TW200414733A - Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof - Google Patents

Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof Download PDF

Info

Publication number
TW200414733A
TW200414733A TW92101749A TW92101749A TW200414733A TW 200414733 A TW200414733 A TW 200414733A TW 92101749 A TW92101749 A TW 92101749A TW 92101749 A TW92101749 A TW 92101749A TW 200414733 A TW200414733 A TW 200414733A
Authority
TW
Taiwan
Prior art keywords
program
sequence
information
stored
item
Prior art date
Application number
TW92101749A
Other languages
Chinese (zh)
Other versions
TW595182B (en
Inventor
Chien-Tzu Hou
Original Assignee
Geneticware Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Geneticware Co Ltd filed Critical Geneticware Co Ltd
Priority to TW92101749A priority Critical patent/TW595182B/en
Application granted granted Critical
Publication of TW595182B publication Critical patent/TW595182B/en
Publication of TW200414733A publication Critical patent/TW200414733A/en

Links

Abstract

The invention relates to an information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof, in particular, the method and device that deducts the partial original article contents, further proceeds the compression and reorganization regarding the original program sequence experienced with the partial data extraction, messes up the original program contents and significantly increases the decryption difficulty of hacker. The device comprises a calibrator, puncher, compressor, encoder, sewing unit, decompressor and decrypter. Local workstation intends to submit the program to the server. Divide the program into several subroutine sequences by going through the calibration program of calibrator and saving the calibration result. Proceed punching process in the unit of subroutine sequence and store the data where the hole is located in storage unit. The sequence blank space appears after compressing the punched subroutine sequence, making partial contents miss from the original sequence. Further encrypt the new sequence and then go through the network to be stored in the server. When downloading program from the remote site, the local workstation downloads program from the server. After decrypting and decompressing sequence, the stored hole value data is sequentially patched and restored to the original complete program sequence in accordance with the stored punched data in the storage data. Later, proceed equivalent calibration and compare the result with the original calibrated value in the storage unit to determine if the program is complete or modified. After passing the calibration, the local computer can then operate the program. 5. (1) Typical figure of the invention: Figure 1 (2) Typical component notation in typical figure of the invention: 10 CPU 11 Storage unit 12 Network interface card 20 Hardware chip 21 Calibrator 22 Puncher 23 Compressor 24 Encrypter 25 Decrypter 26 Decompressor 27 Sewing unit 30 Network A Local workstation B Server.

Description

200414733 五、發明說明(1) 【發明所屬之技術領域】 本發明係有關—種確保遠端載入資料的保密性和X 4 修改性之資訊驗證裝置盥方法,特 #不被 #二 1 程式序列缺失部分資訊,以達到以 車乂小性能代價換取較大安全性的目的。 【先前技術】 按,遠端載入是通過使用伺服器硬碟上 =站硬碟引導一台網路上的工作站的模式。目前 通端啟動技術的應用日益廣泛’尤1 原因是因為它管理簡單、维蠖容易U教月场合’究其 。 攸而大大降低了系統整體的擁有成本 這種技術的主要原踩4 ·田^ , 如:啟動程式、應用程式等:::=人”的部:程式 端(client)需要該部分程式時’,、在】:司服态上,當客戶 PR0M)中向伺服器發送連接靖长取^启動過程(Boo_t 客戶端送出的要求就會回傳?二取心:。當祠服器收到 收到祠服器送出的連結應:位址’用戶端接 PR0M)隨即通過網路,從伺 纪啟動過程(Βοοΐ 程式。 』服杰下载—切所需的設備啟動 傳統遠端載入方式多用 相對安全的網路環境,通訊各;:f罔路’ €是一個被認為 ,故通訊安全問題並未被^以 ^保持著彼此間的信任 ^ /刀考慮,通訊雙方均在完 200414733 五、發明說明(2) 全開放的環境下傳遞、交換資訊。 但在網路安全問題日益突出的今天,諸多安全手段亦 應用於遠端載入過程當中。通常對於遠端載入過程的安全 措施包括加密和校驗兩種。加密方法一般採用通用的塊加 密和流加密,而校驗的手段主要是H a s h函數校驗。所謂 Hash函數校驗,係將整個程式序列進行壓縮得到一簡短的 摘要’作為曰後驗證的依據。然而傳統加密演算法和Hash 函數校驗方法的運算複雜程度很高,資料量大,實現困難 丄對於設備的性能要求較高;同時,寄存的程式是以完整 形式在網上通訊、並在伺服器上保存的,因此通訊 J ί Iί ί中,、均有被截獲、破解和篡改的可能,而將經 的i全Υ其転式應用於本地工作站中,將危害本地工作站 王 至對本地工作站的資源造成嚴重的破壞。 資 是 序 破 緣是,本發明 料的保密性和不 透過扣留部分原 列進行壓縮和重 解難度,達到以 依據前述,本 一校驗器,係 、打洞處理前:、 一打洞器,係 之主要目 被修改性 文内容, 組,混淆 較小性能 發明之資 斟程式序 及程式下 將工作站 的即是 之資訊 並對抽 原始程 代價換 訊驗證 列進行 載、縫 欲對伺 提供一種確保遠端載入 驗證裝置與方法,主要 取過部分資訊的原程式 式内容大幅增加攻擊者 取較大安全性的目的。 裝置包括有: 校驗,主要係於程式上 補程式後進行校驗。 服器儲存之整個程式序200414733 V. Description of the invention (1) [Technical field to which the invention belongs] The present invention relates to an information verification device method for ensuring the confidentiality of remotely loaded data and the modification of X4, especially # 不 被 # 二 1 program Part of the sequence is missing information to achieve the purpose of small car performance in exchange for greater security. [Previous technology] Press, remote loading is a mode of booting a workstation on a network by using the server hard disk = station hard disk. At present, the application of the universal terminal startup technology is becoming more and more widely used, especially because it is simple to manage and easy to maintain. This greatly reduces the overall cost of ownership of the system. The main principles of this technology are: • Startup programs, applications, etc.::==Person's Department: When the client needs this part of the program ' In the service status, when the client PR0M) sends a connection request to the server to the server, the request will be sent back. The request sent by the Boo_t client will be returned? The link sent to the temple server should be: address 'user terminal PR0M', and then go through the network to start the process from the server (Βοοΐ program.) Service download—cut the required equipment to start the traditional remote loading method. A secure network environment, each communication ;: f 罔 路 '€ is considered, so the communication security issue has not been ^ to maintain the trust between each other ^ / knife consideration, both parties of the communication are finished 200414733 V. Invention Explanation (2) Information is transmitted and exchanged in a completely open environment. However, with the increasingly prominent problem of network security, many security measures are also used in the remote loading process. Generally, the security measures for the remote loading process include encryption. with There are two types of encryption. The encryption method generally uses general block encryption and stream encryption, and the verification method is mainly Hash function verification. The so-called Hash function verification is to compress the entire program sequence to obtain a short summary 'as said The basis for post-verification. However, the traditional encryption algorithms and hash function check methods have a high degree of computational complexity, a large amount of data, and are difficult to implement. At the same time, the performance requirements of the device are relatively high. At the same time, the registered programs are in a complete form on the Internet. The communication is saved on the server. Therefore, the communication J ί Iί ί has the possibility of being intercepted, cracked, and tampered with. The application of all the methods to the local workstation will harm the local workstation. Wang Zhi caused serious damage to the resources of the local workstation. The reason is that the confidentiality of the material of this invention and the difficulty of compressing and resolving it without detaining some of the original columns are achieved in accordance with the foregoing, this verifier, Before the hole punching process: 1. A hole punch, the main purpose of the line is to modify the content of the text, group, confuse the procedures and procedures for the invention of the smaller performance In this mode, the information of the workstation is loaded and the original process cost is exchanged for the verification column. The device and method are provided to ensure remote loading of the verification device. The content of the original program, which mainly obtained part of the information, has increased significantly. The attacker takes the purpose of greater security. The devices include: Verification, which is mainly performed after the program is supplemented by the program. The entire program sequence stored by the server

第6頁 200414733Page 6 200414733

一加密器, 一解密器, 一解壓縮器 洞位置資訊,將 干空位的程式序 係對前述壓縮形成之程式序 係對自伺服器下載之程式 ^加密。 ’依據本地工作站之儲存:二密。 ^解密之壓縮程式序列重新展以Ϊ; 一縫補器, 回各個副程式序 依據前 前述所分割 數之規則, 本發明 資訊以資料 訊中扣留了 容的不完整 者的破解難 密處理,進 以下將 說明,並參 的副程式序 而此部份則 之另一目的 流程的方式 部分内容, 程式,此缺 度,相對的 而降低加密ί 對本發明t 閱附呈之圖 及增加 對每個 者視實 於局速 時提交 交的程 傳輸内 簡易的 降低系 與技術 本發明 之加解密 列數量及 可由設計 即是適用 操作,同 使得被提 失部分的 將可選擇 強度大服 結構設計 式,將對 破解的困 副程式序 際需求而 通訊的需 給伺服器 式是缺失 容將大幅 加密演算 統的架構 原理,作 之特徵作 列的取樣 定。 要,允許 的保存資 了部分内 提面攻擊 法貫施加 成本。 一詳細之 更進一步An encrypter, a decryptor, a decompressor, and hole location information, the program sequence of the dry space is the program sequence formed by the foregoing compression, and the program downloaded from the server is encrypted. ’Based on local workstation storage: two secrets. ^ The decrypted compressed program sequence is re-developed with Ϊ; a stitcher, each sub-program sequence is based on the rules of the number of divisions previously described, and the information of the present invention is processed by the incomplete person who has detained the content in the data message. The following will explain the subprogram sequence that is involved, and this section is another way of the purpose of the process. The content, the program, the deficiency, and the relative decrease in encryption. For the present invention, please read the attached drawings and add to each The present invention considers that the simple reduction in the transmission during the transmission process at the speed of the system and technology. The number of encryption and decryption columns of the present invention and the applicable operation can be designed. At the same time, the lifted part will choose the strength coat structure design formula. In order to communicate the need for cracked subroutines and communicate with the server, the server type is missing. The architecture principle of the large-scale encryption algorithm is sampled. Yes, the permissible savings are part of the cost of a face-to-face attack. A detailed go one step further

200414733200414733

五、發明說明(4) 之瞭解。 【實施方式】 如第1圖所示,係為本發明實施例之系統硬體架構八 意圖;於本發明實施例採用的方式是將程式序列打洞、= 訊驗證等功能集成於硬體晶片當中,由硬體獨立完成,、 這種功能也可以由特定的軟體完成。 本發明係於本地工作站A進出CPU10的通路上設置硬體 晶片2 0,其主要包括有:一校驗器2 1,係對程式序列進行 校驗,該校驗動作發生在兩種情況下,其一係於程式序y 上傳,打洞處理之前,另一為程式序列下載,縫補程 = 列之後; 斤 一打洞态2 2,係將本地工作站a欲對伺服器B儲存之敕 個程式序列分割為若干個子程式序列,並於各個子程二 列以一定規律抽取資訊。前述程式段與抽取資訊的規^ 由設計者視實際需求而決定分割程式序列數量及每個程 序列的取樣數,同日守這也決定往後加解密及增加破 難度; 听J图 一壓縮器23,係對打洞器22之處理結果進行程式 壓縮處理’用以產生資訊混淆的新程式序列; 一加岔is 2 4 ’係對前述新程式序列進行加密; 一解密器25,係對自伺服器B下載之儲存序列進行解 密; 一解壓縮器2 6,依據本地工作站Α之儲存單元11所儲V. Understanding of Invention Description (4). [Embodiment] As shown in Fig. 1, it is the eight intentions of the system hardware architecture according to the embodiment of the present invention; the method adopted in the embodiment of the present invention is to integrate functions such as program sequence hole punching and verification into the hardware chip Among them, the hardware is completed independently, and this function can also be completed by specific software. The present invention is provided with a hardware chip 20 on the path of the local workstation A to enter and exit the CPU 10, which mainly includes: a checker 21, which checks the program sequence. The check operation occurs in two cases. One is uploading the program sequence y, before punching processing, and the other is downloading the program sequence, the stitching process = after the row; pounding a hole state 2 2 is a program that the local workstation a wants to save to the server B The sequence is divided into a number of subprogram sequences, and information is extracted with a certain regularity in two rows of each subroutine. The foregoing program segment and information extraction rules are determined by the designer according to actual needs. The number of segmented program sequences and the number of samples in each program sequence. On the same day, this also decides to decrypt and increase the difficulty later. 23, program compression processing of the puncher 22 processing result 'new program sequence used to generate information confusion; a Jiacha is 2 4' is used to encrypt the aforementioned new program sequence; a decryptor 25 is used to The storage sequence downloaded by the server B is decrypted; a decompressor 26 is stored according to the storage unit 11 of the local workstation A

200414733 五、發明說明(5) 存之打洞位置資訊,將已解密之壓縮程式序列重新展開為 具有右干空位的程式序列; ’ 一縫補器2 7,係將儲存單元11所儲存之洞值資訊逐一 縫補回各個子程式序列中的原位置,而組合成完整的程式 序歹|J 。 則述之儲存單元11係儲存洞值資訊及其相對應位置, 其可為工作站A本身之記憶體(fUsh)等,亦可製作於晶片 内。 如第2圖所示’係為本發明實施例中,本地工作站向 伺服儲存程式之步驟流程圖; 本地工作A站欲發送的程式序列被傳送至硬體晶片2 〇 八中的枝驗21首先選用一定的校驗方法對流經的程式 f列進行校驗(步驟S1 )(舉例來說,該校驗方法,如:校 馱矛的方法,其係將程式序列逐位元相加,得到的一校驗 2仏如序列0101 1011,其校驗和為丨)。校驗完成後即將此 二,值儲存於儲存單元u中(步驟S2)(如第4圖之(A),容 後詳述)。 邊打洞器2 2接收到經過驗證的欲寄存程式,該程式以 疒^的形式流經硬體晶片2 0,該打洞器2 2根據設定,將寄 子程式序列以一定長度的位元組切割為複數個副程 貝卜以每個副程式序列為單位,從中以-定的規 =為抽取一定長度的資訊作為洞值資訊(步驟S4),將洞 =二,的内容及其在副程式段中的位置保存在本地工作站 存早元12中(步驟S5),即完成打洞過程。被抽取了部 200414733 五、發明說明(6) 分内容的程式序列相應出現了若干空&,使程式序 部分内容缺失。肖壓縮機23將整個程式序列壓縮去 ^ 的空位’使原程式序列之資訊重組且混淆(步驟:、f 清的程式序列再經加密器24加密而轉化為密文(步)驟3此 =由一網路卡12將密文資訊經網路3〇傳送 存 (步驟S7)。D卜,在網路通訊過程中 存 二與:。服器B之間的通訊協定,㈣現有網路相同:此: 如第3圖所示,係為本發明實施例中, J端=式之步驟流程圖;本地工作站A::= iiiirtrrdshaking),^^^^- 吊如絡之後,本地工作站A開始從伺服哭 iLV·: V該下載程式經解密器25解密轉換為明文(;私 ==為若干個副程式序列,且根據本地上個 式序歹重新展開,恢復程式序列為若干空位之狀二 :乂縫補器27從健存單元11中獲得各個洞值資: =内容:並依次將其縫補回各個副程式序列的相貝對: =拼Γ!成完整的程式序列(步_、⑷。該校:: 2 :已拼裝完成的程式序列進行相同的校 :: L /:D6) ’同時自儲存單元11取得内存之上傳程Ϊ: ,二;t(人步驟#D7) ’將此二校驗結果進行比對(步驟 右t果吻合即表示該程式是完整、未經過I改的,可』200414733 V. Description of the invention (5) Save the hole location information, and re-expand the decrypted compressed program sequence into a program sequence with a right stem space; 'One stitcher 2 7 is the hole value stored in the storage unit 11 The information makes up the original position in each sub-program sequence one by one, and is combined into a complete program sequence 歹 | J. The storage unit 11 described above stores the hole value information and its corresponding location, which can be the memory (fUsh) of the workstation A itself, or it can be produced in the chip. As shown in FIG. 2 'is the flowchart of the steps of the local workstation storing the program in the embodiment of the present invention; the sequence of the program to be sent by the local station A is transmitted to the hardware chip 208. A certain verification method is used to verify the flow of the program f (step S1) (for example, the verification method, such as the method of calibrating a spear, is to add the program sequence bit by bit to obtain A check 2 such as the sequence 0101 1011 has a checksum of 丨). Immediately after the verification is completed, the two values are stored in the storage unit u (step S2) (see (A) in FIG. 4 and described in detail later). The edge puncher 2 2 receives the verified program to be registered. The program flows through the hardware chip 20 in the form of 疒 ^. The puncher 2 2 sends the subroutine sequence to a certain length of bits according to the setting. The group is cut into a plurality of subroutines. Each subroutine sequence is taken as a unit, from which a predetermined rule is used to extract information of a certain length as hole value information (step S4). The position in the sub-program segment is saved in the local workstation storage element 12 (step S5), and the punching process is completed. 200414733 was extracted 5. The description of the program (6) The contents of the program sequence appeared a number of empty & correspondingly, the contents of the program sequence were missing. The Shao compressor 23 compresses the entire program sequence to remove the vacant space ^ to reorganize and obfuscate the information of the original program sequence (step: f program sequence is encrypted by the encryptor 24 and converted into cipher text (step) Step 3 this = The ciphertext information is transmitted and stored by the network card 12 via the network 30 (step S7). D. The communication protocol between the server 2 and the server B during the network communication is the same as that of the existing network. : This: As shown in FIG. 3, it is a flowchart of the steps of the J-end = formula in the embodiment of the present invention; the local workstation A :: = iiiirtrrdshaking), ^^^^-After hanging the network, the local workstation A starts From the servo cry iLV ·: V, the downloaded program is decrypted and converted into plain text by the decryptor 25 (; private == is a number of sub-program sequences, and is re-expanded according to the previous local sequence, and the program sequence is restored to a number of empty seats. : The quilting applicator 27 obtains the value of each hole from the health storage unit 11: = content: and sequentially sew it back to each phase of each subroutine sequence: = fight Γ! Into a complete program sequence (step _, ⑷. The school: 2: 2: The assembled program sequence is performed the same school :: L /: D6) 'Self-storage at the same time Memory unit 11 obtains the upload process Ϊ:, two; t (Step person # D7) 'second check result of this comparison (step t the right means that if this program is consistent with a complete, I have not been changed, the "

