CN117150451A - Radar starting method, radar starting device, electronic equipment and storage medium - Google Patents

Radar starting method, radar starting device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117150451A
CN117150451A CN202311102247.XA CN202311102247A CN117150451A CN 117150451 A CN117150451 A CN 117150451A CN 202311102247 A CN202311102247 A CN 202311102247A CN 117150451 A CN117150451 A CN 117150451A
Authority
CN
China
Prior art keywords
radar
serial number
target
machine code
hardware serial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311102247.XA
Other languages
Chinese (zh)
Inventor
宋清峰
席国庆
章庆
许古午
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Huiershi Software Technology Co ltd
Original Assignee
Nanjing Huiershi Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Huiershi Software Technology Co ltd filed Critical Nanjing Huiershi Software Technology Co ltd
Priority to CN202311102247.XA priority Critical patent/CN117150451A/en
Publication of CN117150451A publication Critical patent/CN117150451A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

The invention discloses a radar starting method, a radar starting device, electronic equipment and a storage medium. The method comprises the following steps: determining a target machine code ciphertext from a target radar firmware, wherein the target machine code is generated by encrypting and hashing according to a preset hardware serial number of the target radar; decrypting the target machine code ciphertext to obtain a target machine code plaintext, and extracting a first hardware serial number from the target machine code plaintext; reading a second hardware serial number from a hardware serial number memory of the target radar; and performing starting control on the target radar according to the first hardware serial number and the second hardware serial number. The scheme can increase the difficulty of copying and cloning the radar, and effectively prevent the radar firmware from being copied to another radar device to run the main program.

Description

Radar starting method, radar starting device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of radar technologies, and in particular, to a method and apparatus for starting a radar, an electronic device, and a storage medium.
Background
With the development of intelligent traffic technology, radar has an important development space as one of important sensing devices.
In the related scheme, the radar technology is continuously updated along with the technical development, in order to avoid the radar from being plagiarized and reversely developed, an anti-reverse engineering method is generally adopted, and the anti-reverse engineering method comprises code virtualization, code confusion, code encryption and the like, so that the difficulty of reverse engineering is increased, and the security of a core source code of the radar is ensured.
However, the method is only increased in difficulty of cracking, the reverse engineering problem cannot be completely solved, the cost is high, and particularly, only the source code is subjected to safety protection, and an executable main program adopted after compiling can still be directly used by plagiarism, so that the radar can still be used by plagiarism production.
Disclosure of Invention
The invention provides a radar starting method, a radar starting device, electronic equipment and a storage medium, which are used for solving the problem that a radar is cloned and improving the safety of radar products.
According to an aspect of the present invention, there is provided a radar starting method including:
determining a target machine code ciphertext from a target radar firmware, wherein the target machine code is generated by encrypting and hashing according to a preset hardware serial number of the target radar;
decrypting the target machine code ciphertext to obtain a target machine code plaintext, and extracting a first hardware serial number from the target machine code plaintext;
reading a second hardware serial number from a hardware serial number memory of the target radar;
and performing starting control on the target radar according to the first hardware serial number and the second hardware serial number.
According to another aspect of the present invention, there is provided a radar starting apparatus including:
the determining module is used for determining a target machine code ciphertext from target radar firmware, wherein the target machine code is generated by encryption and hash according to a preset hardware serial number of the target radar;
the extraction module is used for decrypting the target machine code ciphertext to obtain a target machine code plaintext, and extracting the target machine code plaintext to obtain a first hardware serial number;
the reading module is used for reading a second hardware serial number from the hardware serial number memory of the target radar;
and the control module is used for performing starting control on the target radar according to the first hardware serial number and the second hardware serial number.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the radar start-up method according to any one of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a computer readable storage medium storing computer instructions for causing a processor to execute a radar start method according to any one of the embodiments of the present invention.
According to the technical scheme, a target machine code ciphertext is determined from target radar firmware, and the target machine code ciphertext is generated by encryption and hash according to a preset hardware serial number of a target radar; decrypting the target machine code ciphertext to obtain a target machine code plaintext, extracting a first hardware serial number from the target machine code plaintext, reading a second hardware serial number from a hardware serial number memory of the target radar, and further performing starting control on the target radar through the first hardware serial number and the second hardware serial number, wherein even if radar hardware is plagiarized, radar firmware is copied to a piece of repeated radar hardware, as the hardware serial number cannot be resolved from the machine code of the radar, the radar cannot pass verification when an executable main program needs to be run, so that the radar cannot be started normally, the difficulty of forging the machine code is higher, the difficulty of copying and cloning the radar can be increased, and the radar firmware can be effectively prevented from being copied to another radar device to run the main program.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention or to delineate the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a radar start method provided in accordance with an embodiment of the present invention;
FIG. 2 is a schematic diagram of a radar firmware architecture suitable for use in accordance with an embodiment of the present invention;
FIG. 3 is a radar security initiation procedure applicable in accordance with an embodiment of the present invention;
fig. 4 is a schematic structural view of a radar starting device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device implementing a radar start method according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 is a flowchart of a radar starting method according to an embodiment of the present invention, where the method may be applied to a case of controlling radar firmware to operate a radar, where the method may be performed by a radar starting apparatus, where the radar starting apparatus may be implemented in hardware and/or software, where the radar starting apparatus may be configured in any electronic device having a network communication function, where the electronic device may be a radar device, such as a millimeter wave radar, and the like. As shown in fig. 1, the radar starting method of the present embodiment may include the following processes:
s110, determining a target machine code ciphertext from target radar firmware, wherein the target machine code is generated by encrypting and hashing according to a preset hardware serial number of the target radar.
The radar firmware refers to a radar driving program stored in the radar, and specific operation logic can be realized only through the radar firmware. Referring to fig. 2, the radar firmware may include three parts, a boot program, a key, and an executable main program. For the preset hardware serial number of the target radar, the preset hardware serial number of the target radar can be encrypted and hashed in advance to generate a target machine code, and the generated target machine code ciphertext is stored in the target radar firmware. The machine code may be a serial number formed by encrypting and hashing a hardware serial number.
Alternatively, the preset hardware serial number may be one or a combination of a hard disk serial number of the target radar and a chip serial number of the radar chip. For example, the preset hardware serial number may be a chip ID of a radar chip in the target radar, a hard disk ID in the target radar, or other hardware unique identifiers, and in order to increase complexity of the machine code, the hard disk serial number and the chip serial number of the radar chip may be combined to be used as the preset hardware serial number, so as to encrypt and hash the machine code.
Optionally, the target machine code is obtained by performing confusion processing on a preset hardware serial number of the target radar and a salt value given to the target radar in random generation, and the salt values adopted when different radars generate the machine code are different. Or the target machine code is obtained by carrying out preset hash processing on a preset hardware serial number of the target radar.
And randomly generating a salt value corresponding to each target radar aiming at each target radar, wherein each radar has different salt values, and acquiring a preset hardware serial number of the target radar, wherein the length of the salt value of the target radar is kept the same as that of the preset hardware serial number adopted when the target radar generates a machine code. And carrying out confusion processing on the preset hardware serial number of the target radar and the salt value given by the random generation of the target radar to obtain a target machine code corresponding to the target radar which is randomly generated.
Illustratively, a simple confusion approach is provided for target radars: the radar chip ID in the target radar is 123456789, the salt value randomly generated by aiming at the target radar is abcdefghi, and the machine code obtained after confusion is 1a2b3c4d5e6f7g8h9i.
Optionally, as the method for confusing the hardware serial number and the salt value is changeable, on the premise of no leakage, an attacker cannot forge the machine code, namely cannot forge the machine code on a new radar device, thereby achieving the function of spoofing the bootstrap program, and therefore, the confusing mode adopted in the generation of the target radar machine code can be encrypted, and the leakage of the target radar machine code is avoided as much as possible.
Optionally, determining the target machine code ciphertext from the target radar firmware includes: starting a bootstrap program in the target radar firmware; and loading the target machine code ciphertext into the secret key of the target radar firmware through a bootstrap program.
Referring to fig. 2, for a target radar, a key pair (such as an RSA key pair) used by the target radar may be generated in advance, and each radar may generate one or more sets of key pairs, but it is necessary to ensure that encryption and decryption are used with the same set of key pairs. For the target machine code plaintext of the target radar generated in advance, the target machine code plaintext can be encrypted by using a public key in a pre-generated key pair, and the encrypted target machine code ciphertext is stored in a key of the target radar firmware, for example, in a 0x8000-0x8100 space of the radar firmware.
Referring to fig. 2, the function of the boot strap in the radar firmware is to load and decrypt the encrypted executable main program, complete the hardware verification, and boot the main program to start. Therefore, when loading the target machine code ciphertext, it is necessary to first start the boot program in the target radar firmware, acquire the target machine code ciphertext from the key of the target radar firmware through the boot program, and load the acquired target machine code ciphertext through the boot program.
S120, decrypting the target machine code ciphertext to obtain a target machine code plaintext, and extracting a first hardware serial number from the target machine code plaintext.
Optionally, decrypting the target machine code ciphertext to obtain the target machine code plaintext includes: loading a preset private key associated with a target machine code ciphertext from a security chip of a target radar; and decrypting the target machine code ciphertext by adopting a preset private key associated with the target machine code ciphertext to obtain a target machine code plaintext, wherein the target machine code ciphertext is obtained by encrypting the target machine code plaintext by adopting a public key in a public-private key pair to which the preset private key belongs.
The preset private key associated with the target machine code ciphertext can be stored in the designated storage space, and the private key is stored in the security chip associated with the target radar for enhancing the security. Meanwhile, the public key in the public-private key pair to which the preset private key belongs can be adopted to encrypt the target machine code plaintext to obtain the target machine code ciphertext. The private key exists in the security chip and cannot be read maliciously, so that an attacker cannot decrypt the machine code without actively revealing the private key.
Optionally, extracting the first hardware serial number from the plaintext of the target machine code includes: reversely extracting a hardware serial number which is confused with the target machine code plaintext from the target machine code plaintext according to a confusion mode adopted when the target machine code plaintext is generated; the reverse extracted hardware serial number is determined as the first hardware serial number.
S130, reading a second hardware serial number from a hardware serial number memory of the target radar.
The first hardware serial number is a serial number which is encrypted and hashed and hidden in the machine code based on a preset hardware serial number of the target radar in advance, and the second hardware serial number is a preset hardware serial number of the radar stored in the target radar register. In the case where the target radar firmware of the target radar is not copied to the target radar, the hardware serial number hidden in the machine code stored in the target radar firmware should be identical to the hardware serial number in the register of the target radar, and if not identical, it is likely that the target radar firmware in the target radar is copied from other radars.
And S140, starting and controlling the target radar according to the first hardware serial number and the second hardware serial number.
Optionally, performing start control on the target radar according to the first hardware serial number and the second hardware serial number may include the following steps A1-A2:
and A1, comparing the first hardware serial number with the second hardware serial number.
And step A2, if the first hardware serial number is the same as the second hardware serial number, decrypting the encrypted executable main program in the target radar firmware by adopting a target machine code plaintext, and loading and starting the decrypted executable main program in the target radar so as to start the target radar.
And step A3, if the first hardware serial number is different from the second hardware serial number, performing damage to the encrypted executable main program so as to inhibit the starting of the target radar.
Referring to fig. 2, a target machine code stored in a key of a target radar firmware may be used as an encryption key, and the target machine code may be used as the encryption key to encrypt (e.g., AES encrypt) a key executable main program of the target radar firmware, to obtain an encrypted executable main program. Because the machine code of each radar is different, the resulting encrypted executable main program is also different.
Referring to fig. 2 and 3, the boot program starts, the machine code ciphertext is loaded from the 0x8000 location of the target radar firmware, and the RSA private key is read from the security chip. And (3) using an RSA private key to secret the machine ciphertext to obtain a machine code plaintext, wherein the machine code plaintext is formed by mixing a hardware serial number of a radar chip with a salt value, and reversely extracting the hardware serial number of the chip according to a mixing method. The chip unique hardware serial number is read and compared with the chip serial number extracted from the machine code plaintext. If the machine code is the same, the machine code is used for decrypting the main program, and the main program is started in a jumping mode, so that the equipment is started safely. If not, the secure boot fails, entering a self-destruction process. Self-destruction may be the deletion of the main program or the destruction of the main program by means of contaminated data.
According to the technical scheme, a target machine code ciphertext is determined from target radar firmware, and the target machine code ciphertext is generated by encryption and hash according to a preset hardware serial number of a target radar; decrypting the target machine code ciphertext to obtain a target machine code plaintext, extracting a first hardware serial number from the target machine code plaintext, reading a second hardware serial number from a hardware serial number memory of the target radar, and further performing starting control on the target radar through the first hardware serial number and the second hardware serial number, wherein even if radar hardware is plagiarized, radar firmware is copied to a piece of repeated radar hardware, because the hardware serial number cannot be resolved from the machine code of the radar, the radar cannot pass verification when the executable main program needs to be operated, and therefore the radar cannot be started normally, and moreover, the difficulty of forging the machine code is high, so that the radar firmware can be effectively prevented from being copied to another radar device to operate the main program.
Fig. 4 is a schematic structural diagram of a radar starting apparatus according to an embodiment of the present invention, where the radar starting apparatus may be applicable to a case of controlling the starting of radar firmware to operate a radar, and the radar starting apparatus may be implemented in hardware and/or software, and the radar starting apparatus may be configured in any electronic device having a network communication function, and the electronic device may be a radar device, for example, a millimeter wave radar. As shown in fig. 4, the radar starting apparatus of the present embodiment may include:
a determining module 410, configured to determine a target machine code ciphertext from a target radar firmware, where the target machine code is generated by encrypting and hashing according to a preset hardware serial number of the target radar;
the extracting module 420 is configured to decrypt the target machine code ciphertext to obtain a target machine code plaintext, and extract a first hardware serial number from the target machine code plaintext;
a reading module 430, configured to read a second hardware serial number from a hardware serial number memory of the target radar;
and the control module 440 is configured to perform start control on the target radar according to the first hardware serial number and the second hardware serial number.
On the basis of the above embodiment, optionally, the target machine code is obtained by performing confusion processing on a preset hardware serial number of the target radar and a salt value given to the target radar by random generation, and the salt values adopted when different radars generate machine codes are different; or the target machine code is obtained by carrying out preset hash processing on a preset hardware serial number of the target radar.
On the basis of the above embodiment, optionally, the preset hardware serial number is one or a combination of a hard disk serial number of the target radar and a chip serial number of a radar chip.
On the basis of the above embodiment, optionally, determining the target machine code ciphertext from the target radar firmware includes:
starting a bootstrap program in the target radar firmware;
and loading a target machine code ciphertext into the secret key of the target radar firmware through a bootstrap program.
On the basis of the foregoing embodiment, optionally, decrypting the target machine code ciphertext to obtain a target machine code plaintext includes:
loading a preset private key associated with the target machine code ciphertext from a security chip of the target radar;
and decrypting the target machine code ciphertext by adopting a preset private key associated with the target machine code ciphertext to obtain a target machine code plaintext, wherein the target machine code ciphertext is obtained by encrypting the target machine code plaintext by adopting a public key in a public-private key pair to which the preset private key belongs.
On the basis of the foregoing embodiment, optionally, extracting the first hardware serial number from the target machine code plaintext includes:
reversely extracting a hardware serial number which is confused with the target machine code plaintext from the target machine code plaintext according to a confusion mode adopted when the target machine code plaintext is generated;
and determining the reversely extracted hardware serial number as the first hardware serial number.
On the basis of the foregoing embodiment, optionally, performing start control on the target radar according to the first hardware serial number and the second hardware serial number includes:
comparing the first hardware serial number with the second hardware serial number;
if the first hardware serial number is the same as the second hardware serial number, decrypting the encrypted executable main program in the target radar firmware by adopting the target machine code plaintext;
loading and starting the decrypted executable main program in the target radar so as to enable the target radar to start;
if the first hardware serial number is different from the second hardware serial number, the encrypted executable main program is destroyed to inhibit the starting of the target radar.
The radar starting device provided by the embodiment of the invention can execute the radar starting method provided by any embodiment of the invention, has the corresponding functions and beneficial effects of executing the radar starting method, and the detailed process refers to the related operation of the radar starting method in the embodiment.
Fig. 5 shows a schematic diagram of the structure of an electronic device 10 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 5, the electronic device 10 includes at least one processor 11, and a memory, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc., communicatively connected to the at least one processor 11, in which the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the electronic device 10 may also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
Various components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the various methods and processes described above, such as the radar start method.
In some embodiments, the radar initiation method may be implemented as a computer program, which is tangibly embodied on a computer-readable storage medium, such as the storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into RAM 13 and executed by processor 11, one or more steps of the radar start-up method described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the radar start-up method in any other suitable way (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. A radar start-up method, comprising:
determining a target machine code ciphertext from a target radar firmware, wherein the target machine code is generated by encrypting and hashing according to a preset hardware serial number of the target radar;
decrypting the target machine code ciphertext to obtain a target machine code plaintext, and extracting a first hardware serial number from the target machine code plaintext;
reading a second hardware serial number from a hardware serial number memory of the target radar;
and performing starting control on the target radar according to the first hardware serial number and the second hardware serial number.
2. The method according to claim 1, wherein the target machine code is obtained by performing confusion processing on a preset hardware serial number of the target radar and a salt value given to the target radar by random generation, and the salt values adopted when different radars generate machine codes are different; or the target machine code is obtained by carrying out preset hash processing on a preset hardware serial number of the target radar.
3. The method of claim 1, wherein the predetermined hardware serial number is one or a combination of a hard disk serial number of the target radar and a chip serial number of a radar chip.
4. A method according to any one of claims 1 to 3, wherein determining target machine code ciphertext from target radar firmware comprises:
starting a bootstrap program in the target radar firmware;
and loading a target machine code ciphertext into the secret key of the target radar firmware through a bootstrap program.
5. A method according to any one of claims 1 to 3, wherein decrypting the target machine code ciphertext to obtain target machine code plaintext comprises:
loading a preset private key associated with the target machine code ciphertext from a security chip of the target radar;
and decrypting the target machine code ciphertext by adopting a preset private key associated with the target machine code ciphertext to obtain a target machine code plaintext, wherein the target machine code ciphertext is obtained by encrypting the target machine code plaintext by adopting a public key in a public-private key pair to which the preset private key belongs.
6. The method of claim 3, wherein extracting the first hardware serial number from the target machine code plaintext comprises:
reversely extracting a hardware serial number which is confused with the target machine code plaintext from the target machine code plaintext according to a confusion mode adopted when the target machine code plaintext is generated;
and determining the reversely extracted hardware serial number as the first hardware serial number.
7. The method of claim 1, wherein performing start control on the target radar based on the first hardware serial number and the second hardware serial number comprises:
comparing the first hardware serial number with the second hardware serial number;
if the first hardware serial number is the same as the second hardware serial number, decrypting the encrypted executable main program in the target radar firmware by adopting the target machine code plaintext;
loading and starting the decrypted executable main program in the target radar so as to enable the target radar to start;
if the first hardware serial number is different from the second hardware serial number, the encrypted executable main program is destroyed to inhibit the starting of the target radar.
8. A radar starting apparatus, characterized by comprising:
the determining module is used for determining a target machine code ciphertext from target radar firmware, wherein the target machine code is generated by encryption and hash according to a preset hardware serial number of the target radar;
the extraction module is used for decrypting the target machine code ciphertext to obtain a target machine code plaintext, and extracting the target machine code plaintext to obtain a first hardware serial number;
the reading module is used for reading a second hardware serial number from the hardware serial number memory of the target radar;
and the control module is used for performing starting control on the target radar according to the first hardware serial number and the second hardware serial number.
9. An electronic device, the electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the radar start-up method of any one of claims 1-7.
10. A computer readable storage medium, characterized in that it stores computer instructions for causing a processor to implement the radar start-up method according to any one of claims 1-7 when executed.
CN202311102247.XA 2023-08-29 2023-08-29 Radar starting method, radar starting device, electronic equipment and storage medium Pending CN117150451A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311102247.XA CN117150451A (en) 2023-08-29 2023-08-29 Radar starting method, radar starting device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311102247.XA CN117150451A (en) 2023-08-29 2023-08-29 Radar starting method, radar starting device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117150451A true CN117150451A (en) 2023-12-01

Family

ID=88903861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311102247.XA Pending CN117150451A (en) 2023-08-29 2023-08-29 Radar starting method, radar starting device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117150451A (en)

Similar Documents

Publication Publication Date Title
EP3205046B1 (en) Secure shared key sharing systems and methods
US10419217B2 (en) Security information configuration method, security verification method, and related chip
CN106529308B (en) data encryption method and device and mobile terminal
CN109474423A (en) Data encryption/decryption method, server and storage medium
CN109523261B (en) Transaction verification method of block chain terminal, related device and readable storage medium
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN114710274A (en) Data calling method and device, electronic equipment and storage medium
CN117725598A (en) An Zhuoduan data encryption and decryption method, device, equipment and medium
CN117692900A (en) Equipment verification method, device, equipment and medium based on security chip
CN117786726A (en) Source code file processing method and device, electronic equipment and storage medium
CN113794706B (en) Data processing method and device, electronic equipment and readable storage medium
CN114884714B (en) Task processing method, device, equipment and storage medium
CN117150451A (en) Radar starting method, radar starting device, electronic equipment and storage medium
CN115600215A (en) System startup method, system information processing method, device, equipment and medium thereof
CN108512657B (en) Password generation method and device
CN115361198A (en) Decryption method, encryption method, device, computer equipment and storage medium
CN116668026B (en) Method, device, equipment and storage medium for processing password card data
CN116933275A (en) Data leakage prevention method, device, equipment and storage medium
CN116594894A (en) Interface testing method and device, electronic equipment and storage medium
CN118368072B (en) Micro-service extension method, device and medium supporting SM2 cryptographic algorithm
CN117254908B (en) Cloud data storage method, device, equipment and medium
CN116804914A (en) Data processing method and device, electronic equipment and storage medium
CN117240573A (en) White box key management system, method, equipment and storage medium
CN109564615B (en) Method, device, equipment and storage medium for loading model data
US20230087714A1 (en) Method of logging in to operating system, electronic device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination