TW595182B - Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof - Google Patents
Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof Download PDFInfo
- Publication number
- TW595182B TW595182B TW92101749A TW92101749A TW595182B TW 595182 B TW595182 B TW 595182B TW 92101749 A TW92101749 A TW 92101749A TW 92101749 A TW92101749 A TW 92101749A TW 595182 B TW595182 B TW 595182B
- Authority
- TW
- Taiwan
- Prior art keywords
- program
- sequence
- information
- data
- item
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
Description
595182 五、發明說明(1) 【發明所屬之技術領域] 本發明係有關-種確保遠端栽入資料的 修改性之資訊驗證裝置與方法,特別是通過抽取ϋ皮 重組的方法’使得所述程式序列缺失部分資訊, 較小性能代價換取較大安全性的目的。 達到以 【先前技術】 卫二更入ϊ通過使用飼服器硬碟上的資源來代替 作站硬碟引V-台網路上的工作 遠端啟動技術的應用日益廣令,士、甘、目别,k種 原因是因為它管理簡單容ί其是J教育場合,究其 。 攸而大大降低了系統整體的擁有成本 這種技術的主要焉ί¥县·田 如:啟動程式、岸:ϋ:戶端個人電腦的部分程式 端⑹ent)需㈣部分;^時====’當客戶 P_)中向伺服器發送連接4上其啟動過WBoot 客戶端送出的要求\合=\ 得1p。當伺服器收到 收到伺服35、.,Ψ / έ 。傳連結應答及I P位址,用戶端接 ^〇M) Pt ^ ^ ^ ^ , tY ^ ^(B〇〇t 程式。 攸彳Ί服^下載一切所需的設備啟動 傳統遠端載人古4'夕 相對安全的網路環产ζ ^區域網路,這是一個被認為 ’故通訊安全問^ ϋ 各方之間保㈣彼㈣的信任 、並未被予以充分考慮,通訊雙方均在完595182 V. Description of the invention (1) [Technical field to which the invention belongs] The present invention relates to a kind of information verification device and method for ensuring the modification of data implanted at a remote site, in particular, a method for extracting and reassembling skin to make the said Some information is missing in the program sequence, and a small performance cost is exchanged for a larger security purpose. [Previous technology] Wei Ergeng has been using the resources on the feeder hard disk to replace the work on the hard disk to guide the work on the V-Taiwan network. The use of remote start technology has become increasingly widespread. No, the k reasons are because it is easy to manage and it is a J education occasion. This greatly reduces the overall cost of ownership of the system. The main technologies of this technology are county and field: startup programs, shore: ϋ: part of the client terminal's personal computer (enter) required parts; ^ 时 ==== 'When the client P_) sends to the server the request sent by the WBoot client on connection 4 on the connection \ he = \ got 1p. When the server receives the servo 35, ..., Ψ / έ. Send link response and IP address, user terminal ^ 〇M) Pt ^ ^ ^ ^, tY ^ ^ (B〇〇t program. 彳 Ί 服 ^ Download all necessary equipment to start the traditional remote manned ancient 4 'Even a relatively secure network environment produces a ^ local area network, which is considered to be' so communication security issues ^ ㈣ The trust between the parties to protect each other has not been fully taken into account, both parties are in the process of completion.
第5頁 595182 五、發明說明(2) 全開放的環境下傳遞、交換資訊。 安全手段亦 過程的安全 通用的塊加 驗。所謂 到一簡短的 算法和Hash ’實現困難 式是以完整 ,因此通訊 能,而將經 本地工作站 破壞。 但在網路安全問題日益突出的今天,諸多 應用於遠端載入過程當中。通常對於遠端載入 措施包括加密和校驗兩種。加密方法一般採用 密和流加密,而校驗的手段主要*Hash函數校 Hash函數校驗,係將整個程式序列進行壓縮得 摘要,作為日後驗證的依據。然而傳統加密演 函數校驗方法的運算複雜程度很高,資料量大 ^對於設備的性能要求較高;同時,寄存的程 資訊的形式在網上通訊、並在伺服器上保存的 和f存過程中,均有被截獲、破解和篡改的可 過篡改過的程式惠用於本地工作站中,將危害 的安全,甚至對本地工作站的資源造成嚴重二 【發明内容】 ,緣是,本發明之主要目的即是提供一 =和不被修改性之資訊崎置=^ 内容,並對抽取過部分資訊的原程ΐ 退订反縮和重組’混淆原始 =前rr小性能代價換取較大== —康迷’本發明之資訊驗證裝置包括有. 傳、「丁:=;係ϊ程式序列進行校驗,…於程式上 -打洞哭'技氡式下載、縫補程式後進行校驗。 -’係將工作站欲對伺服器儲存之整個程式序 五、發明說明(3) 列分割為若干個 規律抽取資訊; 的位置將保存在 一壓縮器, 用以產生資訊混 一加密器, 一解密器, 一解壓縮器 洞位置資訊,將 干空位的程式序 一缝補器, 回各個副程式序 副程式序列 該抽取出的 本地工作站 係對打洞器 淆的新程式 係對前述壓 係對自伺服 ’依據本地 已解密之壓 列。 係將儲存單 列中的原位 ,並於各個副程式序列以一定 洞值資訊及其在副程式序列中 的儲存單元。 之處理結果進行程式段壓縮, 序列。 备§形成之程式序列進行加密。 器下載之程式序列進行解密。 工作站之儲存早元所儲存之打 縮程式序列重新展開為具有若 元所儲存之洞值資訊逐一縫補 置,而組合成完整的程式序列 义、、依據則述’本發明之加解密及增加破解的困難度係視 月0述所分割的副程式序列數量及對每個副程式序列的取樣 數之規1 ’而此部份則可由設計者視實際需求而定。 _本f明之另一目的即是適用於高速通訊的需要,允許 ,訊以資料流程的方式操作,同時提交給伺服器的保存資 =中扣2 了部分内容,使得被提交的程式是缺失了部分内 谷的不完整程式,此缺失部分的傳輸内容將大幅提高攻擊 者的破解難度’相對的將可選擇簡易的加密演算法實施加 密處理’進而降低加密強度大服降低系統的架構成本。 以下將對本發明之結構設計與技術原理,作一詳細之 說明’並參閱附呈之圖式,將對本發明之特徵作更進一步Page 5 595182 V. Description of the invention (2) Information is transmitted and exchanged in a fully open environment. Safety measures are also used for process safety. General block verification. So-called to a short algorithm and Hash ′ implementation difficulty is complete, so communication can be destroyed by the local workstation. But nowadays, network security issues are becoming increasingly prominent, and many of them are used in remote loading. Usually for remote loading measures include encryption and verification. The encryption method generally uses dense and stream encryption, and the verification method mainly uses Hash function calibration. Hash function verification is to compress the entire program sequence into a summary, which is used as the basis for future verification. However, the traditional encryption function verification method has a high degree of computational complexity and a large amount of data. ^ High requirements are placed on the performance of the device. At the same time, the registered process information is communicated on the Internet, and saved on the server and f. In the process, there are intercepted, cracked, and tamperable programs that can be tampered with, and are used in the local workstation, which will endanger the security and even cause serious damage to the resources of the local workstation. [Summary of the Invention] The main purpose is to provide one = and unmodifiable information = ^ content, and the original process of extracting part of the information 订 unsubscribe and shrink and reorganize 'confuse the original = the former rr small performance cost in exchange for the larger == —Kang Fan 'The information verification device of the present invention includes: Chuan, "Ding: =; is a program sequence for verification, ... on the program-punch hole cry" technical download, stitching program for verification.- 'It is the entire program sequence that the workstation intends to store on the server. Fifth, the description of the invention (3) The column is divided into a number of regularly extracted information; the location of the will be saved in a compressor, used to generate information mixed with an encryptor, a solution A decompressor, a decompressor hole position information, a program for dry vacancies, a patcher, back to each subroutine sequence, the subroutine sequence. The extracted local workstation is a new program that confuses the hole puncher. The "self-servo" is based on the locally decrypted pressure train. It will store the original position in a single train, and use certain hole value information in each subroutine sequence and its storage unit in the subroutine sequence. The processing results are compressed in blocks. , Sequence. The program sequence formed by § is encrypted. The program sequence downloaded by the device is decrypted. The shrinking program sequence stored in the workstation and stored in the early yuan is re-expanded to have the hole information stored by Ruoyuan one by one. The meaning of a complete program sequence is based on the statement 'The encryption and decryption of the present invention and the increase in the difficulty of cracking are based on the rules of the number of subroutine sequences divided and the number of samples for each subroutine sequence.' This part can be determined by the designer according to actual needs. _ Another purpose of this document is to meet the needs of high-speed communication. Mode operation, and the saved assets submitted to the server at the same time = some of the content is deducted, so that the submitted program is an incomplete program missing some inner valleys, and the transmission of this missing part will greatly increase the difficulty of attackers' cracking. In contrast, a simple encryption algorithm can be selected to implement encryption processing, thereby reducing the encryption strength and service cost of the system. The structure design and technical principle of the present invention will be described in detail below, and refer to the attached drawings , Will further the characteristics of the present invention
第7頁 595182Page 7 595182
之瞭解。 【實施方式】 音圖如ΐf所示’係為本發明實施例之系統硬體架構示 施例採用的方式是將程式序列打洞、資 集成於硬體晶片當中,由硬體獨立完成,而 攻種功爿b也可以由特定的軟體完成。 乂發:係於本地工作站八進出CPU10的通路上設置硬體 1 包括有:一校驗器21,係對程式序列進行 2 :亥校:動作2生在兩種情況下,其一係於程式序列 =後打洞處理之前,另-為程式序列下冑,縫補程式序 個程式序列分割為若干個子程二欲^司服器㈣存之整 列以-定規律抽取資訊。前述=盘”程式序 由設計者視實際需求而決定分宝j 4 ^ ^ ^貝訊的規則可 序列的取樣數,同時這也:歹」數量及每個程式 難度; τ、μ疋在後加解密及增加破解的困 一壓縮器23,係對打洞器22之處理結果 壓縮處理,用以產生資訊混淆的新程式序列· ^序列 -加密器24 ’係對前述新程式序列進行加 密;-解密器25,係對自伺服器Βτ載之儲存序列進行解 一解壓縮器2 6 依據本地工作站A 之儲存單元11所健To understand. [Embodiment] The sound diagram shown as ΐf 'is the hardware architecture of the system according to the embodiment of the present invention. The method used in the embodiment is to punch a program sequence and integrate it into a hardware chip, which is completed by the hardware independently. The attack function 爿 b can also be performed by specific software. Burst: The hardware 1 is installed on the path of the local workstation eight in and out of CPU10. It includes: a checker 21, which performs program sequence 2: Hai school: Action 2 is generated in two cases, one of which is based on the program Sequence = before punching processing, another-for the program sequence, the program sequence is divided into a number of sub-processes, and the entire row saved by the server is extracted using a regular pattern. The aforementioned = disk "program sequence is determined by the designer according to actual needs. The number of samples that can be sequenced by the rules of JB ^ ^ ^ ^, and this is also: 歹" quantity and the difficulty of each program; τ, μ 疋 are later A compressor 23 for encryption, decryption, and cracking is a compression process of the processing result of the puncher 22 to generate a new program sequence for information confusion. ^ Sequence-encryptor 24 'encrypts the aforementioned new program sequence; -Decryptor 25, which decompresses the storage sequence carried by the server Bτ, a decompressor 2 6 according to the health of the storage unit 11 of the local workstation A
第8頁 595182Page 8 595182
存之打洞位置資訊,將已解密 具有若干空位的程式序列; 之壓縮程式序列重新展 開為 縫補 序列 一縫補器27,係 回各個子程式序 將儲存單元11所儲存之洞值資訊逐一 列中的原位置,而組合成完整的程式 其 内 如第2圖所示,係為本發明實施例中’Save the hole location information, and decrypt the program sequence with several vacancies; the compressed program sequence is re-expanded into a stitching sequence, a stitcher 27, which returns to each subroutine and lists the hole value information stored in the storage unit 11 one by one. The original position, and combined into a complete program as shown in Figure 2, it is in the embodiment of the present invention '
伺服器儲存程式之步驟流程圖; 枣也作站# ^地工作A站欲發送的程式序列被傳送至硬體晶片 2中的校驗器21首A選用一定的校驗方法對流經_ 序列進行校驗(步驟S1)(舉例來說’該校驗方法,如:校 驗矛的方法,其係將程式序列逐位元相加,得到的一校塌 =如序列GlGllGll ’其校驗和為υ。校驗完成後即將出The flow chart of the procedure for the server to store the program; Zaozuo Zuo Station # ^ 地 工作 A The sequence of the program to be sent by the station is transmitted to the checker 21 in the hardware chip 2. The first A selects a certain check method for the flow-through sequence. Check (step S1) (for example, 'the check method, such as the method of checking the spear, is to add the program sequence bit by bit to get a collapsing = such as the sequence GlGllGll' its checksum is υ. Coming soon after verification
广,值儲存於儲存單元11中(步驟S2)(如第4圖之(Α),I 後坪述)。The value is stored in the storage unit 11 (step S2) (as shown in FIG. 4 (A), described later in I).
該打洞器2 2接收到經過驗證的欲寄存程式,該程式以 序=的形式流經硬體晶片20,該打洞器22根據設g^寄 存程式序列以一定長度的位元組切割為複數個副程式序列 (步fS3 ),並以每個副程式序列為單位,從中以一定的規 則^機抽取一定長度的資訊作為洞值資訊(步驟S4 ),將洞 值資訊=内容及其在副程式段中的位置保存在本地工作站 的儲存單元1 2中(步驟s 5 ),即完成打洞過程。被抽取了部The hole puncher 22 receives a verified program to register, and the program flows through the hardware chip 20 in the form of sequence =. The hole puncher 22 cuts a byte of a certain length into A plurality of subroutine sequences (step fS3), and using each subroutine sequence as a unit, a certain length of information is extracted from the certain sequence as hole value information (step S4), and the hole value information = content and its The position in the sub-program segment is stored in the storage unit 12 of the local workstation (step s 5), and the punching process is completed. Extracted
第9頁 595182 五、發明説明(6) 分内容的程式序列相應出現了若干空位,使程式序列中的 部分内容缺失。該壓縮機23將整個程式序列壓縮去除所有 的空位,使原程式序列之資訊重組且混淆(步驟S6)。此混 涛的輕式序列再經加密器24加密而轉化為密文(步驟S6), 經由〆網路卡1 2將密文資訊經網路3 〇傳送至伺服器β儲存 (步驟S7)。另外,在網路通訊過程中,同樣需要依據工作 站Α與伺服器Β之間的通訊協定,此與現有網路相同於此不 另贅述。 如弟3圖所示’係為本發明實施例中 遠端載入程式之步驟流程圖;本地工作站A與伺服器^ : ^ 透過正常的握手協定(handshaking),達成彼此之間的正 ¥聯絡之後,本地工作站A開始從伺服器B遠端下載所需程 式(步驟D1),該下載程式經解密器25解密轉換為明文(步 驟D2),解壓縮器26即依壓縮器23所制定的規律,將整個 程式序列劃分為若干個副程式序列,且根據本地工作站a 3存:元1 i所紀錄的各副程式序列打洞的位置資訊將程 式序歹重新展開,恢復程式序列為若干空位之狀態(步 D3:D4),該縫補器27從儲存單元u中獲得各個洞值資訊 作二内谷,並依次將其縫補回各個副程式序列的相對庫 =拼Γΐ成完筆的程式序列(步驟D5、D4)。該校驗ί 莫 、70成的私式序列進行相同的校驗得到一個校給 結果(步’同時自儲存單Μ m 列校驗結果(步驟D7),將 =傳:式序 ,若、纟士罢仏人0 Φ # 仪奴、、口果進灯比對C步驟D8 ) ° σ P表不戎程式是,完整、未經過篡改的,可以Page 9 595182 V. Description of the Invention (6) A number of vacancies have appeared in the program sequence of sub-contents, making part of the program sequence missing. The compressor 23 compresses the entire program sequence to remove all vacancies, and reorganizes and confuses the information of the original program sequence (step S6). The mixed light sequence is encrypted by the encryptor 24 to be converted into ciphertext (step S6), and the ciphertext information is transmitted to the server β via the network card 12 for storage (step S7). In addition, in the network communication process, the communication protocol between the workstation A and the server B also needs to be based. This is the same as the existing network and will not be repeated here. As shown in Figure 3, 'is a flowchart of the steps for remotely loading a program in the embodiment of the present invention; the local workstation A and the server ^: ^ through normal handshake agreement (handshaking) to achieve a positive ¥ contact between each other After that, the local workstation A starts to download the required program remotely from the server B (step D1). The downloaded program is decrypted and converted into plain text by the decryptor 25 (step D2). The decompressor 26 is based on the rules formulated by the compressor 23. , Divide the entire program sequence into several sub-program sequences, and save the sub-program sequence according to the location information of each sub-program sequence recorded in the local workstation a 3 to re-expand the program sequence, and restore the program sequence to a number of empty spaces. State (steps D3: D4), the stitcher 27 obtains information of each hole value from the storage unit u as the second inner valley, and sequentially stitches it back to the relative library of each subroutine sequence = spelling ΐΐ into a completed program sequence ( Steps D5, D4). This check ί, 70% of the private sequence is subjected to the same check to obtain a calibration result (step ', while simultaneously storing a single M m column check result (step D7), will be transmitted: formula order, if, 纟士 告 仏 人 0 Φ # Yi Nu, Guoguo into the lamp comparison C step D8) ° σ P means that the program is complete and has not been tampered with, you can
第10頁 595182 五、發明說明(7) 〜 正常使用(步驟D9);否則,本地工作站a將視其為錯誤程 式拒絕使用(步驟D1 〇 )。之後,本地工作站a即能利用通過 校驗的程式,完成本地工作站A的工作需求,如啟動工 站等。 户 有關别述打洞器的切割與打洞流程,以下配合於第4 圖之(A )〜(C )部分所示,舉例說明如下: 第4圖之(A)係顯示了整個程式序列,每一個地址資 訊對應著一個位元組的程式資訊,在本實施例中以每256 個位元組劃分為一個副程式序列(如圖所示副程式序列1、 2)’從而整個程式序列被分割為若干個副程式序列。 第4圖之(B)係顯示打洞過程,在本實施例中,打洞 為2 2在各個副程式序列的隨機位置,抽取出一定位組長度 的内容,再用1位元組保存抽取出的字串在副程式序列中 =巧對位置,例如抽取位址為〇〇56H至〇〇5911的4位元組内 谷資訊’因此儲存單元丨丨保存的地址資訊為:〇 〇 5 6 Η,保 存的内容資訊為 〇1〇〇1〇〇11〇1〇〇〇〇〇〇〇〇111〇〇1〇111〇〇〇。又 或疋打洞裔2 2在副程式序列的任意四個隨機位置各抽取1 位疋組的資訊,並用另外4個位元組分別保存4個位元組在 私式序列中的位置。是故,本發明之打洞方式可以靈活 設定’不同的設定可以實現不同的安全性能。 ^ 第4圖之(c )係顯示被抽取了部分資訊的程式序列的 壓縮過程。被抽取了部分資訊的程式序列出現了若干空位 將空位後面的内容向前推,壓縮去所有的空位。在本實 施例中,地址為0 056H至0 0 5 9H的資訊被抽取出來,原地址Page 10 595182 V. Description of the invention (7) ~ Normal use (step D9); otherwise, the local workstation a will treat it as an error procedure and refuse to use it (step D1 0). After that, the local workstation a can use the program that passed the verification to fulfill the work requirements of the local workstation A, such as starting the workstation. Regarding the cutting and punching process of the puncher, the following are shown in (A) ~ (C) of Figure 4 for an example, as follows: Figure (A) of Figure 4 shows the entire program sequence. Each address information corresponds to one byte of program information. In this embodiment, every 256 bytes are divided into a subroutine sequence (as shown in the subroutine sequence 1, 2) 'so that the entire program sequence is Split into several subroutine sequences. (B) of FIG. 4 shows the punching process. In this embodiment, the punching is performed at a random position of each subroutine sequence, and a content of a positioning group length is extracted, and then 1 byte is used to save the extraction. The output string is in the subroutine sequence = coincidence position. For example, the 4-byte inner valley information of the address 〇56H to 〇05911 is extracted. Therefore, the address information saved in the storage unit 丨 丨 is: 〇〇5 6 Alas, the saved content information is 10,000, 001, 100,000, 100,000, 100,000, and 100,000. Or, the burrowing hole 22 2 extracts 1 bit of information at any four random positions in the subroutine sequence, and uses the other 4 bytes to save the position of the 4 bytes in the private sequence. Therefore, the hole punching method of the present invention can be flexibly set. Different settings can achieve different security performances. ^ (C) in Fig. 4 shows the compression process of the program sequence with some information extracted. A number of slots appeared in the program sequence where some information was extracted. Push the content behind the slots forward to compress all the slots. In this embodiment, information with an address of 0 056H to 0 0 5 9H is extracted, and the original address
第11頁 595182 五、發明說明(8) 為0 05A的内容向前提至地址〇〇56H,副程式序列1的長度被 縮減為2 5 2位元組。由於電腦中的一切資訊,包括指令和 資料均為二進位碼,經過抽取和重組後的二進位碼由於内 容的缺失,在含義上也出現極大出入,以本實施例為例, 打洞器22於每256個位元組的副程式序列中隨機抽取了 4位 元組的資訊,即從中抽取出3 2位元的資訊,破解者在分析 截獲的資訊時,每2 5 6個位元組即有2 3 2種不同的可能,這 就給最終破解帶來很大的難度。 5 根據以上敘述,本發明所提供的確保遠端載入資 保密性和不被修改性之資訊驗證裝置與方法,採用扣 ,^文内容,並對抽取過部分資訊的原程式序列進行壓縮 ::組,&而原程式的内容被混淆,即使在通訊過 Γ:Γ輸的所有資料,分析破解原文也將 =極大難度。更”攻擊者破解的難度大幅提高,通訊 入實現較高的安全性能,且該方ί二此’可以以較小投 以實現,可以編制相應的軟體,也;二::靈方式予 於硬體晶片中,由硬體直接完成。接集成 程提供了更具安全性的一道屏障。/、、、先為逖端載入的過 綜上所述,本發明所提供的確保… 性和不被修改性之資訊驗證裝置鱼^ 育料的保密 了特殊的處理,從而使用戶敲擊鍵一 2鍵盤裝置進行 獲,並以此為認證的依據;在身彳八ς t仃為習慣可以被捕 證資訊的簡單對照,而是對行為:::2過程中,不是認 特欲進行概率統計,通Page 11 595182 V. Description of the invention (8) The content of 0 05A is from the premise to address 0056H, and the length of the subroutine sequence 1 is reduced to 2 5 2 bytes. Since all information in the computer, including instructions and data, are binary codes, the binary code after extraction and reorganization also differs greatly in meaning due to the lack of content. Taking this embodiment as an example, the puncher 22 Randomly extracted 4 bytes of information from each 256-byte subroutine sequence, that is, 3 2 bits of information was extracted from it. When the cracker analyzed the intercepted information, every 2 56 bytes That is, there are 2 3 2 different possibilities, which brings great difficulty to the final crack. 