claim 1, further comprising:
determining whether the current version is the latest version or not according to the curing information list;
and if not, updating the version of the onboard embedded software.
3. The method according to claim 2, wherein determining whether the current version is the latest version according to the solidification information list specifically includes:
acquiring the curing information list at the designated address of the target machine;
reading out an executable file according to the file curing starting address and the file length in the curing information list;
generating a third information abstract corresponding to the read executable file by adopting a message abstract algorithm;
comparing the third information abstract with the second information abstract, and judging whether the files are consistent;
if the current version is the latest version, confirming that the current version is the latest version; otherwise, the current version is not the latest version.
4. The method of claim 1, wherein: when the embedded software is debugged, verifying whether the executable file in the embedded software is a controlled file.
5. The method according to claim 4, wherein verifying whether the executable file is a controlled file when the onboard embedded software is debugged comprises:
acquiring the curing information list at the designated address of the target machine;
reading out an executable file according to the file curing starting address and the file length in the curing information list;
generating a third information abstract corresponding to the read executable file by adopting a message abstract algorithm;
comparing the third information abstract with the second information abstract, and judging whether the files are consistent;
if the two files are consistent, the executable file is a controlled file; otherwise, the executable file is not a controlled file.
6. The method of claim 1, wherein after checking whether the first message digest and the second message digest are consistent, prior to generating the consolidated message list, the method further comprises:
before the on-board embedded software is filled, an upper computer end generates a fourth information abstract corresponding to the executable file, and whether the fourth information abstract is consistent with the first information abstract or not is checked;
and if the information is consistent with the information, the upper computer terminal generates a curing information list for the airborne embedded software.
CN202011215012.8A 2020-11-03 2020-11-03 Trusted management method for executable files of airborne embedded system Active CN112214415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011215012.8A CN112214415B (en) 2020-11-03 2020-11-03 Trusted management method for executable files of airborne embedded system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011215012.8A CN112214415B (en) 2020-11-03 2020-11-03 Trusted management method for executable files of airborne embedded system

Publications (2)

Publication Number Publication Date
CN112214415A CN112214415A (en) 2021-01-12
CN112214415B true CN112214415B (en) 2023-04-18

Family

ID=74058192

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011215012.8A Active CN112214415B (en) 2020-11-03 2020-11-03 Trusted management method for executable files of airborne embedded system

Country Status (1)

Country Link
CN (1) CN112214415B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114489831B (en) * 2021-12-29 2024-03-19 中国航空工业集团公司西安飞机设计研究所 Configurable airborne software batch processing and curing method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102508728A (en) * 2011-11-29 2012-06-20 中国航空工业集团公司第六三一研究所 Error detection and read method of goal document solidified on FLASH carrier
CN103235912A (en) * 2013-04-12 2013-08-07 福建伊时代信息科技股份有限公司 Device and method for recognizing trusted processes
CN103530121A (en) * 2013-10-15 2014-01-22 武汉邮电科学研究院 Method of compatibility of multiple hardware platforms by RRU single software version
CN105930728A (en) * 2016-06-17 2016-09-07 浪潮(北京)电子信息产业有限公司 Application examining method and device
CN107992325A (en) * 2017-11-09 2018-05-04 北京航空航天大学 A kind of method that fileinfo is compared by feature code check
CN108121554A (en) * 2017-12-20 2018-06-05 浙江亿邦通信科技股份有限公司 A kind of upgrade method and upgrade-system of open air embedded device system
CN108762788A (en) * 2018-05-31 2018-11-06 四川斐讯信息技术有限公司 A kind of embedded device firmware encrypting method and system based on server
CN110659088A (en) * 2019-09-20 2020-01-07 浙江杰芯科技有限公司 Method and system for expanding program under embedded environment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110154496A1 (en) * 2009-12-23 2011-06-23 Chun Hsiang Cheng Removable Apparatus and Method for Verifying an Executable File in a Computing Apparatus and Computer-Readable Medium Thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102508728A (en) * 2011-11-29 2012-06-20 中国航空工业集团公司第六三一研究所 Error detection and read method of goal document solidified on FLASH carrier
CN103235912A (en) * 2013-04-12 2013-08-07 福建伊时代信息科技股份有限公司 Device and method for recognizing trusted processes
CN103530121A (en) * 2013-10-15 2014-01-22 武汉邮电科学研究院 Method of compatibility of multiple hardware platforms by RRU single software version
CN105930728A (en) * 2016-06-17 2016-09-07 浪潮(北京)电子信息产业有限公司 Application examining method and device
CN107992325A (en) * 2017-11-09 2018-05-04 北京航空航天大学 A kind of method that fileinfo is compared by feature code check
CN108121554A (en) * 2017-12-20 2018-06-05 浙江亿邦通信科技股份有限公司 A kind of upgrade method and upgrade-system of open air embedded device system
CN108762788A (en) * 2018-05-31 2018-11-06 四川斐讯信息技术有限公司 A kind of embedded device firmware encrypting method and system based on server
CN110659088A (en) * 2019-09-20 2020-01-07 浙江杰芯科技有限公司 Method and system for expanding program under embedded environment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Secured IoT Through Hashing Using MD5";Irfan A. Landge等;《2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)》;20181004;第1-5页 *
"创新发展中的可信计算理论与技术";冯登国等;《中国科学:信息科学》;20200831;第50卷(第8期);第1127-1147页 *

Also Published As

Publication number Publication date
CN112214415A (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN101436141B (en) Firmware upgrading and encapsulating method and device based on digital signing
CN103473088B (en) A kind of single-chip microcomputer online upgrading method and system
CN102194048A (en) Method and device for configuration validation of a complex multi-element system
CN103677898A (en) Method for checking loaded extension and/or plug-in on server side and server
CN112214415B (en) Trusted management method for executable files of airborne embedded system
CN106708704A (en) Method and device for classifying crash logs
CN113590227A (en) Binary programming format loading method and system under embedded system
CN106709281B (en) Patch granting and acquisition methods, device
CN111563016A (en) Log collection and analysis method and device, computer system and readable storage medium
CN111695093A (en) iOS application-based reinforcement method, electronic device and storage medium
CN111460436B (en) Unstructured data operation method and system based on blockchain
CN111506330A (en) Program updating method and device, star affair computer and storage medium
CN108200060B (en) Single sign-on verification method based on web subsystem, server and storage medium
CN114356680A (en) Verification method and device and electronic equipment
CN113419734A (en) Application program reinforcing method and device and electronic equipment
CN112671741A (en) Network protection method, device, terminal and storage medium
CN112650549A (en) Page jump method, device, terminal and storage medium
CN110780881A (en) Software package manufacturing method and device and electronic equipment
CN117910052A (en) Method and system for verifying data integrity and correctness
CN117544616A (en) Vehicle-end OTA upgrading method and device, electronic equipment and readable storage medium
CN117093245B (en) OTA upgrade package verification method, device, equipment and readable storage medium
CN113326055B (en) Equipment updating method and related device
CN115481445B (en) Signature verification method, device and equipment for portable document format file and storage medium
CN112860285B (en) SP upgrade package generation method and device of financial self-service equipment and computer equipment
CN116170169A (en) Static data extraction method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant