WO2022120572A1 - 一种篡改验证方法及装置 - Google Patents

一种篡改验证方法及装置 Download PDF

Info

Publication number
WO2022120572A1
WO2022120572A1 PCT/CN2020/134547 CN2020134547W WO2022120572A1 WO 2022120572 A1 WO2022120572 A1 WO 2022120572A1 CN 2020134547 W CN2020134547 W CN 2020134547W WO 2022120572 A1 WO2022120572 A1 WO 2022120572A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
verification
algorithm
verification algorithm
tampered
Prior art date
Application number
PCT/CN2020/134547
Other languages
English (en)
French (fr)
Inventor
苏碧锋
刘鹏飞
吴壬华
Original Assignee
深圳欣锐科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳欣锐科技股份有限公司 filed Critical 深圳欣锐科技股份有限公司
Priority to CN202080025333.3A priority Critical patent/CN113795840A/zh
Priority to PCT/CN2020/134547 priority patent/WO2022120572A1/zh
Publication of WO2022120572A1 publication Critical patent/WO2022120572A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • the embodiments of the present application relate to the field of information security, and in particular, to a tampering verification method and device.
  • information security technology mainly ensures the confidentiality, integrity and reliability of information through the combination of cryptographic algorithms and keys.
  • cryptographic algorithms are not absolutely safe. Although these technologies can block attacks by hackers and viruses to a certain extent, they cannot prevent accidental tampering of information. When the information is tampered with, continuing to use the information may cause unpredictable serious consequences. Therefore, in order to ensure the security of information, verifying whether the information has been tampered with is an urgent problem to be solved at present.
  • the embodiments of the present application disclose a tampering verification method and device, which are used to ensure the security and reliability of information.
  • a first aspect discloses a tampering verification method.
  • the tampering verification method may include: extracting second information from first information, the first information including third information, and the third information including the second information and the first information.
  • the information corresponding to the third information, the second information is generated according to the information corresponding to the third information; the fourth information is generated according to the first information; when the second information is the same as the fourth information, it is determined that the The first information has not been tampered with.
  • the second information and the fourth information can be obtained by reading the first information, and can be compared to determine whether the first information has been tampered with.
  • the use of the first information can be stopped in time, so that problems such as attacks, viruses, paralysis or failures that may be caused by the tampered information can be avoided.
  • problems such as attacks, viruses, paralysis or failures that may be caused by the tampered information can be avoided.
  • the risk of information security problems can be reduced, the probability of unforeseen consequences can also be reduced, and the security and reliability of the information used can also be improved.
  • condition of tampering verification can be verified by only reading or receiving a first information, thereby reducing the process of information reading, improving verification efficiency, and verifying whether the information that has been read has been tampered with, thereby
  • the scope of verification can be increased, and the correctness of verification can be improved.
  • extracting the second information from the first information includes: extracting the second information from a specific position in the first information.
  • the position of the second information in the first information is specific. Therefore, the location of the second information needs to be determined before the tampering verification, which can increase the verification conditions, ensure the reliability of the verification method, and further improve the security of the information.
  • the second information is verification information of information corresponding to the third information
  • the fourth information is verification information of the first information
  • the second information and the fourth information can be determined in the first information, so the verification can be performed by one piece of information, and it is not necessary to read the information and the corresponding verification information respectively.
  • the efficiency of tampering with the verifier can be improved, and the reliability of the verification can be further improved.
  • the generating the fourth information according to the first information includes:
  • the first verification algorithm is the verification algorithm corresponding to the first information
  • the verification information of the first information is calculated by using the first verification algorithm to obtain fourth information.
  • the verification algorithm used for the first information may be determined according to the known correspondence between the information and the verification algorithm, and the verification algorithm corresponding to each piece of information may be determined, indicating that one piece of information may correspond to one verification algorithm,
  • This correspondence can be unique. Therefore, the security of the verification process can be improved, and the availability of information can be further improved, so that the reliability of the tampering verification method can be increased.
  • the tampering verification method may further include:
  • the fifth information is information corresponding to the third information
  • a second verification algorithm is obtained, where the second verification algorithm is the verification algorithm corresponding to the fifth information, the first verification algorithm and the second verification algorithm are The algorithm is the same;
  • the second information is obtained by calculating the verification information of the fifth information by using the second verification algorithm.
  • the second information may be obtained through the fifth information and the second verification algorithm
  • the third information in the first information may include the fifth information and the second information
  • the fifth information may be changed without operation. original information.
  • the verification algorithms of the second information and the fourth information are consistent, and the corresponding relationship between each information and the verification algorithm does not need to be divided into the generated signal and the corresponding relationship between the two verification algorithms and recorded separately. In this way, the steps of determining the verification algorithm can be simplified, the verification process can be further simplified, the corresponding storage resources can be saved, and the efficiency of tamper verification can also be improved.
  • the tampering verification method may further include: modifying the third information according to the second information and the second verification algorithm to obtain sixth information, and according to the sixth information and The verification information generated by the first verification algorithm is the same as the second information.
  • the sixth information may be the same as the information when the first information has not been tampered with, and amending the third information may make the verification information of the sixth information consistent with the second information, and the sixth information may also include the first information.
  • the fifth information and the second information therefore, can lay a foundation for the verification of the first information, and can also reduce the complexity of the verification process and ensure the security of the information.
  • the first information, the second information, the third information, the fourth information, the fifth information, and the sixth information are all binary information.
  • the information processed by the computer is binary information
  • it is verified whether the binary information has been tampered with which can ensure the universal applicability of the information tampering verification method.
  • a second aspect discloses a tampering verification device, the tampering verification device may include:
  • an extraction unit for extracting second information from the first information, where the first information includes third information, the third information includes information corresponding to the second information and the third information, and the second information is based on the Information generation corresponding to the third information;
  • a generating unit generating fourth information according to the first information
  • the determining unit determines that the first information has not been tampered with when the second information is the same as the fourth information.
  • the extraction unit is specifically configured to: extract the second information from a specific position in the first information.
  • the second information is verification information of information corresponding to the third information
  • the fourth information is verification information of the first information
  • the generating unit is specifically used for:
  • the first verification algorithm is the verification algorithm corresponding to the first information
  • the verification information of the first information is calculated by using the first verification algorithm to obtain fourth information.
  • the tampering verification device may further include:
  • an acquiring unit configured to acquire fifth information, where the fifth information is information corresponding to the third information
  • the obtaining unit is further configured to obtain a second check algorithm according to the correspondence between the information and the check algorithm, where the second check algorithm is the check algorithm corresponding to the fifth information, and the first check algorithm
  • the algorithm is the same as the second verification algorithm
  • the extraction unit is specifically configured to calculate the verification information of the fifth information by using the second verification algorithm to obtain the second information.
  • the tampering verification device may further include:
  • the modification unit is configured to modify the third information according to the second information and the second verification algorithm to obtain sixth information, and the verification information generated according to the sixth information and the first verification algorithm is the same as the third information.
  • the two information are the same.
  • the first information, the second information, the third information, the fourth information, the fifth information, and the sixth information are all binary information.
  • a third aspect discloses a tampering verification apparatus, which may include: a processor and a memory.
  • the processor executes the computer program stored in the memory, the processor is caused to execute the tamper verification method disclosed in the first aspect or any embodiment of the first aspect.
  • a fourth aspect discloses a computer-readable storage medium, where a computer program or computer instruction is stored, and when the computer program or computer instruction is executed, the tamper verification method disclosed in the above aspects is implemented.
  • a fifth aspect discloses a chip including a processor for executing a program stored in a memory, and when the program is executed, the chip executes the above method.
  • the memory is located off-chip.
  • FIG. 1 is a schematic flowchart of a tampering verification method disclosed in an embodiment of the present application
  • FIG. 2 is a schematic flowchart of another tampering verification method disclosed in an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of another tampering verification method disclosed in an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a tampering verification device disclosed in an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of another tamper verification device disclosed in an embodiment of the present application.
  • the embodiment of the present application discloses a tampering verification method and device, which are used to verify whether information has been tampered with, so as to ensure the security of the information. A detailed description will be given below.
  • the security and availability of information can be determined by screening whether the information has been tampered with.
  • someone has proposed a method of verifying whether the information has been tampered by reading the verification information and the verification information to be tampered respectively.
  • the tampering verification of the information that has been read into the chip is an urgent problem to be solved.
  • FIG. 1 is a schematic flowchart of a tampering verification method disclosed in an embodiment of the present application.
  • the device for executing the method can be any device with processing and storage functions, for example, a computer, a mobile phone, a server, a tablet computer, a single-chip computer, a smart furniture, and a smart wearable device. It should be understood that the above-mentioned devices are only illustrative and do not constitute limitations. The functions of the device in this application may also be performed by a module (eg, a chip) in the device.
  • the tamper verification method may include the following steps:
  • the first information may include third information.
  • the first information may be information that needs to be verified whether it has been tampered with, that is, it is unknown whether the first information has been tampered with.
  • the third information may include second information and fifth information, the second information may be generated according to information corresponding to the third information, and the fifth information may be information corresponding to the third information.
  • the second information can be the verification information from the fifth information, that is, the verification information of the fifth information can be calculated according to the second verification algorithm, that is, the useful data information in the first information is actually the fifth information, and the The second information is redundant information for verification generated according to the fifth information.
  • the third information may include its corresponding useful data information (fifth information) and check information (second information).
  • the check algorithm used by the fifth information to generate the second information may be cyclic redundancy check 4 (cyclic redundancy check, CRC4), CRC8, CRC16, CRC32, CRC64, parity check, Hamming check, sum check ( checksum) or other custom algorithms, etc.
  • CRC4 cyclic redundancy check 4
  • CRC8 CRC16 CRC32
  • CRC64 parity check
  • Hamming check sum check
  • checksum sum check
  • the second information when the specific position is a fixed position, the second information may be set as the last few bits in the first information, or may be set as several spaced or continuous bits in the middle of the first information, It can also be set as the first few bits of the first information.
  • the second information When the specific position is a changed position, the second information may be information determined by a randomly selected position in the first information, or may be a position determined according to an identifier of the first information. The above is only an example of the specific location of the second information, and does not constitute a limitation.
  • the fifth information After acquiring the second information in the third information, the fifth information may be further acquired according to the location of the second information.
  • the sixth information may be information obtained by modifying the third information, the second verification algorithm and the second information, that is, the sixth information may be generated according to the useful data information and its verification information.
  • the third information can be adjusted according to the verification information and the verification algorithm used to generate the verification information, so that the verification information calculated by the generated sixth information under the same verification algorithm is the same as the second information.
  • the above first information, second information, third information, fifth information and sixth information may all be binary information. For example, embedded software information, computer software information, operating system software information, text information or image information, etc. When the above information itself is not binary information, it can be converted into binary information. It should be understood that the above is only an example of the information type of the first information, and does not constitute a limitation.
  • the fourth information can be generated according to the first information, the fourth information can be the verification information of the first information, the verification algorithm for calculating the fourth information can be the first verification algorithm, and the first verification algorithm can be the same as the first verification algorithm in step 101.
  • the determination method of the two-check algorithm is the same.
  • the check algorithm for generating the second information may be the second check algorithm, and the first check algorithm and the second check algorithm may be the same check algorithm. It can be understood that when the first information generates the verification information (the fourth information) and the useful information (the fifth information) contained in the first information generates the verification information (the second information), the verification algorithm used can be are consistent, therefore, the acquisition of the two verification information can be facilitated.
  • the first verification algorithm (the second verification algorithm) may be obtained according to the correspondence between the information and the verification algorithm.
  • a verification algorithm corresponding to the first information can be obtained according to the read first information, and the fourth information can be further obtained according to the corresponding verification algorithm.
  • the fourth information may also be binary information. It should be understood that, step 101 and step 102 may be executed in parallel, or may be executed in series, and the present application does not limit the execution order of step 101 and step 102.
  • the second information extracted from the first information can be compared with the fourth information generated from the first information, that is, it can be understood as comparing the verification information of the second information with the verification information of the first information.
  • the second information is the same as the fourth information, it can be determined that the first information has not been tampered with.
  • the second information is different from the fourth information, it may be determined that the first information has been tampered with.
  • the verification information of the fifth information in the first information is the same as the verification information of the first information itself, that is, two verification information can be obtained only through one first information. According to whether the two verification information are consistent or not, the tampering verification of the information can be completed.
  • this embodiment discloses an example of implementing the tampering verification method in embedded software.
  • FIG. 2 is a schematic flowchart of another tampering verification method disclosed in an embodiment of the present application.
  • post-processing may be performed on the compiled embedded software, and the following is a post-processing procedure on the compiled information (ie, the fifth information).
  • the second information may be generated according to the fifth information.
  • the embedded software may be compiled first to generate binary fifth information, that is, the fifth information may be embedded software information.
  • the verification information (second information) can be calculated by the fifth information and the second verification algorithm.
  • the fifth information can be checked by 8 check algorithms including CRC4, CRC8, CRC16, CRC32, CRC64, parity check, Hamming check and checksum, one of the check algorithms can be selected to generate the second message. For example, a random number s can be generated, and the value range of s is [0, 7], and [0, 7] can respectively correspond to the above verification algorithm.
  • CRC4 can be selected as the second checking algorithm, and the fifth information can be checked.
  • the identification of the embedded software and the verification algorithm information used correspondingly can also be recorded locally (for example, the generated random number s can be recorded, and [0,7] of s corresponds to 8 verification algorithms respectively). Therefore, the verification algorithm used for each corresponding compiled original information (fifth information) in the post-processing process to generate the second information may be the same or different, but the generated identifier is the same as the verification algorithm.
  • the list of the corresponding relationship of the verification algorithms can be uniquely determined, that is, one piece of fifth information to generate the second information can only correspond to one verification algorithm. Thereby, the security and reliability of the information can be increased. It should be understood that the above-mentioned selection of CRC4 as the second check algorithm is for the purpose of illustrating the above-mentioned example, and does not constitute a limitation.
  • the second information can be injected into the fifth information.
  • the second information can be injected into a specific position of the fifth information. That is, the second information is generated from the fifth information, and the second information can be added to the fifth information to generate the third information, that is, the length of the third information can be the sum of the lengths of the second information and the fifth information.
  • the related information of the corresponding embedded software information can also be injected into the fifth information.
  • the relevant information may be an identification (eg, serial number) corresponding to the embedded software, or a serial number corresponding to the embedded software in terms of personnel or companies, and may also be information on related items. The above is only an example of the relevant information of the embedded software information, and does not constitute a limitation.
  • the relevant information and the corresponding location information of the second information in the third information may be recorded locally.
  • the third information can be 0001 0110
  • the binary code corresponding to the generator polynomial is 1011
  • the check information (second information) generated according to CRC 4 is 1110
  • the third information can be 0011 0101 1010
  • the position information corresponding to the second information is randomly generated position information, which can be expressed as 0011 0000 0011
  • the position corresponding to 1 in the position information can be the position of the second information.
  • the location information may be further recorded locally to facilitate subsequent extraction of the second information.
  • the location information of the second information in each third information is uniquely determined.
  • the reliability of the verification process of the embedded software information can be improved through the constant change of the location information.
  • the relevant information of the corresponding embedded software information can be used in the same way, and details are not described here. It should be understood that the above-mentioned information related to the injection of the second information and the embedded software information is for illustration only, and does not constitute a limitation.
  • the third information can be modified according to the second information. It is known that the third information is 0011 0101 1010. By modifying the third information, the verification results of the fifth information in the third information and the corrected sixth information can be the same. The correction methods corresponding to different verification algorithms are correspondingly different.
  • the correction algorithm can be specifically: a message Z can be added after the third message (0011 0101 1010) (the length of the message Z can be 4 bits, such as 1001), you can calculate the check information of the third information excluding the last digit of 0011 0101 1010 100 (calculate the check value of the information with the length minus 1 bit after adding the information Z), the check algorithm used should be The second check algorithm. It can be calculated that the verification information is 1001. Through the linkage information Z and the verification information 1001, the verification value of the third information (0011 0101 1010 1001) added to the information Z is 1110, that is, it can be understood that the third information can be adjusted.
  • the additional 4-bit information is used to change the check information so that the check information is equal to the second information.
  • the above adjustment method can be corrected one by one, and a maximum of 16 attempts can be made in the CRC4.
  • CRC8 can be tried up to 256 times
  • CRC16 can be tried up to 65536 times. It should be understood that the above is only an example to illustrate the method of correcting information, and does not constitute a limitation.
  • the sixth information can be generated.
  • the sixth information may be 0011 0101 1010 1001, and the verification information of the sixth information is also 1110.
  • the post-processed sixth information may be the first information that has not been tampered with, and the sixth information read again should be the first information. At this time, it cannot be determined whether the first information has been tampered with. It can be understood that, before the tampering verification, the information can be processed as the information that has not been tampered with during the verification tampering, and when the information needs to be used again, it is first verified whether the information (first information) has been tampered with.
  • the sixth information can be generated from the third information.
  • the first information at this time may be information that has been tampered with.
  • the tampering situation of the first information is unknown, and when it is verified that the first information has not been tampered with, the embedded software can be started to execute the relevant content. That is, before using the first information, the information is preprocessed to verify whether it has been tampered with.
  • FIG. 3 is a schematic flowchart of another tamper verification method disclosed by an embodiment of the present application.
  • the verification of the first information can be started.
  • Whether the first information is legal information can be determined by the relevant information of the embedded software information, that is, whether the first information is the first information that has undergone post-processing after the embedded software is compiled, for example, the embedded software information included in the first information can be determined.
  • the relevant information is the identification of the corresponding embedded software, and it can be determined that this identification is consistent with the identification of the local record, that is, the first information is legal information, otherwise it is illegal information. For legitimate information, the verification can be continued, and for illegal information, the information can be displayed as illegal information, and the use of this first information can be stopped.
  • the second information in the first information can be extracted. That is, 0011 0101 1010 is obtained, and then according to the location information (0011 0000 0011) corresponding to the local first information, the information corresponding to the position 1 in the location information can be extracted as the second information, that is, the second information can be obtained as 1110.
  • the fourth information can be generated according to the read first information and the first check algorithm, where the above-mentioned first information is 0011 0101 1010 1001, and the check algorithm corresponding to the first information can be determined according to the local record as CRC4. According to the CRC4, the fourth information can be generated as 1110, and it can be determined that the embedded software has not been tampered with.
  • the first information It can be determined whether the first information has been tampered with.
  • the second information is equal to the fourth information, it can be determined that the first information has not been tampered with.
  • the second information is not equal to the first information, it can be determined that the first information has been tampered with.
  • the received first information is 0011 0101 1010 1001
  • the fourth information can be obtained as 1110, and the second information is also 1110, so the first information has not been tampered with.
  • the received first information is 0011 0111 1010 1001
  • the extracted second information is 1110
  • the calculated fourth information is 1011
  • the second information is different from the fourth information, so it can be determined that the first A message has been tampered with.
  • a verification result that the embedded software has not been tampered with can be further displayed, and tasks related to the first information can be performed.
  • the result that the embedded software has been tampered can be further displayed, and the execution of related tasks can be stopped in time to avoid possible unpredictable serious consequences.
  • FIG. 4 is a schematic structural diagram of a tamper verification device disclosed in an embodiment of the present application.
  • the tampering verification device may include:
  • the extracting unit 401 extracts second information from the first information, where the first information includes third information, the third information includes information corresponding to the second information and the third information, and the second information is based on the generating information corresponding to the third information;
  • generating unit 402 generating fourth information according to the first information
  • the determining unit 403 determines that the first information has not been tampered with when the second information is the same as the fourth information.
  • the extracting unit 401 is specifically configured to: extract the second information from a specific position in the first information.
  • the second information is verification information of information corresponding to the third information
  • the fourth information is verification information of the first information
  • the generating unit 402 is specifically configured to:
  • the first verification algorithm is the verification algorithm corresponding to the first information
  • the verification information of the first information is calculated by using the first verification algorithm to obtain fourth information.
  • the tampering verification device may further include:
  • an obtaining unit 404 configured to obtain fifth information, where the fifth information is information corresponding to the third information
  • the obtaining unit 404 may also be configured to obtain a second check algorithm according to the correspondence between the information and the check algorithm, where the second check algorithm is the check algorithm corresponding to the fifth information, and the first check algorithm is the check algorithm corresponding to the fifth information.
  • the verification algorithm is the same as the second verification algorithm;
  • the extraction unit 401 is specifically configured to calculate the verification information of the fifth information by using the second verification algorithm to obtain the second information.
  • the tampering verification device may further include:
  • Modifying unit 405, configured to modify the third information according to the second information and the second verification algorithm to obtain sixth information, and the verification information generated according to the sixth information and the first verification algorithm is the same as the The second information is the same.
  • the first information, the second information, the third information, the fourth information, the fifth information, and the sixth information are all binary information.
  • FIG. 5 is a schematic structural diagram of another tamper verification device disclosed in an embodiment of the present application.
  • the tamper verification apparatus may include a processor 501 , a memory 502 and a bus 503 .
  • the memory 502 may exist independently, and may be connected to the processor 501 through the bus 503 .
  • the memory 502 may also be integrated with the processor 501 .
  • the bus 503 is used to realize the connection between these components.
  • the tamper verification device may be a tamper verification device or a module (eg, a chip) in the tamper verification device.
  • the processor 501 is configured to control the extraction unit 401 , the operations performed by the generating unit 402, the determining unit 403, the acquiring unit 404 and the correcting unit 405 in the above-mentioned embodiment, the above-mentioned device or the module in the device can also be used to perform each of the operations performed by the tampering verification device in the method embodiment of FIG. 1 above. method, which is not repeated here.
  • the embodiments of the present application further disclose a computer-readable storage medium, on which instructions are stored, and when the instructions are executed, the methods in the foregoing method embodiments are executed.
  • the embodiment of the present application further discloses a computer program product including an instruction, when the instruction is executed, the method in the foregoing method embodiment is executed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

一种篡改验证方法及装置,包括:从第一信息中提取第二信息(101),第一信息包括第三信息,第三信息包括第二信息和第三信息对应的信息,第二信息根据第三信息对应的信息生成;根据第一信息生成第四信息(102);当第二信息与第四信息相同时,确定第一信息未被篡改(103)。可以通过验证校验信息是否被篡改,从而可以保证信息的安全性。

Description

一种篡改验证方法及装置 技术领域
本申请实施例涉及信息安全领域,尤其涉及一种篡改验证方法及装置。
背景技术
目前,信息安全技术主要是通过密码算法与密钥结合来确保信息的机密性、完整性以及可靠性。但是密码算法并非绝对安全,这些技术虽然能够一定程度上阻挡黑客和病毒的攻击,但是无法防范信息被意外篡改。当信息被篡改时,继续使用该信息,可能会造成不可预知的严重后果。因此,为了保证信息的安全性,验证信息是否被篡改是当前一个亟待解决的问题。
发明内容
本申请实施例公开了一种篡改验证方法及装置,用于保证信息的安全性和可靠性。
第一方面公开一种篡改验证方法,该篡改验证方法可以包括:从第一信息中提取第二信息,所述第一信息包括第三信息,所述第三信息包括所述第二信息和第三信息对应的信息,所述第二信息根据所述第三信息对应的信息生成;根据所述第一信息生成第四信息;当所述第二信息与所述第四信息相同时,确定所述第一信息未被篡改。
本申请实施例中,可以通过读取第一信息获取第二信息和第四信息,并可以进行比较得出第一信息是否被篡改。当第一信息被篡改时,可以及时停止使用第一信息,从而可以避免篡改后的信息可能带来的攻击、病毒、瘫痪或者故障等问题。由此,可以降低出现信息安全问题的风险,也可以降低发生不可预料的后果的概率,同时也可以提高所使用的信息的安全性和可靠性。此外,篡改验证的条件可以只读取或接收一个第一信息,就能够进行验证,由此能够减少信息读取的过程,提高验证效率,还可以验证出已经读入的信息是否被篡改,从而可以增大了验证的范围,提高验证的正确性。
作为一种可能的实施方式,从第一信息中提取第二信息包括:从所述第一 信息中的特定位置提取所述第二信息。
本申请实施例中,第二信息在第一信息中的位置是特定的。因此,篡改验证之前需要先确定第二信息的位置,可以增加验证的条件,保证验证方法的可靠性,进一步提高可以信息的安全性。
作为一种可能的实施方式,所述第二信息为所述第三信息对应的信息的校验信息,所述第四信息为所述第一信息的校验信息。
本申请实施例中,第一信息中可以确定第二信息和第四信息,因此,可以通过一个信息进行验证,而不需要分别读取信息和对应的校验信息。由此,可以提高篡改验证方的效率,也可以进一步提高验证的可靠性。
作为一种可能的实施方式,所述根据所述第一信息生成第四信息包括:
根据信息与校验算法的对应关系,获取第一校验算法,所述第一校验算法为所述第一信息对应的校验算法;
使用所述第一校验算法计算所述第一信息的校验信息,得到第四信息。
本申请实施例中,可以根据已知的信息与校验算法对应关系确定第一信息使用的校验算法,各个信息对应的校验算法可以是确定的,表明一个信息可以对应一个校验算法,这种对应关系可以是唯一的。因此,可以提高验证过程的安全性,进一步可以提高信息的可用性,从而可以增加篡改验证方法的可靠性。
作为一种可能的实施方式,所述篡改验证方法还可以包括:
获取第五信息,所述第五信息为所述第三信息对应的信息;
根据信息与校验算法的对应关系,获取第二校验算法,所述第二校验算法为所述第五信息对应的校验算法,所述第一校验算法与所述第二校验算法相同;
使用所述第二校验算法计算所述第五信息的校验信息,得到所述第二信息。
本申请实施例中,第二信息可以通过第五信息和第二校验算法得到,第一信息中的第三信息可以包括第五信息和第二信息,第五信息可以是不经过运算改变的原始信息。第一信息在读入芯片后发生篡改时,由于第一信息中包含校验信息,因此可以验证信息的篡改情况,从而可以扩大验证范围,进一步可以确定信息的安全性。此外,第二信息和第四信息的校验算法是一致的,各个信息和校验算法的对应关系可以不需要分成生成信号和两种校验算法的对应关系分别记录。由此可以简化确定校验算法的步骤,进一步可以简化验证流程以 及节约相应的存储资源,也可以提高篡改验证的效率。
作为一种可能的实施方式,所述篡改验证方法还可以包括:根据所述第二信息和所述第二校验算法对所述第三信息进行修正,得到第六信息,根据第六信息和第一校验算法生成的校验信息与第二信息相同。
本申请实施例中,第六信息可以与第一信息未被篡改时的信息相同,修正第三信息可以使得让第六信息的校验信息与第二信息一致,第六信息中也可以包括第五信息与第二信息,因此,可以为第一信息的验证奠定基础,也可以减少了验证过程的复杂性,保证信息的安全性。
作为一种可能的实施方式,所述第一信息、所述第二信息、所述第三信息、所述第四信息、所述第五信息和所述第六信息均为二进制信息。
本申请实施例中,由于计算机所处理的信息是二进制的信息,所以针对二进制信息验证其是否被篡改,可以保证信息篡改验证方法的普遍适用性。
第二方面公开一种篡改验证装置,该篡改验证装置可以包括:
提取单元,从第一信息中提取第二信息,所述第一信息包括第三信息,所述第三信息包括所述第二信息和第三信息对应的信息,所述第二信息根据所述第三信息对应的信息生成;
生成单元,根据所述第一信息生成第四信息;
确定单元,当所述第二信息与所述第四信息相同时,确定所述第一信息未被篡改。
作为一种可能的实施方式,所述提取单元,具体用于:从所述第一信息中的特定位置提取所述第二信息。
作为一种可能的实施方式,所述第二信息为所述第三信息对应的信息的校验信息,所述第四信息为所述第一信息的校验信息。
作为一种可能的实施方式,所述生成单元具体用于:
根据信息与校验算法的对应关系,获取第一校验算法,所述第一校验算法为所述第一信息对应的校验算法;
使用所述第一校验算法计算所述第一信息的校验信息,得到第四信息。
作为一种可能的实施方式,该篡改验证装置还可以包括:
获取单元,用于获取第五信息,所述第五信息为所述第三信息对应的信息;
所述获取单元,还用于根据信息与校验算法的对应关系,获取第二校验算法,所述第二校验算法为所述第五信息对应的校验算法,所述第一校验算法与所述第二校验算法相同;
所述提取单元,具体用于使用所述第二校验算法计算所述第五信息的校验信息,得到所述第二信息。
作为一种可能的实施方式,该篡改验证装置还可以包括:
修正单元,用于根据所述第二信息和所述第二校验算法对所述第三信息进行修正,得到第六信息,根据第六信息和第一校验算法生成的校验信息与第二信息相同。
作为一种可能的实施方式,所述第一信息、所述第二信息、所述第三信息、所述第四信息、所述第五信息和所述第六信息均为二进制信息。
第三方面公开一种篡改验证装置,该篡改验证装置可以包括:处理器和存储器。当所述处理器执行所述存储器存储的计算机程序时,使得所述处理器执行第一方面或第一方面的任一实施方式公开的篡改验证方法。
第四方面公开一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序或计算机指令,当该计算机程序或计算机指令运行时,实现如上述各方面公开的篡改验证方法。
第五方面公开一种芯片,包括处理器,用于执行存储器中存储的程序,当程序被执行时,使得芯片执行上面的方法。
作为一种可能的实施方式,存储器位于芯片之外。
附图说明
图1是本申请实施例公开的一种篡改验证方法的流程示意图;
图2是本申请实施例公开的另一种篡改验证方法的流程示意图;
图3是本申请实施例公开的又一种篡改验证方法的流程示意图;
图4是本申请实施例公开的一种篡改验证装置的结构示意图;
图5是本申请实施例公开的另一种篡改验证装置的结构示意图。
具体实施方式
本申请实施例公开了一种篡改验证方法及装置,用于验证信息是否被篡改,以保证信息的安全性。以下进行详细说明。
为了更好地理解本申请实施例,下面先对本申请实施例的应用场景进行描述。
随着信息技术的广泛应用,信息安全(information securiity)问题也层出不穷。由于计算机承载着很多重要的信息,因此,信息的安全性越来越受到企业、政府及国家的重视。为了确保信息的保密性、完整性、可用性和可靠性,加密技术、防火墙技术和入侵检验技术等保证信息安全的技术应运而生。
当前,对于已有的信息,可以通过甄别信息是否被篡改,来确定信息的安全性和可用性。在确认信息是否被篡改的方向上,有人提出了一种根据通过分别读取校验信息和待篡改验证信息,进行验证信息是否被篡改的方法。然而,在这种方法中,当信息已经被读入芯片内时,信息被意外篡改是无法被验证的,进一步使用该信息可能会导致不可预计的严重后果。因此,已被读入芯片内的信息的篡改验证是一个亟待解决的问题。
基于上述应用场景,请参阅图1,如图1所示是本申请实施例公开的一种篡改验证方法的流程示意图。其中,执行该方法的设备可以是拥有处理和存储功能的任何设备,例如,电脑、手机、服务器、平板电脑、单片机、智能家具和智能穿戴设备等。应理解,上述的设备只是举例说明,并不构成限定。本申请中有该设备的功能也可以有该设备中的模块(例如,芯片)来执行。该篡改验证方法可以包括以下步骤:
101、从第一信息中提取第二信息。
当读取到第一信息后开始篡改验证,可以从第一信息中提取第二信息。第一信息可以包括第三信息。第一信息可以是需要被验证是否被篡改的信息,即第一信息是否被篡改是未知的。第三信息可以包括第二信息和第五信息,第二信息可以根据第三信息对应的信息生成,第五信息可以是第三信息对应的信息。第二信息可以是来自第五信息的校验信息,也就是可以根据第二校验算法计算 出第五信息的校验信息,即第一信息中有用的数据信息实质是第五信息,而第二信息是根据第五信息生成的用于校验的冗余信息。第三信息可以包括其对应有用的数据信息(第五信息)和校验信息(第二信息)。第五信息生成第二信息所使用的校验算法可以是循环冗余校验4(cyclic redundancy check,CRC4)、CRC8、CRC16、CRC32、CRC64、奇偶校验、海明校验、总和校验(checksum)或者其他自定义算法等。上述只是对校验算法的举例说明,并不构成限定。每一个第一信息中,第五信息生成第二信息时,所使用的第二校验算法可以是唯一确定的,即可以理解为,一个第一信息可以对应的校验算法是一个。可以从第一信息的特定位置提取第二信息,特定位置可以是固定的,也可以是变化的。