TW595182B - Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof - Google Patents

Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof Download PDF

Info

Publication number
TW595182B
TW595182B TW92101749A TW92101749A TW595182B TW 595182 B TW595182 B TW 595182B TW 92101749 A TW92101749 A TW 92101749A TW 92101749 A TW92101749 A TW 92101749A TW 595182 B TW595182 B TW 595182B
Authority
TW
Taiwan
Prior art keywords
program
sequence
information
data
item
Prior art date
Application number
TW92101749A
Other languages
Chinese (zh)
Other versions
TW200414733A (en
Inventor
Chien-Tzu Hou
Original Assignee
Geneticware Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Geneticware Co Ltd filed Critical Geneticware Co Ltd
Priority to TW92101749A priority Critical patent/TW595182B/en
Application granted granted Critical
Publication of TW595182B publication Critical patent/TW595182B/en
Publication of TW200414733A publication Critical patent/TW200414733A/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to an information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof, in particular, the method and device that deducts the partial original article contents, further proceeds the compression and reorganization regarding the original program sequence experienced with the partial data extraction, messes up the original program contents and significantly increases the decryption difficulty of hacker. The device comprises a calibrator, puncher, compressor, encoder, sewing unit, decompressor and decrypter. Local workstation intends to submit the program to the server. Divide the program into several subroutine sequences by going through the calibration program of calibrator and saving the calibration result. Proceed punching process in the unit of subroutine sequence and store the data where the hole is located in storage unit. The sequence blank space appears after compressing the punched subroutine sequence, making partial contents miss from the original sequence. Further encrypt the new sequence and then go through the network to be stored in the server. When downloading program from the remote site, the local workstation downloads program from the server. After decrypting and decompressing sequence, the stored hole value data is sequentially patched and restored to the original complete program sequence in accordance with the stored punched data in the storage data. Later, proceed equivalent calibration and compare the result with the original calibrated value in the storage unit to determine if the program is complete or modified. After passing the calibration, the local computer can then operate the program.

Description

595182 五、發明說明(1) 【發明所屬之技術領域] 本發明係有關-種確保遠端栽入資料的 修改性之資訊驗證裝置與方法,特別是通過抽取ϋ皮 重組的方法’使得所述程式序列缺失部分資訊, 較小性能代價換取較大安全性的目的。 達到以 【先前技術】 卫二更入ϊ通過使用飼服器硬碟上的資源來代替 作站硬碟引V-台網路上的工作 遠端啟動技術的應用日益廣令,士、甘、目别,k種 原因是因為它管理簡單容ί其是J教育場合,究其 。 攸而大大降低了系統整體的擁有成本 這種技術的主要焉ί¥县·田 如:啟動程式、岸:ϋ:戶端個人電腦的部分程式 端⑹ent)需㈣部分;^時====’當客戶 P_)中向伺服器發送連接4上其啟動過WBoot 客戶端送出的要求\合=\ 得1p。當伺服器收到 收到伺服35、.,Ψ / έ 。傳連結應答及I P位址,用戶端接 ^〇M) Pt ^ ^ ^ ^ , tY ^ ^(B〇〇t 程式。 攸彳Ί服^下載一切所需的設備啟動 傳統遠端載人古4'夕 相對安全的網路環产ζ ^區域網路,這是一個被認為 ’故通訊安全問^ ϋ 各方之間保㈣彼㈣的信任 、並未被予以充分考慮,通訊雙方均在完595182 V. Description of the invention (1) [Technical field to which the invention belongs] The present invention relates to a kind of information verification device and method for ensuring the modification of data implanted at a remote site, in particular, a method for extracting and reassembling skin to make the said Some information is missing in the program sequence, and a small performance cost is exchanged for a larger security purpose. [Previous technology] Wei Ergeng has been using the resources on the feeder hard disk to replace the work on the hard disk to guide the work on the V-Taiwan network. The use of remote start technology has become increasingly widespread. No, the k reasons are because it is easy to manage and it is a J education occasion. This greatly reduces the overall cost of ownership of the system. The main technologies of this technology are county and field: startup programs, shore: ϋ: part of the client terminal's personal computer (enter) required parts; ^ 时 ==== 'When the client P_) sends to the server the request sent by the WBoot client on connection 4 on the connection \ he = \ got 1p. When the server receives the servo 35, ..., Ψ / έ. Send link response and IP address, user terminal ^ 〇M) Pt ^ ^ ^ ^, tY ^ ^ (B〇〇t program. 彳 Ί 服 ^ Download all necessary equipment to start the traditional remote manned ancient 4 'Even a relatively secure network environment produces a ^ local area network, which is considered to be' so communication security issues ^ ㈣ The trust between the parties to protect each other has not been fully taken into account, both parties are in the process of completion.

第5頁 595182 五、發明說明(2) 全開放的環境下傳遞、交換資訊。 安全手段亦 過程的安全 通用的塊加 驗。所謂 到一簡短的 算法和Hash ’實現困難 式是以完整 ,因此通訊 能,而將經 本地工作站 破壞。 但在網路安全問題日益突出的今天,諸多 應用於遠端載入過程當中。通常對於遠端載入 措施包括加密和校驗兩種。加密方法一般採用 密和流加密,而校驗的手段主要*Hash函數校 Hash函數校驗,係將整個程式序列進行壓縮得 摘要,作為日後驗證的依據。然而傳統加密演 函數校驗方法的運算複雜程度很高,資料量大 ^對於設備的性能要求較高;同時,寄存的程 資訊的形式在網上通訊、並在伺服器上保存的 和f存過程中,均有被截獲、破解和篡改的可 過篡改過的程式惠用於本地工作站中,將危害 的安全,甚至對本地工作站的資源造成嚴重二 【發明内容】 ,緣是,本發明之主要目的即是提供一 =和不被修改性之資訊崎置=^ 内容,並對抽取過部分資訊的原程ΐ 退订反縮和重組’混淆原始 =前rr小性能代價換取較大== —康迷’本發明之資訊驗證裝置包括有. 傳、「丁:=;係ϊ程式序列進行校驗,…於程式上 -打洞哭'技氡式下載、縫補程式後進行校驗。 -’係將工作站欲對伺服器儲存之整個程式序 五、發明說明(3) 列分割為若干個 規律抽取資訊; 的位置將保存在 一壓縮器, 用以產生資訊混 一加密器, 一解密器, 一解壓縮器 洞位置資訊,將 干空位的程式序 一缝補器, 回各個副程式序 副程式序列 該抽取出的 本地工作站 係對打洞器 淆的新程式 係對前述壓 係對自伺服 ’依據本地 已解密之壓 列。 係將儲存單 列中的原位 ,並於各個副程式序列以一定 洞值資訊及其在副程式序列中 的儲存單元。 之處理結果進行程式段壓縮, 序列。 备§形成之程式序列進行加密。 器下載之程式序列進行解密。 工作站之儲存早元所儲存之打 縮程式序列重新展開為具有若 元所儲存之洞值資訊逐一縫補 置,而組合成完整的程式序列 义、、依據則述’本發明之加解密及增加破解的困難度係視 月0述所分割的副程式序列數量及對每個副程式序列的取樣 數之規1 ’而此部份則可由設計者視實際需求而定。 _本f明之另一目的即是適用於高速通訊的需要,允許 ,訊以資料流程的方式操作,同時提交給伺服器的保存資 =中扣2 了部分内容,使得被提交的程式是缺失了部分内 谷的不完整程式,此缺失部分的傳輸内容將大幅提高攻擊 者的破解難度’相對的將可選擇簡易的加密演算法實施加 密處理’進而降低加密強度大服降低系統的架構成本。 以下將對本發明之結構設計與技術原理,作一詳細之 說明’並參閱附呈之圖式,將對本發明之特徵作更進一步Page 5 595182 V. Description of the invention (2) Information is transmitted and exchanged in a fully open environment. Safety measures are also used for process safety. General block verification. So-called to a short algorithm and Hash ′ implementation difficulty is complete, so communication can be destroyed by the local workstation. But nowadays, network security issues are becoming increasingly prominent, and many of them are used in remote loading. Usually for remote loading measures include encryption and verification. The encryption method generally uses dense and stream encryption, and the verification method mainly uses Hash function calibration. Hash function verification is to compress the entire program sequence into a summary, which is used as the basis for future verification. However, the traditional encryption function verification method has a high degree of computational complexity and a large amount of data. ^ High requirements are placed on the performance of the device. At the same time, the registered process information is communicated on the Internet, and saved on the server and f. In the process, there are intercepted, cracked, and tamperable programs that can be tampered with, and are used in the local workstation, which will endanger the security and even cause serious damage to the resources of the local workstation. [Summary of the Invention] The main purpose is to provide one = and unmodifiable information = ^ content, and the original process of extracting part of the information 订 unsubscribe and shrink and reorganize 'confuse the original = the former rr small performance cost in exchange for the larger == —Kang Fan 'The information verification device of the present invention includes: Chuan, "Ding: =; is a program sequence for verification, ... on the program-punch hole cry" technical download, stitching program for verification.- 'It is the entire program sequence that the workstation intends to store on the server. Fifth, the description of the invention (3) The column is divided into a number of regularly extracted information; the location of the will be saved in a compressor, used to generate information mixed with an encryptor, a solution A decompressor, a decompressor hole position information, a program for dry vacancies, a patcher, back to each subroutine sequence, the subroutine sequence. The extracted local workstation is a new program that confuses the hole puncher. The "self-servo" is based on the locally decrypted pressure train. It will store the original position in a single train, and use certain hole value information in each subroutine sequence and its storage unit in the subroutine sequence. The processing results are compressed in blocks. , Sequence. The program sequence formed by § is encrypted. The program sequence downloaded by the device is decrypted. The shrinking program sequence stored in the workstation and stored in the early yuan is re-expanded to have the hole information stored by Ruoyuan one by one. The meaning of a complete program sequence is based on the statement 'The encryption and decryption of the present invention and the increase in the difficulty of cracking are based on the rules of the number of subroutine sequences divided and the number of samples for each subroutine sequence.' This part can be determined by the designer according to actual needs. _ Another purpose of this document is to meet the needs of high-speed communication. Mode operation, and the saved assets submitted to the server at the same time = some of the content is deducted, so that the submitted program is an incomplete program missing some inner valleys, and the transmission of this missing part will greatly increase the difficulty of attackers' cracking. In contrast, a simple encryption algorithm can be selected to implement encryption processing, thereby reducing the encryption strength and service cost of the system. The structure design and technical principle of the present invention will be described in detail below, and refer to the attached drawings , Will further the characteristics of the present invention

第7頁 595182Page 7 595182

之瞭解。 【實施方式】 音圖如ΐf所示’係為本發明實施例之系統硬體架構示 施例採用的方式是將程式序列打洞、資 集成於硬體晶片當中,由硬體獨立完成,而 攻種功爿b也可以由特定的軟體完成。 乂發:係於本地工作站八進出CPU10的通路上設置硬體 1 包括有:一校驗器21,係對程式序列進行 2 :亥校:動作2生在兩種情況下,其一係於程式序列 =後打洞處理之前,另-為程式序列下冑,縫補程式序 個程式序列分割為若干個子程二欲^司服器㈣存之整 列以-定規律抽取資訊。前述=盘”程式序 由設計者視實際需求而決定分宝j 4 ^ ^ ^貝訊的規則可 序列的取樣數,同時這也:歹」數量及每個程式 難度; τ、μ疋在後加解密及增加破解的困 一壓縮器23,係對打洞器22之處理結果 壓縮處理,用以產生資訊混淆的新程式序列· ^序列 -加密器24 ’係對前述新程式序列進行加 密;-解密器25,係對自伺服器Βτ載之儲存序列進行解 一解壓縮器2 6 依據本地工作站A 之儲存單元11所健To understand. [Embodiment] The sound diagram shown as ΐf 'is the hardware architecture of the system according to the embodiment of the present invention. The method used in the embodiment is to punch a program sequence and integrate it into a hardware chip, which is completed by the hardware independently. The attack function 爿 b can also be performed by specific software. Burst: The hardware 1 is installed on the path of the local workstation eight in and out of CPU10. It includes: a checker 21, which performs program sequence 2: Hai school: Action 2 is generated in two cases, one of which is based on the program Sequence = before punching processing, another-for the program sequence, the program sequence is divided into a number of sub-processes, and the entire row saved by the server is extracted using a regular pattern. The aforementioned = disk "program sequence is determined by the designer according to actual needs. The number of samples that can be sequenced by the rules of JB ^ ^ ^ ^, and this is also: 歹" quantity and the difficulty of each program; τ, μ 疋 are later A compressor 23 for encryption, decryption, and cracking is a compression process of the processing result of the puncher 22 to generate a new program sequence for information confusion. ^ Sequence-encryptor 24 'encrypts the aforementioned new program sequence; -Decryptor 25, which decompresses the storage sequence carried by the server Bτ, a decompressor 2 6 according to the health of the storage unit 11 of the local workstation A

第8頁 595182Page 8 595182

存之打洞位置資訊,將已解密 具有若干空位的程式序列; 之壓縮程式序列重新展 開為 縫補 序列 一縫補器27,係 回各個子程式序 將儲存單元11所儲存之洞值資訊逐一 列中的原位置,而組合成完整的程式 其 内 如第2圖所示,係為本發明實施例中’Save the hole location information, and decrypt the program sequence with several vacancies; the compressed program sequence is re-expanded into a stitching sequence, a stitcher 27, which returns to each subroutine and lists the hole value information stored in the storage unit 11 one by one. The original position, and combined into a complete program as shown in Figure 2, it is in the embodiment of the present invention '

伺服器儲存程式之步驟流程圖; 枣也作站# ^地工作A站欲發送的程式序列被傳送至硬體晶片 2中的校驗器21首A選用一定的校驗方法對流經_ 序列進行校驗(步驟S1)(舉例來說’該校驗方法,如:校 驗矛的方法,其係將程式序列逐位元相加,得到的一校塌 =如序列GlGllGll ’其校驗和為υ。校驗完成後即將出The flow chart of the procedure for the server to store the program; Zaozuo Zuo Station # ^ 地 工作 A The sequence of the program to be sent by the station is transmitted to the checker 21 in the hardware chip 2. The first A selects a certain check method for the flow-through sequence. Check (step S1) (for example, 'the check method, such as the method of checking the spear, is to add the program sequence bit by bit to get a collapsing = such as the sequence GlGllGll' its checksum is υ. Coming soon after verification

广,值儲存於儲存單元11中(步驟S2)(如第4圖之(Α),I 後坪述)。The value is stored in the storage unit 11 (step S2) (as shown in FIG. 4 (A), described later in I).

該打洞器2 2接收到經過驗證的欲寄存程式,該程式以 序=的形式流經硬體晶片20,該打洞器22根據設g^寄 存程式序列以一定長度的位元組切割為複數個副程式序列 (步fS3 ),並以每個副程式序列為單位,從中以一定的規 則^機抽取一定長度的資訊作為洞值資訊(步驟S4 ),將洞 值資訊=内容及其在副程式段中的位置保存在本地工作站 的儲存單元1 2中(步驟s 5 ),即完成打洞過程。被抽取了部The hole puncher 22 receives a verified program to register, and the program flows through the hardware chip 20 in the form of sequence =. The hole puncher 22 cuts a byte of a certain length into A plurality of subroutine sequences (step fS3), and using each subroutine sequence as a unit, a certain length of information is extracted from the certain sequence as hole value information (step S4), and the hole value information = content and its The position in the sub-program segment is stored in the storage unit 12 of the local workstation (step s 5), and the punching process is completed. Extracted

第9頁 595182 五、發明説明(6) 分内容的程式序列相應出現了若干空位,使程式序列中的 部分内容缺失。該壓縮機23將整個程式序列壓縮去除所有 的空位,使原程式序列之資訊重組且混淆(步驟S6)。此混 涛的輕式序列再經加密器24加密而轉化為密文(步驟S6), 經由〆網路卡1 2將密文資訊經網路3 〇傳送至伺服器β儲存 (步驟S7)。另外,在網路通訊過程中,同樣需要依據工作 站Α與伺服器Β之間的通訊協定,此與現有網路相同於此不 另贅述。 如弟3圖所示’係為本發明實施例中 遠端載入程式之步驟流程圖;本地工作站A與伺服器^ : ^ 透過正常的握手協定(handshaking),達成彼此之間的正 ¥聯絡之後,本地工作站A開始從伺服器B遠端下載所需程 式(步驟D1),該下載程式經解密器25解密轉換為明文(步 驟D2),解壓縮器26即依壓縮器23所制定的規律,將整個 程式序列劃分為若干個副程式序列,且根據本地工作站a 3存:元1 i所紀錄的各副程式序列打洞的位置資訊將程 式序歹重新展開,恢復程式序列為若干空位之狀態(步 D3:D4),該縫補器27從儲存單元u中獲得各個洞值資訊 作二内谷,並依次將其縫補回各個副程式序列的相對庫 =拼Γΐ成完筆的程式序列(步驟D5、D4)。該校驗ί 莫 、70成的私式序列進行相同的校驗得到一個校給 結果(步’同時自儲存單Μ m 列校驗結果(步驟D7),將 =傳:式序 ,若、纟士罢仏人0 Φ # 仪奴、、口果進灯比對C步驟D8 ) ° σ P表不戎程式是,完整、未經過篡改的,可以Page 9 595182 V. Description of the Invention (6) A number of vacancies have appeared in the program sequence of sub-contents, making part of the program sequence missing. The compressor 23 compresses the entire program sequence to remove all vacancies, and reorganizes and confuses the information of the original program sequence (step S6). The mixed light sequence is encrypted by the encryptor 24 to be converted into ciphertext (step S6), and the ciphertext information is transmitted to the server β via the network card 12 for storage (step S7). In addition, in the network communication process, the communication protocol between the workstation A and the server B also needs to be based. This is the same as the existing network and will not be repeated here. As shown in Figure 3, 'is a flowchart of the steps for remotely loading a program in the embodiment of the present invention; the local workstation A and the server ^: ^ through normal handshake agreement (handshaking) to achieve a positive ¥ contact between each other After that, the local workstation A starts to download the required program remotely from the server B (step D1). The downloaded program is decrypted and converted into plain text by the decryptor 25 (step D2). The decompressor 26 is based on the rules formulated by the compressor 23. , Divide the entire program sequence into several sub-program sequences, and save the sub-program sequence according to the location information of each sub-program sequence recorded in the local workstation a 3 to re-expand the program sequence, and restore the program sequence to a number of empty spaces. State (steps D3: D4), the stitcher 27 obtains information of each hole value from the storage unit u as the second inner valley, and sequentially stitches it back to the relative library of each subroutine sequence = spelling ΐΐ into a completed program sequence ( Steps D5, D4). This check ί, 70% of the private sequence is subjected to the same check to obtain a calibration result (step ', while simultaneously storing a single M m column check result (step D7), will be transmitted: formula order, if, 纟士 告 仏 人 0 Φ # Yi Nu, Guoguo into the lamp comparison C step D8) ° σ P means that the program is complete and has not been tampered with, you can

第10頁 595182 五、發明說明(7) 〜 正常使用(步驟D9);否則,本地工作站a將視其為錯誤程 式拒絕使用(步驟D1 〇 )。之後,本地工作站a即能利用通過 校驗的程式,完成本地工作站A的工作需求,如啟動工 站等。 户 有關别述打洞器的切割與打洞流程,以下配合於第4 圖之(A )〜(C )部分所示,舉例說明如下: 第4圖之(A)係顯示了整個程式序列,每一個地址資 訊對應著一個位元組的程式資訊,在本實施例中以每256 個位元組劃分為一個副程式序列(如圖所示副程式序列1、 2)’從而整個程式序列被分割為若干個副程式序列。 第4圖之(B)係顯示打洞過程,在本實施例中,打洞 為2 2在各個副程式序列的隨機位置,抽取出一定位組長度 的内容,再用1位元組保存抽取出的字串在副程式序列中 =巧對位置,例如抽取位址為〇〇56H至〇〇5911的4位元組内 谷資訊’因此儲存單元丨丨保存的地址資訊為:〇 〇 5 6 Η,保 存的内容資訊為 〇1〇〇1〇〇11〇1〇〇〇〇〇〇〇〇111〇〇1〇111〇〇〇。又 或疋打洞裔2 2在副程式序列的任意四個隨機位置各抽取1 位疋組的資訊,並用另外4個位元組分別保存4個位元組在 私式序列中的位置。是故,本發明之打洞方式可以靈活 設定’不同的設定可以實現不同的安全性能。 ^ 第4圖之(c )係顯示被抽取了部分資訊的程式序列的 壓縮過程。被抽取了部分資訊的程式序列出現了若干空位 將空位後面的内容向前推,壓縮去所有的空位。在本實 施例中,地址為0 056H至0 0 5 9H的資訊被抽取出來,原地址Page 10 595182 V. Description of the invention (7) ~ Normal use (step D9); otherwise, the local workstation a will treat it as an error procedure and refuse to use it (step D1 0). After that, the local workstation a can use the program that passed the verification to fulfill the work requirements of the local workstation A, such as starting the workstation. Regarding the cutting and punching process of the puncher, the following are shown in (A) ~ (C) of Figure 4 for an example, as follows: Figure (A) of Figure 4 shows the entire program sequence. Each address information corresponds to one byte of program information. In this embodiment, every 256 bytes are divided into a subroutine sequence (as shown in the subroutine sequence 1, 2) 'so that the entire program sequence is Split into several subroutine sequences. (B) of FIG. 4 shows the punching process. In this embodiment, the punching is performed at a random position of each subroutine sequence, and a content of a positioning group length is extracted, and then 1 byte is used to save the extraction. The output string is in the subroutine sequence = coincidence position. For example, the 4-byte inner valley information of the address 〇56H to 〇05911 is extracted. Therefore, the address information saved in the storage unit 丨 丨 is: 〇〇5 6 Alas, the saved content information is 10,000, 001, 100,000, 100,000, 100,000, and 100,000. Or, the burrowing hole 22 2 extracts 1 bit of information at any four random positions in the subroutine sequence, and uses the other 4 bytes to save the position of the 4 bytes in the private sequence. Therefore, the hole punching method of the present invention can be flexibly set. Different settings can achieve different security performances. ^ (C) in Fig. 4 shows the compression process of the program sequence with some information extracted. A number of slots appeared in the program sequence where some information was extracted. Push the content behind the slots forward to compress all the slots. In this embodiment, information with an address of 0 056H to 0 0 5 9H is extracted, and the original address

第11頁 595182 五、發明說明(8) 為0 05A的内容向前提至地址〇〇56H,副程式序列1的長度被 縮減為2 5 2位元組。由於電腦中的一切資訊,包括指令和 資料均為二進位碼,經過抽取和重組後的二進位碼由於内 容的缺失,在含義上也出現極大出入,以本實施例為例, 打洞器22於每256個位元組的副程式序列中隨機抽取了 4位 元組的資訊,即從中抽取出3 2位元的資訊,破解者在分析 截獲的資訊時,每2 5 6個位元組即有2 3 2種不同的可能,這 就給最終破解帶來很大的難度。 5 根據以上敘述,本發明所提供的確保遠端載入資 保密性和不被修改性之資訊驗證裝置與方法,採用扣 ,^文内容,並對抽取過部分資訊的原程式序列進行壓縮 ::組,&而原程式的内容被混淆,即使在通訊過 Γ:Γ輸的所有資料,分析破解原文也將 =極大難度。更”攻擊者破解的難度大幅提高,通訊 入實現較高的安全性能,且該方ί二此’可以以較小投 以實現,可以編制相應的軟體,也;二::靈方式予 於硬體晶片中,由硬體直接完成。接集成 程提供了更具安全性的一道屏障。/、、、先為逖端載入的過 綜上所述,本發明所提供的確保… 性和不被修改性之資訊驗證裝置鱼^ 育料的保密 了特殊的處理,從而使用戶敲擊鍵一 2鍵盤裝置進行 獲,並以此為認證的依據;在身彳八ς t仃為習慣可以被捕 證資訊的簡單對照,而是對行為:::2過程中,不是認 特欲進行概率統計,通Page 11 595182 V. Description of the invention (8) The content of 0 05A is from the premise to address 0056H, and the length of the subroutine sequence 1 is reduced to 2 5 2 bytes. Since all information in the computer, including instructions and data, are binary codes, the binary code after extraction and reorganization also differs greatly in meaning due to the lack of content. Taking this embodiment as an example, the puncher 22 Randomly extracted 4 bytes of information from each 256-byte subroutine sequence, that is, 3 2 bits of information was extracted from it. When the cracker analyzed the intercepted information, every 2 56 bytes That is, there are 2 3 2 different possibilities, which brings great difficulty to the final crack. 5 According to the above description, the information verification device and method for ensuring the confidentiality and non-modification of remotely-loaded assets provided by the present invention adopt the content of the deduction and text, and compress the original program sequence after extracting some information: : Group, & The content of the original program is confusing. Even if all the information lost in the communication Γ: Γ is analyzed, it will be extremely difficult to analyze and crack the original text. "The more difficult" is for attackers to crack, the communication can achieve higher security performance, and the party can achieve this with a smaller investment, and can compile corresponding software, also; In the body chip, it is directly completed by the hardware. The connection process provides a more secure barrier. The modified information verification device fish ^ The special management of the breeding materials is kept secret, so that the user can obtain the keystrokes by using a 2 keyboard device, and use this as the basis for authentication. The simple comparison of the information about the forensic evidence, but the behavior of the :: 2 process, is not to identify the probability of statistical analysis.

第12頁 5p5182 五、發明說明(9) 過認證的特徵資 外’該身份認證 立完成,不經由 有效的保證系統 已符合發明專利 賜准予專利,以 唯以上所敘 僅係本發明較佳 範圍之技術所作 製作,皆映仍屬 限定本發明實施 訊分佈必 方法的所 主機處理 安全,且 之申請要 嘉惠民生 述之技術 實施例之 之均等變 本發明專 之範圍。 須符合一 有的資料 ,使得此 本發明為 件,懇請 利國利民 、圖說、 一而已; 化或修飾 利權所涵 定的分佈區 處理工作由 種身份認證 前所未有之 鈞局詳加 ’實感德便 程式或控制 舉凡依本發 或擷取部分 蓋之範圍; 間要求;另 安全鍵盤獨 方式可以更 設計,確實 審查,並奎 0 等方法,僅 曰月申請專利 功能之雷同 t不能依此 595182 圖式簡單說明 【圖式簡單說明】 第1圖係為本發明實施例之系統硬體架構示意圖; 第2圖係為本發明實施例中,本地工作站向伺服器儲存程 式之步驟流程圖; 第3圖係為本發明實施例中,本地工作站自遠端載入程式 之步驟流程圖; 第4圖係為本發明實施例中,啟動過程中上傳及下載程式 序列之資料處理不意圖。5p5182 on page 12 5. Description of the invention (9) Authenticated features outside of this identity authentication was completed without a valid guarantee system and has been granted a patent granted by the invention patent, so that the above description is only the preferred scope of the invention All the productions made by the technology are still within the scope of the present invention, which limit the processing security of the indispensable method for implementing the present invention, and the application should benefit the equal implementation of the technical embodiments described by the people's livelihood. Must comply with some information, make this invention a piece, and urge the country, the people, illustrations, and so on; change or modify the distribution area defined by the right of interest. Debian program or control, according to the scope of the issue or capture part of the cover; occasional requirements; In addition, the safe keyboard alone method can be more designed, verified, and Kui 0 and other methods, only the same as the patent application function can not be based on this 595182 Brief description of the drawings [Simplified description of the drawings] Figure 1 is a schematic diagram of the hardware architecture of the system according to the embodiment of the present invention; Figure 2 is a flowchart of the steps for the local workstation to store the program to the server in the embodiment of the present invention; FIG. 3 is a flowchart of steps for loading a program from a remote station by a local workstation in an embodiment of the present invention; and FIG. 4 is an example of data processing for uploading and downloading a program sequence during startup in an embodiment of the present invention.

圖號說明 10 中央處理單元 11 儲存單元 12 網路卡 20 硬體晶片 21 校驗器 22 打洞器 23 壓縮器 24 加密器 25 解密器 26 解壓縮器 27 缝補器 30 網路 A 本地工作站 B 伺服器 第14頁Description of drawing number 10 Central processing unit 11 Storage unit 12 Network card 20 Hardware chip 21 Checker 22 Hole puncher 23 Compressor 24 Encryptor 25 Decryptor 26 Decompressor 27 Stitcher 30 Network A Local workstation B Server 第 14 页

Claims (1)

六、申請專利範圍 1 · 一種資訊驗證裝置,用以確保 和不被修改性,包括有:、而載資料的保密性 :校驗器’係對程式序列校驗,並 存於一儲存單元内;权驗值储 打洞器,係將一工作站欲對一 程式序列分割為若干個副程式 廿二々子之1個 序列以-定規律抽取資訊式序列,並於各個副程式 :壓j器丄係對該打洞器之處理 壓細,帛以產生資訊混淆的新 飞序歹j -力二器,係對該新程式序列=密; 密;在益’係對自該飼服器下載之程式序列進行解 將縮器’依據該儲存單元所儲存之打洞位置, 壓縮程式序列重新展開為具有若干空位的 缝:=二係,該儲存單元所儲存之洞值資訊逐-程;=個副程式序列中的原位置,而組合成完整的 校::::第1項所述之資訊驗證裝置,其中該 進之完整程式序列進行校驗,此二校驗值將 ,仃比對,以判斷程式之完整性。 .料ί = ”第1項所述之資訊驗證裝置,其中該 係—快閃記憶體(Flash)或該工作站自有之t6. Scope of patent application 1 · An information verification device to ensure and not be modified, including: and the confidentiality of the data: the checker 'checks the program sequence and stores it in a storage unit; The weight checker hole puncher is to divide a workstation to divide a program sequence into several subroutines. One sequence of the two subordinates extracts the information-based sequence with a regularity, and in each subroutine: the presser. It is a new flying sequence 压 j-Li Erqi, which is used to reduce the processing of the hole puncher to create information confusion. It is a sequence of the new program = dense; dense; Zaiyi is the one downloaded from the feeder. The program sequence is decompressed. According to the punching position stored in the storage unit, the compression program sequence is re-expanded into a seam with a number of empty spaces: = two-line, the hole value information stored in the storage unit is processed one by one; The original position in the subprogram sequence is combined into a complete calibration :::: The information verification device described in item 1, wherein the entered complete program sequence is verified. The two verification values will be compared, To determine the integrity of the program. . Material ί = "The information verification device described in item 1, wherein the system is a flash memory (Flash) or the workstation owns t 595182595182 憶體。 4 · 一種確保遠端載入資料的保密性和不被修改性之資訊 驗證方法,主要是通過對程式序列資訊的抽取、壓縮 和重組,使得所述程式序列缺失部分資訊,其包括一 上傳程式,以供一工作站將程式上傳至一伺服器,及 一下戴程式,以供該工作站自該伺服器下載程式,其 中《亥上傳程式包括下列步驟: a•對程式序列進行校驗;Memory. 4 · An information verification method to ensure the confidentiality and unmodifiability of remotely loaded data, mainly by extracting, compressing, and reorganizing program sequence information, making the program sequence lack some information, including an upload program , For a workstation to upload a program to a server, and download a program for the workstation to download a program from the server, where "Uploading a program includes the following steps: a. Verify the program sequence; b ·進行程式分割,並對每一個分割的副程式序列隨 機抽取一定位組長度的資訊; c•壓縮步驟b所產生的副程式序列,並透過網路上傳 至該伺服器; 該下載程式包括下列步驟: d·對程式重新展開與縫補,以組合成完整的程式序 列; e•對步驟d的啟動程式進行校驗,以確定程式是否完 整、有否被篡改; f •若校驗成功,則該工作站得以應用此程式。 5 ·如申睛專利範圍第4項所述之碟保遠端載入資料的保 密性和不被修改性之資訊驗證方法,其中該步驟3係 產生一校驗值,且該校驗值係儲存於_儲存單元。 6 · $申睛專利範圍第4項所述之確保遠端載入資料的保 後、性和不被修改性之資訊驗證方法,其中該步驟b中 係將抽取的洞值資訊與其在副程式段中的相^位置儲b. Program division, and randomly extract a positioning group length information for each divided subroutine sequence; c. Compress the subroutine sequence generated in step b and upload it to the server through the network; The download program includes The following steps: d. Re-deploy and sew the program to form a complete program sequence; e. Verify the startup program at step d to determine whether the program is complete and has been tampered with; f • If the verification is successful, Then the workstation can apply this program. 5 · The method for verifying the confidentiality of the remotely loaded data and the information that cannot be modified as described in item 4 of Shenyan's patent scope, wherein step 3 generates a check value, and the check value is Store in _ storage unit. 6 · The method of information verification for ensuring the post-warranty, sexuality, and non-modifiability of remotely-loaded data as described in item 4 of the patent scope of Shen Shen, where the extracted hole value information in step b is used in the subroutine Phase position storage in segments 第16頁 存於一 7 ·如申請 密性和 資訊抽 訊,用 8 ·如申請 密性和 資訊抽 相同的 9 ·如申請 密性和 包括有 I 0 ·如申請 密性和 包括有 解密為 II ·如申請 密性和 述係依 中的原 1 2 ·如申請 密性和 ’以確 儲存單元。 專利範圍第4項所述之確 不被修改性之資訊驗證方 取的方式,可為連續抽取 1位兀組紀錄打洞位址。 專利範圍第4項所述之確 不被修改性之資訊驗證方 取的方式’可分別抽取幾 位元、组數記錄每個打洞位 專利fe圍第4項所述之確 不被修改性之資訊驗證方 加密步驟,以增加破解的 專利範目帛4項所述之確 不被修改性之資訊驗證方 解密步驟,用以將該伺服 明文程式。 專利範圍第4項所述之確 不被修改性之資訊驗證方 據儲存I元之記錄逐一 位置。 專利範圍第4項所述之確 不被修改性之資訊驗證方 才:驗值,ϋ與保存於一儲 疋程式是否完整、有否被 保遠端載少 法,其中聋 一定位元舍 保遠端載/ 法,其中索 個單字節1 置。 保遠端載> 法,其中索 困難度。 保遠端載/ 法,其中言J 裔所儲存以 保遠端載/ 法,其中驾 縫補回各姐 保遠端載Λ 法,其中驾 存單元之杉 篡改。 資料的保 步驟b中 長度的資 資料的保 步驟b中 訊’並用 資料的保 步驟c更 資料的保 步驟d更 密文程式 資料的保 步驟d所 子程式段 資料的保 步驟e係 驗值比較Page 16 is stored in 7 • If applying confidentiality and information sampling, use 8 • If applying confidentiality and information sampling is the same 9 • If applying confidentiality and including I 0 • If applying confidentiality and including decryption as II. If the application is confidential and described in accordance with the original 1 2 · If the application is confidential and 'to confirm the storage unit. The method described in item 4 of the patent scope is indeed not modified by the information verification method, which can be used to continuously extract a 1-bit group record to punch holes. The method described in item 4 of the patent scope that is not really modified by the verifier of information can be extracted by several bits and groups respectively. Each hole bit is indeed not modified as described in item 4 of the patent. The information verifier encryption step is to increase the decrypted information verifier decryption step described in item 4 of the deciphered patent item, which is used to make the servo plaintext program. Item 4 of the patent scope does not modify the information verifier according to the location where the records of I yuan are stored one by one. The information in item 4 of the patent scope is indeed not modified before verifying the information: check the value, whether it is stored in a storage program, whether the program is complete, and whether it is guaranteed to be stored remotely. Among them, the deaf is located Yuanyuan Baoyuan. End-loading / method, in which a single byte is set. Keep the remote load > method, which asks for difficulty. Keep the remote load / method, which is stored in the J family to save the remote load / method, which repairs each sister to repair the remote load Λ method, where the driving unit's firing is tampered. The data is saved in step b. The data is saved in step b. The data is saved in step b. The data is saved in step c. The data is saved in step d. The cipher text is saved in step d. The subroutine data is saved in step e. Compare
TW92101749A 2003-01-27 2003-01-27 Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof TW595182B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW92101749A TW595182B (en) 2003-01-27 2003-01-27 Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW92101749A TW595182B (en) 2003-01-27 2003-01-27 Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof

Publications (2)

Publication Number Publication Date
TW595182B true TW595182B (en) 2004-06-21
TW200414733A TW200414733A (en) 2004-08-01

Family

ID=34075959

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92101749A TW595182B (en) 2003-01-27 2003-01-27 Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof

Country Status (1)

Country Link
TW (1) TW595182B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9537650B2 (en) 2009-12-15 2017-01-03 Microsoft Technology Licensing, Llc Verifiable trust for data through wrapper composition
US10348693B2 (en) 2009-12-15 2019-07-09 Microsoft Technology Licensing, Llc Trustworthy extensible markup language for trustworthy computing and data services

Also Published As

Publication number Publication date
TW200414733A (en) 2004-08-01

Similar Documents

Publication Publication Date Title
JP4668619B2 (en) Device key
CN107566407B (en) Bidirectional authentication data secure transmission and storage method based on USBKey
CN105051750B (en) System and method for encrypted file system layer
EP2165284B1 (en) Method and apparatus for securing data in memory device
US8595488B2 (en) Apparatus, system and method for securing digital documents in a digital appliance
EP1515215B1 (en) Method and apparatus for secure delivery and rights management of digital content by means of document indexing
KR101439923B1 (en) Digital Rights Management and Method for Partial Encryption of Content
US20040039932A1 (en) Apparatus, system and method for securing digital documents in a digital appliance
US9256210B2 (en) Safe method for card issuing, card issuing device and system
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
JP2004534333A (en) Integrated protection method and system for distributed data processing in computer networks
CN100401309C (en) Tax controlling equipment software edition intelligent upgrade encryption identification method
CN107533613A (en) Transplant document format file custom field
CN105279441A (en) Methods and architecture for encrypting and decrypting data
US20100161977A1 (en) Electronic file access control system and method
CN111614467A (en) System backdoor defense method and device, computer equipment and storage medium
CN113326522A (en) Data processing method, device, equipment and computer storage medium
JP7235941B2 (en) Information management system and method
CN109871698B (en) Data processing method, data processing device, computer equipment and storage medium
TW595182B (en) Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof
JP2009199147A (en) Communication control method and communication control program
CN104486441B (en) Long-range control method based on FTP
CN113824735B (en) Remote sensing image encryption transmission method and system
CN113569272B (en) Secure computer implementation method and secure computer
CN114637985A (en) Android application login counterfeiting identification method based on multi-environment parameters