5 According to the above description, the information verification device and method for ensuring the confidentiality and non-modification of remotely-loaded assets provided by the present invention adopt the content of the deduction and text, and compress the original program sequence after extracting some information: : Group, & The content of the original program is confusing. Even if all the information lost in the communication Γ: Γ is analyzed, it will be extremely difficult to analyze and crack the original text. "The more difficult" is for attackers to crack, the communication can achieve higher security performance, and the party can achieve this with a smaller investment, and can compile corresponding software, also; In the body chip, it is directly completed by the hardware. The connection process provides a more secure barrier. The modified information verification device fish ^ The special management of the breeding materials is kept secret, so that the user can obtain the keystrokes by using a 2 keyboard device, and use this as the basis for authentication. The simple comparison of the information about the forensic evidence, but the behavior of the :: 2 process, is not to identify the probability of statistical analysis.
第12頁 5p5182 五、發明說明(9) 過認證的特徵資 外’該身份認證 立完成,不經由 有效的保證系統 已符合發明專利 賜准予專利,以 唯以上所敘 僅係本發明較佳 範圍之技術所作 製作,皆映仍屬 限定本發明實施 訊分佈必 方法的所 主機處理 安全,且 之申請要 嘉惠民生 述之技術 實施例之 之均等變 本發明專 之範圍。 須符合一 有的資料 ,使得此 本發明為 件,懇請 利國利民 、圖說、 一而已; 化或修飾 利權所涵 定的分佈區 處理工作由 種身份認證 前所未有之 鈞局詳加 ’實感德便 程式或控制 舉凡依本發 或擷取部分 蓋之範圍; 間要求;另 安全鍵盤獨 方式可以更 設計,確實 審查,並奎 0 等方法,僅 曰月申請專利 功能之雷同 t不能依此 595182 圖式簡單說明 【圖式簡單說明】 第1圖係為本發明實施例之系統硬體架構示意圖; 第2圖係為本發明實施例中,本地工作站向伺服器儲存程 式之步驟流程圖; 第3圖係為本發明實施例中,本地工作站自遠端載入程式 之步驟流程圖; 第4圖係為本發明實施例中,啟動過程中上傳及下載程式 序列之資料處理不意圖。5p5182 on page 12 5. Description of the invention (9) Authenticated features outside of this identity authentication was completed without a valid guarantee system and has been granted a patent granted by the invention patent, so that the above description is only the preferred scope of the invention All the productions made by the technology are still within the scope of the present invention, which limit the processing security of the indispensable method for implementing the present invention, and the application should benefit the equal implementation of the technical embodiments described by the people's livelihood. Must comply with some information, make this invention a piece, and urge the country, the people, illustrations, and so on; change or modify the distribution area defined by the right of interest. Debian program or control, according to the scope of the issue or capture part of the cover; occasional requirements; In addition, the safe keyboard alone method can be more designed, verified, and Kui 0 and other methods, only the same as the patent application function can not be based on this 595182 Brief description of the drawings [Simplified description of the drawings] Figure 1 is a schematic diagram of the hardware architecture of the system according to the embodiment of the present invention; Figure 2 is a flowchart of the steps for the local workstation to store the program to the server in the embodiment of the present invention; FIG. 3 is a flowchart of steps for loading a program from a remote station by a local workstation in an embodiment of the present invention; and FIG. 4 is an example of data processing for uploading and downloading a program sequence during startup in an embodiment of the present invention.
圖號說明 10 中央處理單元 11 儲存單元 12 網路卡 20 硬體晶片 21 校驗器 22 打洞器 23 壓縮器 24 加密器 25 解密器 26 解壓縮器 27 缝補器 30 網路 A 本地工作站 B 伺服器 第14頁Description of drawing number 10 Central processing unit 11 Storage unit 12 Network card 20 Hardware chip 21 Checker 22 Hole puncher 23 Compressor 24 Encryptor 25 Decryptor 26 Decompressor 27 Stitcher 30 Network A Local workstation B Server 第 14 页
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW92101749A TW595182B (en) | 2003-01-27 | 2003-01-27 | Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW92101749A TW595182B (en) | 2003-01-27 | 2003-01-27 | Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
TW595182B true TW595182B (en) | 2004-06-21 |
TW200414733A TW200414733A (en) | 2004-08-01 |
Family
ID=34075959
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW92101749A TW595182B (en) | 2003-01-27 | 2003-01-27 | Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW595182B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9537650B2 (en) | 2009-12-15 | 2017-01-03 | Microsoft Technology Licensing, Llc | Verifiable trust for data through wrapper composition |
US10348693B2 (en) | 2009-12-15 | 2019-07-09 | Microsoft Technology Licensing, Llc | Trustworthy extensible markup language for trustworthy computing and data services |
-
2003
- 2003-01-27 TW TW92101749A patent/TW595182B/en active
Also Published As
Publication number | Publication date |
---|---|
TW200414733A (en) | 2004-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4668619B2 (en) | Device key | |
CN107566407B (en) | Bidirectional authentication data secure transmission and storage method based on USBKey | |
CN105051750B (en) | System and method for encrypted file system layer | |
EP2165284B1 (en) | Method and apparatus for securing data in memory device | |
US8595488B2 (en) | Apparatus, system and method for securing digital documents in a digital appliance | |
EP1515215B1 (en) | Method and apparatus for secure delivery and rights management of digital content by means of document indexing | |
KR101439923B1 (en) | Digital Rights Management and Method for Partial Encryption of Content | |
US20040039932A1 (en) | Apparatus, system and method for securing digital documents in a digital appliance | |
US9256210B2 (en) | Safe method for card issuing, card issuing device and system | |
CN107612683B (en) | Encryption and decryption method, device, system, equipment and storage medium | |
JP2004534333A (en) | Integrated protection method and system for distributed data processing in computer networks | |
CN100401309C (en) | Tax controlling equipment software edition intelligent upgrade encryption identification method | |
CN107533613A (en) | Transplant document format file custom field | |
CN105279441A (en) | Methods and architecture for encrypting and decrypting data | |
US20100161977A1 (en) | Electronic file access control system and method | |
CN111614467A (en) | System backdoor defense method and device, computer equipment and storage medium | |
CN113326522A (en) | Data processing method, device, equipment and computer storage medium | |
JP7235941B2 (en) | Information management system and method | |
CN109871698B (en) | Data processing method, data processing device, computer equipment and storage medium | |
TW595182B (en) | Information verification device ensuring confidentiality and non-modifiability of remotely loaded data and method thereof | |
JP2009199147A (en) | Communication control method and communication control program | |
CN104486441B (en) | Long-range control method based on FTP | |
CN113824735B (en) | Remote sensing image encryption transmission method and system | |
CN113569272B (en) | Secure computer implementation method and secure computer | |
CN114637985A (en) | Android application login counterfeiting identification method based on multi-environment parameters |