第10頁 200414733 五、發明說明(7) 正常使用(步驟D 9 );否則,本地工作站A將視其為錯誤程 式拒絕使用(步驟D1 0 )。之後,本地工作站a即能利用通過 校驗的程式,完成本地工作站A的工作需求,如啟動工作 站等。 有關前述打洞器的切割與打洞流程,以下配合於第4 圖之(A )〜(C)部分所示,舉例說明如下: 第4圖之(A)係顯示了整個程式序列,每一個地址資 訊對應著一個位元組的程式資訊,在本實施例中以每256 個位元組劃分為一個副程式序列(如圖所示副程式序列1、 2),從而整個程式序列被分割為若干個副程式序列。 _ 第4圖之(Β)係顯示打洞過程,在本實施例中,打洞 器22 ^各個副程式序列的隨機位置,抽取出一定位組長度 的内容,再用丨位元組保存抽取出的字串在副程式序列中 ,相對位置,例如抽取位址為〇〇56[1至〇〇5911的4位元组内 ,育訊,,此儲存單元丨丨保存的地址資訊為:〇〇56Η,保 子的内谷資吼為〇1〇〇1〇〇11〇1〇〇〇〇〇〇〇〇111 ⑽ 。又 或是打洞器22在副程式序列的任意四個隨機位置各抽取1 二資訊,並用另外4個位元組分別保存4個位元組在 二::歹,J中的位置。是故,本發明之打洞方式可以靈活 又疋〃不同的设疋可以實現不同的安全性能。 壓縮ί二圖ΐ?)係顯示被抽取了部分資訊的程式序列的 ,將上:了部分資訊的程式序列出現了若干空位 施::ί面的内容向前推,壓縮去所有的空&。在本實 ,地址為0056Η至0 05 9Η的資訊被抽取出來,原地址Page 10 200414733 V. Description of the invention (7) Normal use (step D 9); otherwise, the local workstation A will regard it as an error and refuse to use it (step D1 0). After that, the local workstation a can use the program that passed the verification to fulfill the work requirements of the local workstation A, such as starting the workstation. Regarding the cutting and punching process of the aforesaid puncher, the following is shown in (A) ~ (C) of Figure 4 for an example: Figure 4 (A) shows the entire program sequence, each The address information corresponds to one byte of program information. In this embodiment, every 256 bytes are divided into a subroutine sequence (as shown in the subroutine sequences 1, 2), so that the entire program sequence is divided into Several subroutine sequences. _ Figure 4 (B) shows the punching process. In this embodiment, the puncher 22 ^ random positions of each subroutine sequence, extracts the content of a positioning group length, and then saves and extracts it with 丨 bytes. The relative position of the output string in the subroutine sequence, for example, extract the address in the 4-byte address of 〇56 [1 to 〇05911, Yuxun, and the address information saved in this storage unit is: 〇 〇56Η, Hoko's Uchiya shouts are 001,001,001,100,000, and 111%. Or the puncher 22 extracts one or two pieces of information at any four random positions in the subroutine sequence, and uses the other four bytes to save the positions of the four bytes in two :: 歹, J. Therefore, the hole punching method of the present invention can be flexible and different settings can achieve different security performances. Squeeze the second picture ΐ?) Is to show the program sequence with some information extracted. There will be a number of vacancies in the program sequence with the partial information: Push the contents of the side forward and compress all empty spaces. . In this case, the information from addresses 0056Η to 0 05 9 被 is extracted. The original address

第11頁 200414733 '發明說明(8) ____ 為0 05A的内容向前提至地址〇〇56H, =為位元組^由於電腦中的—μ訊 二;斗均為二進位碼’經過抽取和重組後的二進位碼由7 : 容的缺失’在含義上也出現極大出入,以本;::=内 =Γ次2於每2 5 6個位元組的副程式序列中隨機抽取了歹4位 的Μ,即從中抽取出32位元的資訊,破解者 截獲的資訊時,每25Θ個位元組即有232種 刀析 就給最終破解帶來很大的難度/有232種不R的可能,這 根據以上敘述,本發明所提供的確保遠端載入Page 11 200414733 'Invention description (8) ____ is 0 05A content to the premise to the address 〇56H, = is a byte ^ due to the computer's — 讯 讯 二; buckets are binary codes' after extraction and reorganization The latter binary code is also very different in meaning from 7: the lack of the content, in terms of meaning: :: = 内 = Γ 次 2 in every 2 5 6 bytes of subroutine sequences randomly extracted 歹 4 Bit M, that is, 32-bit information is extracted from it. When the cracker intercepts the information, there are 232 kinds of knife analysis for every 25Θ bytes, which will bring great difficulty to the final crack. Possibly, according to the above description, the present invention provides a guarantee for remote loading

