WO2009067879A1 - Procédé et système de mise à jour à distance pour dispositif de sécurité d'informations - Google Patents
Procédé et système de mise à jour à distance pour dispositif de sécurité d'informations Download PDFInfo
- Publication number
- WO2009067879A1 WO2009067879A1 PCT/CN2008/072931 CN2008072931W WO2009067879A1 WO 2009067879 A1 WO2009067879 A1 WO 2009067879A1 CN 2008072931 W CN2008072931 W CN 2008072931W WO 2009067879 A1 WO2009067879 A1 WO 2009067879A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- upgrade
- algorithm
- security device
- processing
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Definitions
- the present invention relates to a remote upgrade technology, and in particular, to a remote upgrade method for an information security device and a remote upgrade system for an information security device.
- the remote upgrade of the information security device means: the remote source device transmits the upgrade information to the upgrade interface of the information security device, and the information security device uses the upgrade information received by the upgrade interface to upgrade its internal program or data without Professionals are required to go to the site where the information security equipment is located for local upgrade operations.
- the remote source device may be any device that stores upgrade information, such as a server.
- a PC or other information security device a remote source device may be referred to as an upgrader, and an information security device may be referred to as an upgraded party.
- information security devices are hardware devices for software protection, hardware protection, and identity authentication, the internal procedures and data of information security devices must be guaranteed to be credible and complete.
- the information security device as the upgraded party only receives the upgrade information from the remote source device through its upgrade interface, and uses the upgrade information received to perform internal program or data upgrade. Without sufficient legality verification of the received upgrade information, an attacker (such as a hacker or a malicious user) on the network can attack or destroy the information security device through the upgrade interface.
- an attacker such as a hacker or a malicious user may intercept and tamper with the upgrade information, and send the falsified upgrade information to the information security device, or directly forge the upgrade information to the information security device.
- Upgrade interface, and information security After the device receives the tampering or forgery of the upgrade information through its upgrade interface, if there is no reliable legality certification, the tampering or forged upgrade information will cause damage to its internal programs or data, and may cause serious security. risk.
- the information security device also uses the upgrade information of the error to upgrade its internal program or data, which may cause an upgrade error.
- the present invention provides a remote upgrade method for an information security device and a remote upgrade system for an information security device, which can improve the credibility and reliability of remote upgrade of the information security device.
- the method for remotely upgrading an information security device includes: performing security processing on the upgrade information of the remote source device to be transmitted to the information security device, and transmitting the upgraded information to the information security device;
- the information security device verifies the legality of the received upgrade information, and uses the upgrade information to perform the upgrade after the legality verification is passed.
- a remote upgrade system for an information security device includes: a remote source device and an information security device,
- the remote source device performs security processing on the upgrade information to be transmitted to the information security device, and sends the security-processed upgrade information to the information security device;
- the information security device performs legality verification on the received upgrade information, and After the legal verification is passed, the upgrade information is used to perform the upgrade.
- the present invention performs security processing on the upgrade information by the remote source device as the upgrade party, and performs legality verification on the upgrade information received by the information security device as the upgraded party, and only after the verification is passed.
- the upgrade information is used to upgrade internal programs or data, thereby ensuring that the information security device does not use the upgrade information falsified or forged by the attacker to upgrade its internal programs or data, thereby preventing the attacker from using the upgrade interface to the information security device. Attack and destruction are performed to ensure the credibility and reliability of remote upgrade of information security equipment. At the same time, upgrade errors caused by errors in the upgrade information during transmission are also avoided.
- FIG. 1 is an exemplary flowchart of a remote upgrade method of an information security device in the present invention.
- FIG. 1 is a flow chart of a method for remotely upgrading an information security device according to Embodiment 1 of the present invention.
- FIG. 3 is a flow chart of a method for remotely upgrading an information security device according to Embodiment 2 of the method of the present invention.
- FIG. 4 is a structural diagram of a remote upgrade system of an information security device in Embodiment 1 of the system of the present invention.
- FIG. 5 is a structural diagram of a remote upgrade system of an information security device in Embodiment 2 of the system of the present invention. Mode for carrying out the invention
- FIG. 1 is an exemplary flowchart of a remote upgrade method of an information security device in the present invention.
- the remote upgrade method of the information security device in the present invention includes: Step 101: The remote source device performs security processing on the upgrade information to be transmitted to the information security device.
- the security processing in this step may include signature processing, and the signature information may be used to obtain the upgrade information of the additional signature, that is, the tamper-proof of the information can be upgraded.
- the signature processing can be implemented by using any signature algorithm and a corresponding signature key, such as an information authentication code.
- MAC hash information verification code
- HMAC hash information verification code
- RSA hash information verification code
- ECC elliptic curve encryption algorithm
- signature algorithm and signature The key is preset in the remote source device, and the corresponding verification algorithm and the verification key are preset in the information security device.
- the security process in this step may further include an encryption process performed after the signature process to process the upgrade information of the additional signature from the plaintext to the ciphertext.
- the encryption process may use an encryption algorithm such as a data encryption standard (DES), a triple data encryption standard (TDES), an advanced encryption standard (AES), an RSA, an ECC, etc.; the encryption algorithm and the encryption key are preset in the remote source device, The corresponding decryption algorithm and decryption key are preset in the information security device.
- DES data encryption standard
- TDES triple data encryption standard
- AES advanced encryption standard
- ECC ECC
- Step 102 The remote source device transmits the security-processed upgrade information to the upgrade interface of the information security device.
- Step 103 The information security device performs legality verification on the upgrade information received by the upgrade interface, and uses the upgrade information to perform the upgrade after the legality verification is passed.
- the legality verification process in this step may include: the information security device receives the upgrade on the upgrade interface by using the preset corresponding verification verification algorithm and the verification key. The information is checked and processed. If the additional signature in the upgrade information is incorrect or the signature is not attached (for example, the upgrade information received is falsified by the attacker or the upgrade information forged by the attacker, or the upgrade information is wrong during the transmission), then it is determined. The legality verification described in step 103 fails.
- the legality verification process in this step includes: the information security device first upgrades the interface by using a corresponding decryption algorithm and a decryption key set in advance. The received upgrade information is decrypted. If the decryption is successful, the upgraded interface receives the upgrade information and performs the verification process by using the corresponding verification verification algorithm and the verification key. If the verification process passes, the determination step is performed.
- the validity verification of 103 is successful; if the additional signature in the upgrade information is incorrect or no signature is attached (for example, the upgrade information received is falsified by the attacker or the upgrade information forged by the attacker, or the upgrade information is wrong during the transmission) Then, it is determined that the legality verification described in step 103 fails.
- the upgrade information is securely processed by the remote source device as the upgrader, and the upgrade information received by the information security device as the upgraded party is performed.
- Legality verification the upgrade information is used to upgrade internal programs or data only after the legality verification is passed, thereby ensuring that the information security device does not use the upgrade information falsified or forged by the attacker to upgrade its internal programs or data.
- the attacker is prevented from attacking and destroying the information security device by using the upgrade interface, thereby ensuring the credibility and reliability of the remote upgrade of the information security device.
- upgrade errors caused by errors in the upgrade information during transmission are also avoided.
- the security processing includes the signature processing
- the legality verification process includes the verification processing as an example.
- the remote upgrade method of the information security device in this embodiment includes: Step 201: The remote source device performs signature processing on the upgrade information to be transmitted to the information security device, and obtains upgrade information of the additional signature.
- the signature processing can be implemented by using any signature algorithm and a corresponding signature key, such as a MAC algorithm, or various public key algorithms such as HMAC, RSA, and ECC; the signature algorithm and the signature key are preset in the far In the end source device, the corresponding verification algorithm and the verification key are preset in the information security device; if the signature algorithm is a symmetric algorithm, the remote information source is shared with the information security device for signature and verification.
- the key; the signature key set in the remote source device and the verification key set in the information security device can also be determined through network negotiation between the remote source device and the information security device.
- Step 202 The remote source device transmits the upgraded information of the additional signature to the upgrade interface of the information security device.
- Step 203 The information security device performs the verification processing on the upgrade information received by the upgrade interface. If the verification process passes, step 204 is performed. Otherwise, step 205 is performed.
- Step 204 Perform upgrade by using the upgrade information, and end the process.
- Step 205 outputting an error message, and ending the process.
- the remote source device that is the upgraded party performs the security process including the signature processing on the upgrade information, and the upgrade information obtained by the additional signature is sent to the information security device.
- the information security device that is the upgraded party performs the verification of the legality including the verification process, and only uses the upgrade information to upgrade the internal program or data when the legality verification is passed, thereby ensuring
- the information security device does not use the upgrade information falsified or forged by the attacker to upgrade its internal programs or data, thereby preventing the attacker from using the upgrade interface to attack and destroy the information security device, thereby ensuring the remote upgrade of the information security device. Credibility and reliability. At the same time, upgrade errors caused by errors in the upgrade information during transmission are also avoided.
- the security processing includes signature processing and encryption processing
- the legality verification process includes decryption processing and risk sign processing as an example.
- FIG. 3 is a flow chart of a method for remotely upgrading an information security device according to Embodiment 2 of the method of the present invention.
- the remote upgrade method of the information security device in this embodiment includes: Step 301: The remote source device performs signature processing on the upgrade information to be transmitted to the information security device, and obtains upgrade information of the additional signature.
- the signature processing can be implemented by using any signature algorithm and a corresponding signature key, such as a MAC algorithm, or various signature algorithms such as HMAC, RSA, and ECC; the signature algorithm and the signature key are preset to the remote source.
- the corresponding verification algorithm and the verification key are preset in the information security device; if the signature algorithm is a symmetric algorithm, the remote information source shares the key for signature and verification with the information security device.
- the signature key set in the remote source device and the verification key set in the information security device can also be determined through network negotiation between the remote source device and the information security device.
- Step 302 The remote source device encrypts the upgraded information of the additional signature to obtain the ciphertext upgrade information of the additional signature.
- the encryption process may utilize encryption algorithms such as DES, TDES, AES, RSA, and ECC; the encryption algorithm and the encryption key are preset in the remote source device, and the corresponding decryption algorithm and decryption key are pre-set in the information security.
- the encryption key in the remote source device is the private key in the RSA key pair
- the decryption key in the information security device is the public key in the RSA key pair.
- Step 303 The remote source device transmits the encrypted ciphertext upgrade information to the upgrade interface of the information security device.
- Step 304 The information security device decrypts the upgrade information received by the upgrade interface, and after the decryption succeeds, step 305 is performed.
- Step 305 The information security device performs the verification process on the decrypted upgrade information. If the verification process passes, step 306 is performed. Otherwise, step 307 is performed.
- Step 306 performing an upgrade by using the upgrade information, and ending the process.
- Step 307 output an error message, and end the process.
- the remote source device that is the upgraded party performs security processing including signature processing and encryption processing on the upgrade information, and obtains the ciphertext upgrade information of the additional signature.
- Sent to the information security device, and the information security device that is the upgraded party performs the legality verification including the decryption process and the verification process on the upgrade information received, and uses the upgrade information to perform the internal use only when the legality verification is passed.
- the upgrade of the program or data ensures that the information security device does not use the upgrade information falsified or forged by the attacker to upgrade its internal programs or data, thereby preventing the attacker from using the upgrade interface to attack and destroy the information security device. It ensures the credibility and reliability of remote upgrade of information security equipment. At the same time, upgrade errors caused by errors in the upgrade information during transmission are also avoided.
- the upgrade information of the additional signature transmitted by the remote source device in this embodiment is cipher text, which can not only prevent tampering, but also ensure that the upgrade information is invisible.
- the specific processing procedures included in the security processing may also adopt other methods, such as only including encryption processing.
- the remote upgrade system of the information security device in the present invention includes: a remote source device and an information security device.
- the remote source device performs security processing on the upgrade information to be transmitted to the information security device, and transmits the security-processed upgrade information to the upgrade interface of the information security device.
- the information security device performs legality verification on the received upgrade information, and uses the upgrade information to perform the upgrade after the legality verification is passed.
- the security processing may include signature processing, and after the signature processing, the upgrade information of the additional signature may be obtained, that is, the tampering of the information can be upgraded.
- the signature processing can be implemented by using any signature algorithm and a corresponding signature key, such as a MAC algorithm, or various signature algorithms such as HMAC, RSA, and ECC; the signature algorithm and the signature key are preset in the remote source device.
- the corresponding verification algorithm and the verification key are preset in the information security setting.
- the security processing may further include an encryption process performed after the signature processing to process the upgrade information of the additional signature from the plaintext to the ciphertext.
- the encryption process may use encryption algorithms such as DES, TDES, AES, RSA, and ECC; the encryption algorithm and the encryption key are preset in the remote source device, and the corresponding decryption algorithm and decryption key are preset in the information security device. .
- the legality verification performed by the information security device is correspondingly processed for decryption processing and verification.
- the upgrade information is securely processed by the remote source device as the upgrader, and the upgrade information received by the information security device as the upgraded party is verified for legality, and only after the legality verification is passed.
- the upgrade information is used to upgrade internal programs or data, thereby ensuring that the information security device does not use the upgrade information falsified or forged by the attacker to upgrade its internal programs or data, thereby preventing the attacker from using the upgrade interface to perform information security devices. Attack and destruction, thus ensuring the credibility and reliability of remote upgrade of information security equipment.
- upgrade errors caused by errors in the upgrade information during transmission are also avoided.
- the security processing includes signature processing
- the legality verification process includes verification. Processing is an example.
- the remote upgrade system of the information security device in this embodiment includes: a remote source device and an information security device.
- the remote source device may include: an upgrade information configuration unit, a signature processing unit that implements security processing, and an information transmission unit.
- the upgrade information configuration unit sets the upgrade information to be sent to the information security device.
- the signature processing unit performs signature processing on the upgrade information to be sent to the information security device, and obtains upgrade information of the additional signature.
- the signature processing can be implemented by using any signature algorithm and a corresponding signature key, such as a MAC algorithm, or various signature algorithms such as HMAC, RSA, and ECC; the signature algorithm and the signature key are preset in the remote source device.
- the corresponding verification algorithm and the verification key are preset in the information security device; if the signature algorithm is a symmetric algorithm, the remote information source shares the key for signing and verification with the information security device;
- the signature key in the remote source device and the verification key set in the information security device may also be determined through network negotiation between the remote source device and the information security device.
- the information transmission unit transmits the upgrade information of the additional signature to the upgrade interface of the information security device.
- the information security device in this embodiment includes: an upgrade interface, an authentication processing unit that implements legality verification, and an upgrade processing unit.
- the upgrade interface receives the upgrade information from the outside.
- the upgrade information may be upgrade information of the additional signature from the remote source device, or may be upgrade information from the attacker.
- the verification processing unit performs the verification processing on the upgrade information received by the upgrade interface, and outputs the upgrade information passed by the verification processing to the upgrade processing unit.
- the remote source device as the upgrade party performs security processing including signature processing on the upgrade information, and the upgrade information obtained by adding the signature is sent to the information security device, and the information security is performed as the upgraded party.
- the device performs the verification of the legality of the verification information received by the device, and only uses the upgrade information to upgrade the internal program or data when the legality verification is passed, thereby ensuring that the information security device does not use the attacked device.
- the tampering or falsified upgrade information upgrades its internal programs or data, preventing the attacker from using the upgrade interface to attack and destroy the information security device, thereby ensuring the credibility and reliability of the remote upgrade of the information security device.
- upgrade errors caused by errors in the upgrade information during transmission are also avoided.
- the security processing includes signature processing and encryption processing
- the legality verification process includes decryption processing and risk sign processing as an example.
- FIG. 5 is a structural diagram of a remote upgrade system of an information security device in Embodiment 2 of the system of the present invention.
- the remote system method of the information security device in this embodiment includes: a remote source device and an information security device.
- the remote source device may include: an upgrade information configuration unit, a signature processing unit and an encryption processing unit that implement security processing, and an information transmission unit.
- the upgrade information configuration unit sets the upgrade information to be sent to the information security device.
- the signature processing unit performs signature processing on the upgrade information to be transmitted to the information security device, and obtains upgrade information of the additional signature.
- the signature processing can be implemented by using any signature algorithm and a corresponding signature key, such as a MAC algorithm, or various signature algorithms such as HMAC, RSA, and ECC; the signature algorithm and the signature key are preset in the remote source device.
- the corresponding verification algorithm and the verification key are preset in the information security device; if the signature algorithm is a symmetric algorithm, the remote information source shares the key for signing and verification with the information security device; Sign in the remote source device
- the name key and the verification key set in the information security device may also be determined by the remote source device and the information security device through network negotiation.
- the encryption processing unit encrypts the upgrade information of the additional signature to obtain the ciphertext upgrade information of the additional signature.
- the encryption process may use encryption algorithms such as DES, TDES, AES, RSA, and ECC; the encryption algorithm and the encryption key are preset in the remote source device, and the corresponding decryption algorithm and decryption key are preset in the information security device.
- encryption algorithms such as DES, TDES, AES, RSA, and ECC
- the encryption algorithm and the encryption key are preset in the remote source device
- the corresponding decryption algorithm and decryption key are preset in the information security device.
- RSA Take the RSA algorithm as an example.
- the encryption key in the remote source device is the private key in the RSA key pair
- the decryption key in the information security device is the public key in the RSA key pair.
- the information transmission unit transmits the encrypted ciphertext upgrade information to the upgrade interface of the information security device.
- the information security device in this embodiment includes: an upgrade interface, a decryption processing unit and a verification processing unit that implements legality verification, and an upgrade processing unit.
- the decryption processing unit decrypts the upgrade information received by the upgrade interface, and outputs the upgrade information after the decryption is successful to the verification processing unit.
- the verification processing unit performs the verification processing on the decrypted upgrade information, and outputs the upgrade information passed by the verification processing to the upgrade processing unit.
- the remote source device that is the upgraded party performs the security processing including the signature processing and the encryption processing on the upgrade information, and the ciphertext upgrade information obtained by the additional signature is sent to the information security device, and is used as the
- the upgraded information security device performs the legality verification of the decryption processing and the verification processing on the received upgrade information, and uses the upgrade information to upgrade the internal program or data only when the legality verification is passed, thereby ensuring the information.
- the security device does not use the upgrade information falsified or forged by the attacker to upgrade its internal programs or data, preventing the attacker from using the upgrade interface to attack the information security device. And destruction, thus ensuring the credibility and reliability of remote upgrade of information security equipment. At the same time, upgrade errors caused by errors in the upgrade information during transmission are also avoided.
- the functional unit in the remote source device that implements the security processing in the remote device includes an encryption processing unit in addition to the signature processing unit, and the upgrade information of the additional signature transmitted by the remote source device is dense. Text, not only can prevent tampering, but also ensure that the upgrade information is not visible.
- the remote source device can also use other functional units for secure processing.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Description
信息安全设备的远程升级方法及系统 技术领域
本发明涉及远程升级技术, 特别涉及一种信息安全设备的远程升级 方法和一种信息安全设备的远程升级系统。 发明背景
信息安全设备的远程升级是指: 远端源设备将升级信息传输至信息 安全设备的升级接口, 信息安全设备利用其升级接口接收到的该升级信 息实现对其内部程序或数据的升级, 而不需要专业人员到信息安全设备 所在的现场进行本地升级操作。
其中,远端源设备可以为存储了升级信息的任意设备,例如服务器、
PC机、 或其他的信息安全设备; 远端源设备可以称为升级方, 信息安 全设备则可以称为被升级方。
由于信息安全设备是用于软件保护、 硬件保护以及身份认证等的硬 件设备, 因此, 必须保证信息安全设备的内部程序和数据的可信性和完 整性。
然而, 现有信息安全设备的远程升级过程中, 作为被升级方的信息 安全设备只是通过其升级接口接收来自远端源设备的升级信息, 并利用 接收到的升级信息进行内部程序或数据的升级, 而没有对接收到的升级 信息进行足够的合法性验证, 从而会使得网络中的攻击者(例如黑客、 或恶意用户) 能够通过升级接口对信息安全设备进行攻击或破坏。
例如, 在升级信息的传输过程中, 攻击者(例如黑客、 或恶意用户) 可能截获并篡改升级信息, 并将篡改后的升级信息发送至信息安全设 备, 或者直接伪造升级信息发送至信息安全设备的升级接口, 而信息安
全设备通过其升级接口接收到被篡改或伪造的升级信息后, 如果没有可 靠的合法性认证, 则被篡改或伪造的升级信息会对其内部的程序或数据 造成破坏, 并可能造成严重的安全风险。
而且, 如果升级信息在传输过程中出错, 而没有可靠的验证方法的 话, 则信息安全设备也会利用出错的升级信息实现对其内部程序或数据 的升级, 从而可能导致升级错误。
可见, 现有信息安全设备的远程升级的可信性和可靠性不高, 无法 避免攻击者通过升级接口对信息安全设备发起的攻击和破坏, 从而保证 信息安全设备内部的程序或数据的安全性, 也无法保证升级信息在传输 过程中出错所导致的升级错误。 发明内容
有鉴于此, 本发明提供了一种信息安全设备的远程升级方法、 以及 一种信息安全设备的远程升级系统, 能够提高信息安全设备的远程升级 的可信性和可靠性。
本发明提供的一种信息安全设备的远程升级方法, 包括: 远端源设备对待传输至信息安全设备的升级信息进行安全处理, 并 将经安全处理的升级信息发送至信息安全设备;
信息安全设备对接收到的升级信息进行合法性验证, 并在合法性验 证通过后利用该升级信息执行升级。
本发明提供的一种信息安全设备的远程升级系统, 包括: 远端源设 备和信息安全设备,
所述远端源设备, 对待传输至信息安全设备的升级信息进行安全处 理, 并将经安全处理的升级信息发送至所述信息安全设备;
所述信息安全设备, 对接收到的升级信息进行合法性验证, 并在合
法性验证通过后利用该升级信息执行升级。
由上述技术方案可见, 本发明由作为升级方的远端源设备对升级信 息进行安全处理, 并由作为被升级方的信息安全设备对接收到的升级信 息进行合法性验证, 只有在验证通过才利用该升级信息进行内部程序或 数据的升级, 从而确保了信息安全设备不会利用被攻击者篡改或伪造的 升级信息对其内部的程序或数据升级, 避免了攻击者利用升级接口对信 息安全设备进行攻击和破坏, 从而保证了信息安全设备的远程升级的可 信性和可靠性。 同时, 也避免了升级信息在传输过程中出错所导致的升 级错误。 附图简要说明
图 1为本发明中信息安全设备的远程升级方法的示例性流程图。 图 为本发明方法实施例一中信息安全设备的远程升级方法的流程 图。
图 3为本发明方法实施例二中信息安全设备的远程升级方法的流程 图。
图 4为本发明系统实施例一中信息安全设备的远程升级系统的结构 图。
图 5为本发明系统实施例二中信息安全设备的远程升级系统的结构 图。 实施本发明的方式
为使本发明的目的、 技术方案及优点更加清楚明白, 以下参照附图 并举实施例, 对本发明进一步详细说明。
图 1为本发明中信息安全设备的远程升级方法的示例性流程图。 如
图 1所示, 本发明中信息安全设备的远程升级方法包括: 步骤 101 , 远端源设备对待传输至信息安全设备的升级信息进行安 全处理。
较佳地, 本步骤中的安全处理可包括签名处理, 签名处理后即可得 到附加签名的升级信息, 即能够升级信息的防篡改。 其中, 签名处理可 利用任意一种签名算法及对应的签名密钥来实现, 例如信息认证码
( MAC ) 算法, 即密钥相关的单向散列函数, 或杂凑信息验证码 ( HMAC )、 非对称加密算法(RSA )、 椭圆曲线加密算法(ECC )等各 种签名算法; 签名算法和签名密钥预先设置于远端源设备中, 对应的验 签算法和验签密钥则预先设置于信息安全设备中。
可选地, 本步骤中的安全处理还可包括在签名处理之后执行的加密 处理, 以将附加签名的升级信息由明文处理为密文。 其中, 加密处理可 利用数据加密标准(DES )、 三重数据加密标准(TDES )、 高级加密标准 ( AES )、 RSA、 ECC 等加密算法; 加密算法和加密密钥预先设置于远 端源设备中, 对应的解密算法和解密密钥则预先设置于信息安全设备 中。
步骤 102, 远端源设备将经安全处理的升级信息传输至信息安全设 备的升级接口。
步骤 103, 信息安全设备对其升级接口接收到的升级信息进行合法 性验证, 并在合法性验证通过后利用该升级信息执行升级。
如果在步骤 101执行的安全处理仅包括签名处理, 则本步骤中的合 法性验证过程即可包括: 信息安全设备利用预先设置的对应验签算法和 验签密钥, 对其升级接口接收到升级信息进行验签处理, 如果升级信息 中的附加签名错误或未附加签名 (例如接收到的升级信息被攻击者篡改 或为攻击者伪造的升级信息、 或升级信息在传输过程中出错), 则确定
步骤 103所述的合法性验证失败。
如果在步骤 101执行的安全处理还包括在签名处理之后执行的加密 处理, 则本步骤中的合法性验证过程包括: 信息安全设备利用预先设置 的对应解密算法和解密密钥, 先对其升级接口接收到的升级信息进行解 密, 如果解密成功, 则再利用预先设置的对应验签算法和验签密钥, 对 其升级接口接收到升级信息进行验签处理, 如果验签处理通过, 则确定 步骤 103所述的合法性验证成功; 如果升级信息中的附加签名错误或未 附加签名 (例如接收到的升级信息被攻击者篡改或为攻击者伪造的升级 信息、 或升级信息在传输过程中出错), 则确定步骤 103 所述的合法性 验证失败。
至此, 本流程结束。
由上述流程可见, 本发明中信息安全设备的远程升级方法中, 由作 为升级方的远端源设备对升级信息进行安全处理, 并由作为被升级方的 信息安全设备对接收到的升级信息进行合法性验证, 只有在合法性验证 通过才利用该升级信息进行内部程序或数据的升级, 从而确保了信息安 全设备不会利用被攻击者篡改或伪造的升级信息对其内部的程序或数 据升级, 避免了攻击者利用升级接口对信息安全设备进行攻击和破坏, 从而保证了信息安全设备的远程升级的可信性和可靠性。 同时, 也避免 了升级信息在传输过程中出错所导致的升级错误。
下面, 结合具体实施例, 对上述方法进行进一步说明。
方法实施例一
本实施例中, 以安全处理包括签名处理、 合法性验证过程包括验签 处理为例。
图 为本发明方法实施例一中信息安全设备的远程升级方法的流程 图。 如图 2所示, 本实施例中信息安全设备的远程升级方法包括:
步骤 201 , 远端源设备对待传输至信息安全设备的升级信息进行签 名处理, 得到附加签名的升级信息。
本步骤中, 签名处理可利用任意一种签名算法及对应的签名密钥来 实现, 例如 MAC算法, 或 HMAC、 RSA、 ECC等各种公开密钥算法; 签名算法和签名密钥预先设置于远端源设备中, 对应的验签算法和验签 密钥则预先设置于信息安全设备中; 如果签名算法为一种对称算法, 则 远端信息源与信息安全设备共享用于签名和验签的密钥; 设置于远端源 设备中的签名密钥、 设置于信息安全设备中的验签密钥, 也可以通过远 端源设备与信息安全设备通过网络协商来确定。
步骤 202, 远端源设备将附加签名的升级信息传输至信息安全设备 的升级接口。
步骤 203 , 信息安全设备对其升级接口接收到的升级信息进行验签 处理, 如果验签处理通过, 则执行步骤 204, 否则, 执行步骤 205。
步骤 204, 利用升级信息执行升级, 并结束本流程。
步骤 205, 输出错误信息, 并结束本流程。
至此, 本流程结束。
由上述流程可见, 本实施例中信息安全设备的远程升级方法中, 由 作为升级方的远端源设备对升级信息进行包括了签名处理的安全处理, 得到附加签名的升级信息发送至信息安全设备, 并由作为被升级方的信 息安全设备对接收到的升级信息进行包括了验签处理的合法性验证, 只 有在合法性验证通过时才利用该升级信息进行内部程序或数据的升级, 从而确保了信息安全设备不会利用被攻击者篡改或伪造的升级信息对 其内部的程序或数据升级, 避免了攻击者利用升级接口对信息安全设备 进行攻击和破坏, 从而保证了信息安全设备的远程升级的可信性和可靠 性。 同时, 也避免了升级信息在传输过程中出错所导致的升级错误。
方法实施例二
本实施例中, 以安全处理包括签名处理和加密处理、 合法性验证过 程包括解密处理和险签处理为例。
图 3为本发明方法实施例二中信息安全设备的远程升级方法的流程 图。 如图 3所示, 本实施例中信息安全设备的远程升级方法包括: 步骤 301 , 远端源设备对待传输至信息安全设备的升级信息进行签 名处理, 得到附加签名的升级信息。
本步骤中, 签名处理可利用任意一种签名算法及对应的签名密钥来 实现, 例如 MAC算法, 或 HMAC、 RSA、 ECC等各种签名算法; 签名 算法和签名密钥预先设置于远端源设备中, 对应的验签算法和验签密钥 则预先设置于信息安全设备中; 如果签名算法为一种对称算法, 则远端 信息源与信息安全设备共享用于签名和验签的密钥; 设置于远端源设备 中的签名密钥、 设置于信息安全设备中的验签密钥, 也可以通过远端源 设备与信息安全设备通过网络协商来确定。
步骤 302, 远端源设备对附加签名的升级信息进行加密处理, 得到 附加签名的密文升级信息。
本步骤中, 加密处理可利用 DES、 TDES、 AES、 RSA、 ECC等加 密算法; 加密算法和加密密钥预先设置于远端源设备中, 对应的解密算 法和解密密钥则预先设置于信息安全设备中。 以 RSA算法为例,远端源 设备中的加密密钥为 RSA密钥对中的私钥,信息安全设备中的解密密钥 则为 RSA密钥对中的公钥。
步骤 303 , 远端源设备将附加签名的密文升级信息传输至信息安全 设备的升级接口。
步骤 304, 信息安全设备对其升级接口接收到的升级信息进行解密 处理, 在解密成功后执行步骤 305。
步骤 305 , 信息安全设备对解密后的升级信息进行验签处理, 如果 验签处理通过, 则执行步骤 306, 否则, 执行步骤 307。
步骤 306, 利用升级信息执行升级, 并结束本流程。
步骤 307, 输出错误信息, 并结束本流程。
至此, 本流程结束。
由上述流程可见, 本实施例中信息安全设备的远程升级方法中, 由 作为升级方的远端源设备对升级信息进行包括了签名处理和加密处理 的安全处理, 得到附加签名的密文升级信息发送至信息安全设备, 并由 作为被升级方的信息安全设备对接收到的升级信息进行包括了解密处 理和验签处理的合法性验证, 只有在合法性验证通过时才利用该升级信 息进行内部程序或数据的升级, 从而确保了信息安全设备不会利用被攻 击者篡改或伪造的升级信息对其内部的程序或数据升级, 避免了攻击者 利用升级接口对信息安全设备进行攻击和破坏, 从而保证了信息安全设 备的远程升级的可信性和可靠性。 同时, 也避免了升级信息在传输过程 中出错所导致的升级错误。
相比于方法实施例一, 本实施例中远端源设备传输的附加签名的升 级信息为密文, 不但能够防篡改, 还能够保证升级信息不可见。
除以上两个方法实施例之外, 根据网络环境和用户需求, 安全处理 所包括的具体处理过程也可以采用其他方式, 例如只包括加密处理等。
以上是对本发明中信息安全设备的远程升级方法的详细说明。下面, 再对本发明中信息安全设备的远程升级系统进行说明。
本发明中信息安全设备的远程升级系统包括: 远端源设备和信息安 全设备。
远端源设备, 对待传输至信息安全设备的升级信息进行安全处理, 并将经安全处理的升级信息传输至信息安全设备的升级接口。
信息安全设备, 对接收到的升级信息进行合法性验证, 并在合法性 验证通过后利用该升级信息执行升级。
实际应用中, 较佳地, 安全处理可包括签名处理, 签名处理后即可 得到附加签名的升级信息, 即能够升级信息的防篡改。 其中, 签名处理 可利用任意一种签名算法及对应的签名密钥来实现, 例如 MAC算法, 或 HMAC、 RSA、 ECC等各种签名算法; 签名算法和签名密钥预先设置 于远端源设备中, 对应的验签算法和验签密钥则预先设置于信息安全设 可选地, 安全处理还可包括在签名处理之后执行的加密处理, 以将 附加签名的升级信息由明文处理为密文。 其中, 加密处理可利用 DES、 TDES、 AES、 RSA、 ECC 等加密算法; 加密算法和加密密钥预先设置 于远端源设备中, 对应的解密算法和解密密钥则预先设置于信息安全设 备中。 信息安全设备所执行的合法性验证则对应地为解密处理和验签处 理。
由上述系统可见, 由作为升级方的远端源设备对升级信息进行安全 处理, 并由作为被升级方的信息安全设备对接收到的升级信息进行合法 性验证, 只有在合法性验证通过才利用该升级信息进行内部程序或数据 的升级, 从而确保了信息安全设备不会利用被攻击者篡改或伪造的升级 信息对其内部的程序或数据升级, 避免了攻击者利用升级接口对信息安 全设备进行攻击和破坏, 从而保证了信息安全设备的远程升级的可信性 和可靠性。 同时, 也避免了升级信息在传输过程中出错所导致的升级错 误。
下面, 结合具体实施例, 对上述系统进行进一步说明。
系统实施例一
本实施例中, 以安全处理包括签名处理、 合法性验证过程包括验签
处理为例。
图 4为本发明系统实施例一中信息安全设备的远程升级系统的结构 图。 如图 4所示, 本实施例中信息安全设备的远程升级系统包括: 远端 源设备和信息安全设备。
具体来说, 远端源设备中可以包括: 升级信息配置单元、 实现安全 处理的签名处理单元、 信息传输单元。
升级信息配置单元中设置了待发送给信息安全设备的升级信息。 签名处理单元,对待发送给信息安全设备的升级信息进行签名处理, 得到附加签名的升级信息。
其中,签名处理可利用任意一种签名算法及对应的签名密钥来实现, 例如 MAC算法, 或 HMAC、 RSA、 ECC等各种签名算法; 签名算法和 签名密钥预先设置于远端源设备中, 对应的验签算法和验签密钥则预先 设置于信息安全设备中; 如果签名算法为一种对称算法, 则远端信息源 与信息安全设备共享用于签名和验签的密钥; 设置于远端源设备中的签 名密钥、 设置于信息安全设备中的验签密钥, 也可以通过远端源设备与 信息安全设备通过网络协商来确定。
信息传输单元, 将附加签名的升级信息传输至信息安全设备的升级 接口。
对应地, 本实施例中的信息安全设备包括: 升级接口、 实现合法性 验证的验签处理单元、 以及升级处理单元。
升级接口, 接收来自外部的升级信息, 该升级信息可能为来自远端 源设备的附加签名的升级信息, 也可能为来自攻击者的升级信息。
验签处理单元, 对升级接口接收到的升级信息进行验签处理, 将验 签处理通过的升级信息输出至升级处理单元。
升级处理单元, 利用接收到的升级信息执行升级。
由上述系统可见, 本实施例由作为升级方的远端源设备对升级信息 进行包括了签名处理的安全处理, 得到附加签名的升级信息发送至信息 安全设备, 并由作为被升级方的信息安全设备则对接收到的升级信息进 行包括了验签处理的合法性验证, 只有在合法性验证通过时才利用该升 级信息进行内部程序或数据的升级, 从而确保了信息安全设备不会利用 被攻击者篡改或伪造的升级信息对其内部的程序或数据升级, 避免了攻 击者利用升级接口对信息安全设备进行攻击和破坏, 从而保证了信息安 全设备的远程升级的可信性和可靠性。 同时, 也避免了升级信息在传输 过程中出错所导致的升级错误。
系统实施例二
本实施例中, 以安全处理包括签名处理和加密处理、 合法性验证过 程包括解密处理和险签处理为例。
图 5为本发明系统实施例二中信息安全设备的远程升级系统的结构 图。 如图 5所示, 本实施例中信息安全设备的远程系统方法包括: 远端 源设备和信息安全设备。
具体来说, 远端源设备中可以包括: 升级信息配置单元、 实现安全 处理的签名处理单元和加密处理单元、 以及信息传输单元。
升级信息配置单元中设置了待发送给信息安全设备的升级信息。 签名处理单元,对待传输至信息安全设备的升级信息进行签名处理, 得到附加签名的升级信息。
其中,签名处理可利用任意一种签名算法及对应的签名密钥来实现, 例如 MAC算法, 或 HMAC、 RSA、 ECC等各种签名算法; 签名算法和 签名密钥预先设置于远端源设备中, 对应的验签算法和验签密钥则预先 设置于信息安全设备中; 如果签名算法为一种对称算法, 则远端信息源 与信息安全设备共享用于签名和验签的密钥; 设置于远端源设备中的签
名密钥、 设置于信息安全设备中的验签密钥, 也可以通过远端源设备与 信息安全设备通过网络协商来确定。
加密处理单元, 对附加签名的升级信息进行加密处理, 得到附加签 名的密文升级信息。
其中, 加密处理可利用 DES、 TDES、 AES、 RSA、 ECC等加密算 法; 加密算法和加密密钥预先设置于远端源设备中, 对应的解密算法和 解密密钥则预先设置于信息安全设备中。以 RSA算法为例,远端源设备 中的加密密钥为 RSA密钥对中的私钥,信息安全设备中的解密密钥则为 RSA密钥对中的公钥。
信息传输单元, 将附加签名的密文升级信息传输至信息安全设备的 升级接口。
对应地, 本实施例中的信息安全设备包括: 升级接口、 实现合法性 验证的解密处理单元和验签处理单元、 以及升级处理单元。
解密处理单元, 对升级接口接收到的升级信息进行解密处理, 将解 密成功后的升级信息输出至验签处理单元。
验签处理单元, 对解密后的升级信息进行验签处理, 将验签处理通 过的升级信息输出至升级处理单元。
升级处理单元, 利用升级信息执行升级。
由上述系统可见, 本实施例由作为升级方的远端源设备对升级信息 进行包括了签名处理和加密处理的安全处理, 得到附加签名的密文升级 信息发送至信息安全设备, 并由作为被升级方的信息安全设备对接收到 的升级信息进行包括了解密处理和验签处理的合法性验证, 只有在合法 性验证通过时才利用该升级信息进行内部程序或数据的升级, 从而确保 了信息安全设备不会利用被攻击者篡改或伪造的升级信息对其内部的 程序或数据升级, 避免了攻击者利用升级接口对信息安全设备进行攻击
和破坏,从而保证了信息安全设备的远程升级的可信性和可靠性。 同时, 也避免了升级信息在传输过程中出错所导致的升级错误。
相比于系统实施例一, 本实施例中远端源设备中实现安全处理的功 能单元除了签名处理单元之外, 还包括加密处理单元, 且远端源设备传 输的附加签名的升级信息为密文, 不但能够防篡改, 还能够保证升级信 息不可见。
除以上两个系统实施例之外, 根据网络环境和用户需求, 远端源设 备也可以采用其他功能单元用以实现安全处理。
以上所述仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。 凡在本发明的精神和原则之内, 所作的任何修改、 等同替换以 及改进等, 均应包含在本发明的保护范围之内。
Claims
1、 一种信息安全设备的远程升级方法, 其特征在于, 该方法包括: 远端源设备对待传输至信息安全设备的升级信息进行安全处理, 并 将经安全处理的升级信息发送至信息安全设备;
信息安全设备对接收到的升级信息进行合法性验证, 并在合法性验 证通过后利用该升级信息执行升级。
2、 如权利要求 1所述的方法, 其特征在于, 所述安全处理包括: 签 名处理;
所述合法性验证包括: 验签处理。
3、如权利要求 2所述的方法, 其特征在于, 利用如下算法执行所述 签名处理和验签处理: 信息认证码 MAC算法、 杂凑信息验证码 HMAC 算法、 非对称加密算法 RSA算法或椭圆曲线加密算法 ECC算法。
4、如权利要求 2或 3所述的方法, 其特征在于, 在所述签名处理之 后, 所述安全处理进一步包括: 加密处理;
在所述验签处理之前, 所述合法性验证进一步包括: 解密处理。
5、如权利要求 4所述的方法, 其特征在于, 利用如下算法执行所述 加密处理和解密处理:数据加密标准 DES算法、三重数据加密标准 TDES 算法、 高级加密标准 AES算法、 RSA算法或 ECC算法。
6、一种信息安全设备的远程升级系统, 该系统包括: 远端源设备和 信息安全设备, 其特征在于,
所述远端源设备, 对待传输至信息安全设备的升级信息进行安全处 理, 并将经安全处理的升级信息发送至所述信息安全设备;
所述信息安全设备, 对接收到的升级信息进行合法性验证, 并在合 法性验证通过后利用该升级信息执行升级。
7、 如权利要求 6所述的系统, 其特征在于, 所述远端源设备包括: 升级信息配置单元、 实现安全处理的签名处理单元和信息传输单元, 其 中,
所述升级信息配置单元中设置了待发送给所述信息安全设备的升级 信息;
所述签名处理单元, 对所述待发送给信息安全设备的升级信息进行 签名处理, 得到附加签名的升级信息;
所述信息传输单元, 将所述附加签名的升级信息传输至所述信息安 全设备;
所述信息安全设备包括: 升级接口、 实现合法性验证的验签处理单 元以及升级处理单元, 其中,
所述升级接口, 接收来自外部的升级信息;
所述验签处理单元, 对所述升级接口接收到的升级信息进行验签处 理, 将险签处理通过的升级信息输出至所述升级处理单元;
所述升级处理单元, 利用接收到的升级信息执行升级。
8、如权利要求 7所述的系统, 其特征在于, 所述签名处理单元和所 述验签处理单元利用如下算法分别执行所述签名处理和验签处理: 信息 认证码 MAC算法、杂凑信息验证码 HMAC算法、非对称加密算法 RSA 算法或椭圆曲线加密算法 ECC算法。
9、如权利要求 7或 8所述的系统, 其特征在于, 所述远端源设备在 所述签名处理单元与所述信息传输单元之间, 进一步包括加密处理单 元;
所述加密处理单元, 将所述签名处理单元得到的附加签名的升级信 息进行加密处理后传输至所述信息传输单元;
所述信息安全设备在所述升级接口与所述验签处理单元之间, 进一
步包括解密处理单元;
所述解密处理单元, 将所述升级接口接收到的升级信息进行解密处 理, 并将成功解密的升级信息输出至所述验签处理单元进行验签处理。
10、 如权利要求 9所述的系统, 其特征在于, 所述加密处理单元和 所述解密处理单元利用如下算法分别执行所述加密处理和解密处理: 数 据加密标准 DES算法、 三重数据加密标准 TDES算法、 高级加密标准 AES算法、 RSA算法或 ECC算法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710177208.0 | 2007-11-12 | ||
CNA2007101772080A CN101163044A (zh) | 2007-11-12 | 2007-11-12 | 信息安全设备的远程升级方法及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009067879A1 true WO2009067879A1 (fr) | 2009-06-04 |
Family
ID=39297878
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2008/072931 WO2009067879A1 (fr) | 2007-11-12 | 2008-11-04 | Procédé et système de mise à jour à distance pour dispositif de sécurité d'informations |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101163044A (zh) |
WO (1) | WO2009067879A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101808100A (zh) * | 2010-01-26 | 2010-08-18 | 北京深思洛克软件技术股份有限公司 | 一种解决信息安全设备远程升级重放性的方法和系统 |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101163044A (zh) * | 2007-11-12 | 2008-04-16 | 北京深思洛克数据保护中心 | 信息安全设备的远程升级方法及系统 |
CN101403985B (zh) * | 2008-05-04 | 2011-03-30 | 北京深思洛克软件技术股份有限公司 | 一种对软件保护装置中的软件许可进行备份的方法 |
CN101339594B (zh) * | 2008-05-20 | 2011-12-21 | 北京深思洛克软件技术股份有限公司 | 一种提高软件保护装置安全性的方法 |
CN101339595B (zh) * | 2008-05-20 | 2011-08-10 | 北京深思洛克软件技术股份有限公司 | 一种通过使用许可控制软件使用的装置 |
CN102170355A (zh) * | 2011-04-27 | 2011-08-31 | 北京深思洛克软件技术股份有限公司 | 信息安全设备中远程升级密钥管理方法 |
CN102708069B (zh) * | 2012-05-12 | 2016-11-16 | 北京深思数盾科技股份有限公司 | 安卓系统中内存数据的保护方法 |
CN102722919B (zh) * | 2012-05-31 | 2015-08-19 | 株洲南车时代电气股份有限公司 | 一种列车监控记录装置数据更新设备及其方法 |
CN102999570B (zh) * | 2012-11-09 | 2016-06-08 | 北京深思数盾科技股份有限公司 | 移动设备中应用程序关键数据的离线控制方法和系统 |
CN103873440B (zh) * | 2012-12-11 | 2017-03-22 | 北京旋极信息技术股份有限公司 | 一种应用程序的升级方法和系统 |
CN104052818B (zh) * | 2014-06-27 | 2017-07-11 | 青岛海信移动通信技术股份有限公司 | 一种移动终端的版本升级方法及装置 |
DE102015203776A1 (de) * | 2015-03-03 | 2016-09-08 | Robert Bosch Gmbh | Verfahren zur Programmierung eines Steuergeräts eines Kraftfahrzeugs |
CN106227503A (zh) * | 2016-07-29 | 2016-12-14 | 苏州国芯科技有限公司 | 安全芯片cos固件更新方法、服务端、终端及系统 |
CN107704280B (zh) * | 2016-11-15 | 2020-08-04 | 平安科技(深圳)有限公司 | 应用程序升级方法及系统 |
CN106599697B (zh) * | 2016-11-30 | 2019-10-29 | 北京三未信安科技发展有限公司 | 一种安全升级pci密码卡卡内程序的方法及系统 |
CN108111507A (zh) * | 2017-12-19 | 2018-06-01 | 恒宝股份有限公司 | 一种设备远程升级的方法及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1972486A (zh) * | 2006-12-04 | 2007-05-30 | Ut斯达康通讯有限公司 | 无线通讯终端远程无线参数修改方法 |
CN101163044A (zh) * | 2007-11-12 | 2008-04-16 | 北京深思洛克数据保护中心 | 信息安全设备的远程升级方法及系统 |
CN101251883A (zh) * | 2008-03-11 | 2008-08-27 | 北京深思洛克数据保护中心 | 一种对软件保护设备进行安全可控的远程升级的方法 |
-
2007
- 2007-11-12 CN CNA2007101772080A patent/CN101163044A/zh active Pending
-
2008
- 2008-11-04 WO PCT/CN2008/072931 patent/WO2009067879A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1972486A (zh) * | 2006-12-04 | 2007-05-30 | Ut斯达康通讯有限公司 | 无线通讯终端远程无线参数修改方法 |
CN101163044A (zh) * | 2007-11-12 | 2008-04-16 | 北京深思洛克数据保护中心 | 信息安全设备的远程升级方法及系统 |
CN101251883A (zh) * | 2008-03-11 | 2008-08-27 | 北京深思洛克数据保护中心 | 一种对软件保护设备进行安全可控的远程升级的方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101808100A (zh) * | 2010-01-26 | 2010-08-18 | 北京深思洛克软件技术股份有限公司 | 一种解决信息安全设备远程升级重放性的方法和系统 |
Also Published As
Publication number | Publication date |
---|---|
CN101163044A (zh) | 2008-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009067879A1 (fr) | Procédé et système de mise à jour à distance pour dispositif de sécurité d'informations | |
US11757662B2 (en) | Confidential authentication and provisioning | |
CN109728909B (zh) | 基于USBKey的身份认证方法和系统 | |
WO2020087805A1 (zh) | 基于双密值和混沌加密的可信测控网络认证方法 | |
US8904178B2 (en) | System and method for secure remote access | |
US7584505B2 (en) | Inspected secure communication protocol | |
US8130961B2 (en) | Method and system for client-server mutual authentication using event-based OTP | |
EP2868031B1 (en) | Secure key storage systems, methods and apparatuses | |
JP5845393B2 (ja) | 暗号通信装置および暗号通信システム | |
CN101272616B (zh) | 一种无线城域网的安全接入方法 | |
US20080301433A1 (en) | Secure Communications | |
WO2014026518A1 (zh) | 软件密钥更新方法和装置 | |
JP2004515117A (ja) | 暗号化データセキュリティシステムおよび方法 | |
KR20110009222A (ko) | 토큰과 검증자 사이의 인증을 위한 네크워크 헬퍼 | |
EP4318217A1 (en) | Method, apparatus, and storage medium for updating vehicle software | |
KR20140023799A (ko) | Can에서 데이터의 기밀성과 무결성을 보장하는 방법 | |
US20210392004A1 (en) | Apparatus and method for authenticating device based on certificate using physical unclonable function | |
CN107483388A (zh) | 一种安全通信方法及其终端和云端 | |
CN110838919B (zh) | 通信方法、存储方法、运算方法及装置 | |
CN112703500A (zh) | 在低功率模式期间保护存储在IoT装置的存储器中的数据 | |
CN110149205B (zh) | 一种利于区块链保护物联网终端的方法 | |
KR102523416B1 (ko) | 이미지에 대한 보안 기능을 제공하는 보안 장치, 이를 포함하는 카메라 장치 및 카메라 장치를 제어하는 시스템 온 칩 | |
JP2021111925A (ja) | 電子署名システム | |
CN115333779A (zh) | 一种验证数据的方法、装置及电子设备 | |
KR100744603B1 (ko) | 생체 데이터를 이용한 패킷 레벨 사용자 인증 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08854693 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08854693 Country of ref document: EP Kind code of ref document: A1 |