c不被修改性之資訊驗證裝置與方&扣:呷 刀原文内容,並對抽取過部分資 用ί遠口P 和重组,;r4 & &二 的原式序列進行壓縮 不垔、、且,仗而原私式的内容被混淆,即使在 非法者截獲了通訊中傳輸的所有資 。壬中, 面對極大難度。更由於攻擊者破解的難:文t將 雙方可以採取相對簡單的加密方因 2.网,通讯 入實現較高的安全性能,且可以以較小投 以實現,可以編制相應的軟體,以採用靈活的方式予 於硬體晶片中,由硬體直接完成也=將料程直接集成 程提供了更具安全性的一道屏障。糸統為退端載入的過 綜上所述,本發明所提供的企 土 性和不被修改性之資訊驗證裝端載入資料的保密 了特殊的處理,從而使用戶敲鍵::::鍵盤裝置進行 獲,並以此為認證的依據;2=行為習慣可以被捕 證資訊的簡單對照’而是對行為二:;的過程中’ *是認 丁為的特欲進行概率統計,通 200414733c The information verification device that is not modified and Fang & buckle: the original content of the sword, and the extracted part of the resource 远 Yuankou P and reorganization; r4 & & Moreover, the original private content is confused, even if all the information transmitted in the communication is intercepted by the illegal person. Renzhong, facing great difficulty. It is even more difficult for attackers to crack: the two parties can adopt relatively simple encryption methods. 2.net, communication to achieve high security performance, and can be implemented with a small investment, corresponding software can be compiled to use The flexible method is given in the hardware chip, and it is directly completed by the hardware. The direct integration of the material process provides a more secure barrier. To sum up, for the back-end loading, as mentioned above, the enterprise-owned and unmodifiable information provided by the present invention verifies the confidentiality of the loaded loading data, so that the user can type keys ::: : The keyboard device is obtained and used as the basis for authentication; 2 = The simple comparison of the behavioral habit can be arrested for the information of the warrant ', but for the behavior of the two :; In the process of' *, it is the special desire to recognize the probabilistic statistics. 200414733

200414733 圖式簡單說明 【圖式簡單說明】 第1圖係為本發明實施例之系統硬體架構示意圖; 第2圖係為本發明實施例中,本地工作站向伺服器儲存程 式之步驟流程圖; 第3圖係為本發明實施例中,本地工作站自遠端載入程式 之步驟流程圖; 第4圖係為本發明實施例中,啟動過程中上傳及下載程式 序列之貧料處理不意圖。 圖號說明 10 中央處理單元 11 儲存單元 12 網路卡 20 硬體晶片 21 校驗器 22 打洞器 23 壓縮器 24 力口密器 25 解密器 26 解壓縮器 27 縫補器 30 網路 A 本地工作站 B 伺服器200414733 Brief description of the drawings [Simplified illustration of the drawings] Figure 1 is a schematic diagram of the hardware architecture of the system according to the embodiment of the present invention; Figure 2 is a flowchart of the steps for the local workstation to store the program to the server in the embodiment of the present invention; FIG. 3 is a flowchart of steps for loading a program from a remote station by a local workstation according to an embodiment of the present invention; and FIG. 4 is a diagram of the processing of uploading and downloading program sequences during startup in accordance with an embodiment of the present invention. Description of Drawing Numbers 10 Central Processing Unit 11 Storage Unit 12 Network Card 20 Hardware Chip 21 Checker 22 Hole Punch 23 Compressor 24 Force Sealer 25 Decryptor 26 Decompressor 27 Stitcher 30 Network A Local Workstation B server

第14頁Page 14

Claims (1)

200414733 六 2 申請專利範圍 [· 一種資訊驗證梦番 和不被修改性,、包括=以確保遠端载入資料的保密性 存於-儲,單;^:耘式序列校驗’並產生-校驗值儲 程式序列分割為:d:伺:器儲存之整個 序列定規律抽式序列,並於各個副程式 二壓縮器,係對該打洞器之 屢'?以產生資訊混淆的新程式序 1進仃程式序列 -力二、器’係對該新程式序列進行:穷. 解社、器,係對自該飼服哭 ^ 密; w下载之程式序列進行解 ,^縮器,依據該儲存單元所儲存之 程式序列;式序列重新展開為具有若干空位的 一縫補器,係將該儲存單元 縫補回各個副程式序列中的原:存之洞值資訊逐-程式序列。^甲的原位置’而組合成完整的 範圍第1項所述之資訊驗證裝置,其中該 縫補後組合之完整程式序=列此,補器 進行比對,以判斷程式之完整性r此二权驗值將 ΞΓί專,範圍第1項所述之資訊驗證裝置,其中該 存早几係一快閃記憶體⑴ash)或該工作站自有之、己 第15頁 200414733 六、申請專利範圍 憶體。 一種確保 驗證方法 和重組, 上傳程式 一下栽程 中該上傳 a•對程 b ·進行 機抽 c.壓縮 至該 該下載程 d·對程 列; 4 遠端載入資料的保密性和不被修改性 ’主要是通過對程式序列資訊的抽取、壓縮 使得所述程式序列缺失部分資訊,其勺、一 ’以供一工作站將程式上傳至一伺服^括I 式,以供該工作站自該伺服器下載裎直 程式包括下列步驟: $ ’ ” 式序列進行校驗; 程式分割,並對每一個分割的副程式序列隨 取一定位組長度的資訊; 步驟b所產生的副程式序列,並透過網路上傳 伺服器; 式包括下列步驟·· 式重新展開與缝補’以組合成完整的程式序 e •對步驟d的啟動程式進行校驗,以確定程式是否完 整、有否被篡改; f •若校驗成功,則該工作站得以應用此程式。 如申請專利範圍第4項所述之確保遠端載入資料的保 松性和不被修改性之資訊驗證方法,其中該步驟a係 產生一校驗值,且該校驗值係儲存於一儲存單元。 如申請專利範圍第4項所述之確保遠端載入資料的保 讼性和不被修改性之資訊驗證方法,其中該步驟b中 係將抽取的洞值資訊與其在副程式段中的相對位置儲200414733 June 2 Patent Application Scope [· A type of information verification dream fan and is not modified, including = to ensure the confidentiality of remotely loaded data stored in-storage, single; ^: yun-type sequence check 'and generate- The check value storage program sequence is divided into: d: servo: the entire sequence of the regular storage pumping sequence, and two compressors in each subroutine, is a new program for the hole puncher to generate information confusion Sequence 1 enters the program sequence-Li Er, Qi 'is to perform the new program sequence: poor. Xie Society, Qi, is to cry from the feeding service ^ secret; w download the sequence of the program, ^ shrink, according to The program sequence stored in the storage unit; the formula sequence is re-expanded into a stitcher with a number of vacancies, which is to sew the storage unit back to the original: stored hole value information in each sub-program sequence step-by-program sequence. ^ A's original position 'and combined into the complete range of the information verification device described in item 1, wherein the complete program sequence of the stitched combination = listed here, the complementer compares to determine the completeness of the program. The verification value will be the information verification device as described in the first item of the scope, in which the stored memory is a flash memory (ash) or the workstation's own, which is already on page 15 200414733. . A method to ensure the verification and reorganization, upload the program in the upload process, upload the program a • process b • machine extraction c. Compress to the download process d • process sequence; 4 the confidentiality of the remotely loaded data and not be “Modifiability” is mainly caused by the extraction and compression of program sequence information to make the program sequence lack some information. It is used for a workstation to upload a program to a server, including I, for the workstation to upload the program from the server. The program downloading program includes the following steps: $ '”sequence verification; program segmentation, and each segmented subroutine sequence is followed by a piece of positioning group length information; the subroutine sequence generated in step b, and Network upload server; The formula includes the following steps ... The formula is re-expanded and stitched to form a complete program sequence. • The startup program of step d is verified to determine whether the program is complete and has been tampered with. F • If the verification is successful, the workstation can apply this program. As described in item 4 of the scope of patent application, ensure that the remotely loaded data is loose and not modified. Information verification method, wherein the step a generates a check value, and the check value is stored in a storage unit. As described in item 4 of the scope of patent application, the content of the remotely loaded data is guaranteed and protected Modified information verification method, wherein in step b, the extracted hole value information is stored with its relative position in the subroutine 8 9 200414733 六、申請專利範圍 存於一儲存單元。 7 ·如申請專利範圍第4項所述之確保遠端载入資料的保 密性和不被修改性之資訊驗證方法,其中該步驟b中 資訊抽取的方式,可為連續抽取一定位元組長度的資 如申請專利範圍第4項所述之確保遠端載入資料的/ 密性和不被修改性之資訊驗證方法,其中該步驟b中 資訊抽取的方式,可分別抽取幾個單字節資訊,並 相同的位元組數記錄每個打洞位置。 如申請專利範圍第4項所述之確保遠端載入資料的/ 社、性和不被修改性之資訊驗證方法,其中該步驟c更 包括有加密步驟,以增加破解的困難度。 1 〇 ·如申請專利範圍第4項所述之確保遠端載入資料的/ 密性和不被修改性之資訊驗證方法,其中該步驟d更 包括有解密步驟,用以將該伺服器所儲存的密文程: 解密為明文程式。 · u.=申請專利範圍第4項所述之確保遠端载入資料的4 =生和不被修改性之資訊驗證方法,其中該步驟^斤 二=,據儲存單凡之記錄逐一縫補回各個子程式士 t的原位置。 12. 圍第4項所述之確保遠端载入資謂 m不被修改性之資訊驗證方法,其中該步驟“系 ,=:=:並與保存於一儲存單元之校驗值比彰 確疋長式是否完整、有否被篡改。8 9 200414733 6. The scope of patent application is stored in a storage unit. 7 · The information verification method for ensuring the confidentiality of the remotely loaded data and no modification as described in item 4 of the scope of the patent application, wherein the information extraction method in step b can continuously extract a positioning tuple length The information verification method for ensuring remotely loaded data / confidence and no modification as described in item 4 of the scope of patent application, wherein the information extraction method in step b can extract several single-byte information separately. And record the position of each hole with the same number of bytes. As described in item 4 of the scope of the patent application, a method for verifying the remotely loaded data / social, non-modifiable and non-modifiable information is verified. The step c further includes an encryption step to increase the difficulty of cracking. 1 〇 · The information verification method for ensuring the remotely loaded data confidentiality and unmodifiability as described in item 4 of the scope of patent application, wherein step d further includes a decryption step for Stored cipher text program: Decrypted into plain text program. · U. = The method for ensuring remote loading of data as described in item 4 of the scope of patent application. 4 = Information verification method for generating and not being modified, where this step is ^ Jin Er =. The original position of each subroutine t. 12. The information verification method for ensuring that the remotely loaded title m is not modified as described in item 4, wherein the step "is, =: =: and is compared with the check value stored in a storage unit.疋 Whether the long form is complete and has been tampered with.
TW92101749A 2003-01-27 2003-01-27 Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof TW595182B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW92101749A TW595182B (en) 2003-01-27 2003-01-27 Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW92101749A TW595182B (en) 2003-01-27 2003-01-27 Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof

Publications (2)

Publication Number Publication Date
TW595182B TW595182B (en) 2004-06-21
TW200414733A true TW200414733A (en) 2004-08-01

Family

ID=34075959

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92101749A TW595182B (en) 2003-01-27 2003-01-27 Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof

Country Status (1)

Country Link
TW (1) TW595182B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10348693B2 (en) 2009-12-15 2019-07-09 Microsoft Technology Licensing, Llc Trustworthy extensible markup language for trustworthy computing and data services
US10348700B2 (en) 2009-12-15 2019-07-09 Microsoft Technology Licensing, Llc Verifiable trust for data through wrapper composition

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10348693B2 (en) 2009-12-15 2019-07-09 Microsoft Technology Licensing, Llc Trustworthy extensible markup language for trustworthy computing and data services
US10348700B2 (en) 2009-12-15 2019-07-09 Microsoft Technology Licensing, Llc Verifiable trust for data through wrapper composition

Also Published As

Publication number Publication date
TW595182B (en) 2004-06-21

Similar Documents

Publication Publication Date Title
US10536272B2 (en) Encryption system with double key wrapping
US20190073486A1 (en) Method for strongly encrypting .zip files
CN107566407B (en) Bidirectional authentication data secure transmission and storage method based on USBKey
CN105051750B (en) System and method for encrypted file system layer
WO2021218885A1 (en) Security and confidentiality protection method and system for data transmission
US20090022319A1 (en) Method and apparatus for securing data and communication
WO2007048335A1 (en) An encrypted transmission method and equipment system for preventing copying the data resource
CN104935568A (en) Interface authentication signature method facing cloud platform
KR20130056342A (en) Secure and efficient content screening in a networked environment
JP2006504309A (en) Device key
EP2064648A1 (en) Fabrication of computer executable program files from source code
KR20090016282A (en) Digital rights management and method for partial encryption of content
US11681499B2 (en) Data set including a secure key
US20040139317A1 (en) Methods for improved security of software applications
CN113468598A (en) Block chain-based certificate-preserving and security notarization system and method
US10268832B1 (en) Streaming authenticated encryption
CN114244508B (en) Data encryption method, device, equipment and storage medium
CN115906181A (en) Encrypted file right confirming method, device and system based on block chain attribute
Shirey et al. Analysis of implementations to secure git for use as an encrypted distributed version control system
CN109871698B (en) Data processing method, data processing device, computer equipment and storage medium
JP2007527561A (en) System and method for controlling the use of software on a computer device
CN112667975A (en) Android system application software safety protection method based on hybrid reinforcement
TW200414733A (en) Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof
CN112804563A (en) Media file playing method and device and storage medium
CN111294388B (en) Configuration file generation method, device, equipment and storage medium