例如,当特定位置是固定的位置时,第二信息可以设定为第一信息中的最后的几位比特,也可以设定为第一信息中间的几位间隔的或者连续的几位比特,还可以设定为第一信息最开始的几位比特。当特定位置是变化的位置时,第二信息可以是通过第一信息中随机选取的位置确定的信息,也可以是根据第一信息的标识确定的位置。上述只是对第二信息的特定位置的举例说明,并不构成限定。获取第三信息中的第二信息后,可以进一步根据第二信息的位置,获取第五信息。第六信息可以是根据第三信息、第二校验算法和第二信息修正所得到的信息,即第六信息可以根据有用的数据信息和其校验信息生成的信息。可以根据校验信息以及生成这个校验信息所使用的校验算法,调整第三信息,使得生成的第六信息在同一的校验算法下计算得到的校验信息与第二信息相同。以上第一信息、第二信息、第三信息、第五信息和第六信息均可以是二进制的信息。例如,嵌入式软件信息、计算机软件信息、操作***软件信息、文本信息或图像信息等。当上述信息本身不是二进制的信息时,均可以转换被为二进制的信息。应理解,以上只是对第一信息的信息类型的举例说明,并不构成限定。
102、根据第一信息生成第四信息。
可以根据第一信息生成第四信息,第四信息可以是第一信息的校验信息,计算第四信息的校验算法可以为第一校验算法,第一校验算法可以与步骤101中第二校验算法的确定方式相同,详细说明请参阅步骤101,在此不加赘述。生成第二信息的校验算法可以是第二校验算法,第一校验算法和第二校验算法可以是相同的校验算法。既可以理解为,第一信息生成校验信息(第四信息) 时与第一信息中包含的有用信息(第五信息)生成校验信息(第二信息)时,所使用的校验算法可以是一致的,因此,可以便于对两个校验信息的获取。可以根据信息与校验算法的对应关系,获取第一校验算法(第二校验算法)。可以存储的每个第一信息和这个第一信息对应使用的校验算法的关系。当需要生成第四信息时,可以先根据读取到的第一信息获得第一信息对应的校验算法,进一步可以根据对应校验算法得到第四信息。同样,第四信息也可以是二进制信息。应理解,步骤101和步骤102可以并行执行,也可以串行执行,本申请并不对步骤101和步骤102的执行顺序进行限定。
103、当第二信息与第四信息相同时,确定第一信息未被篡改。
可以根据在第一信息中提取到的第二信息和第一信息生成的第四信息进行对比,即可以理解为比较第二信息的校验信息和第一信息的校验信息。当第二信息与第四信息相同时,可以确定第一信息未被篡改。当第二信息与第四信息不相同时,可以确定第一信息已被篡改。可以理解为,当第一信息未被篡改时,第一信息中的第五信息的校验信息与第一信息自身的校验信息是相同的,即可以仅仅通过一个第一信息获得两个校验信息,根据两个校验信息的一致与否,便可以完成为信息的篡改验证。
为了方便理解上述的篡改验证方法,本实施例公布一种在嵌入式软件中实现篡改验证方法的示例。请参阅图2,如图2所示为本申请实施例公开的另一种篡改验证方法的流程示意图。在验证第一信息是否被篡改之前,可以对编译后的嵌入式软件进行后处理,以下为对编译后的信息(即第五信息)的后处理过程。
首先,可以根据第五信息生成第二信息。可以先编译嵌入式软件生成二进制的第五信息,即第五信息可以是嵌入式软件信息。接着可以通过第五信息和第二校验算法计算出校验信息(第二信息)。假设可以通过CRC4、CRC8、CRC16、CRC32、CRC64、奇偶校验、海明校验和checksum共8种校验算法对第五信息进行校验,可以选择其中的一个校验算法生成第二信息。例如,可以产生一个随机数s,s的取值范围是[0,7],[0,7]可以分别对应上述的校验算法。当产生的随机数为0时,可以选定CRC4作为第二检验算法,并对第五信息进行校验。也 可以将该嵌入式软件的标识以及对应使用的校验算法信息对应记录到本地(例如可以记录生成的随机数s,s的[0,7]分别对应8种校验算法)。由此,每个在后处理过程中的对应编译后的原始信息(第五信息)生成第二信息所对应使用的校验算法可以是相同的,也可以是不同的,但是生成的标识与校验算法对应关系的列表是可以唯一确定的,即一个第五信息生成第二信息只可以对应一种校验算法。由此,可以增加信息的安全性和可靠性。应理解,上述选定CRC4为第二校验算法是为了举例说明上述例子,并不构成限定。
其次,可以将第二信息注入第五信息。根据得到的第二信息,可以将第二信息注入到第五信息的特定位置。即第二信息由第五信息生成,可以把第二信息加入第五信息生成第三信息,即第三信息的长度可以为第二信息和第五信息长度之和。此外,还可以将对应的嵌入式软件信息的相关信息一起注入第五信息。这个相关信息可以是对应嵌入式软件的标识(如编号),也可以是对应嵌入式软件于人员或公司而言的编号,还可以是相关项目的信息。上述只是对嵌入式软件信息的相关信息的举例说明,并不构成限定。可以将这个相关信息和第二信息在第三信息中的对应的位置信息记录到本地。在一种可能的情况下,第三信息可以为0001 0110,生成多项式对应的二进制码为1011,根据CRC 4生成的校验信息(第二信息)为1110,则第三信息可以为0011 0101 1010,其中的第二信息对应的位置信息为随机生成的位置信息,可以表示为0011 0000 0011,则位置信息中对应为1的位置可以是第二信息的位置。可以进一步将位置信息记录到本地,以方便后续对第二信息的提取。各个第三信息中第二信息的位置信息是唯一确定的,因此,可以通过位置信息的不断变化,提高对嵌入式软件信息验证过程的可靠性。对应的嵌入式软件信息的相关信息可以用同样的方法,在此不加赘述。应理解,上述注入第二信息和嵌入式软件信息的相关信息均是举例说明,并不构成限定。
接着,可以根据第二信息修正第三信息。已知第三信息为0011 0101 1010,修正第三信息,可以使得第三信息中的第五信息与修正后的第六信息的校验结果相同。不同的校验算法对应的修正方法是对应不同的。上述以CRC4为第二校验算法(或第一校验算法)为例,修正算法具体可以为:可以在第三信息(0011 0101 1010)后追加一个信息Z(信息Z的长度可以是4个比特,如1001),可以 计算出第三信息剔除最后一位的0011 0101 1010 100的校验信息(计算加入信息Z后长度减1位的信息的校验值),使用的校验算法应当为第二校验算法。可以计算出校验信息为1001,通过联动信息Z和校验信息1001,使得加入信息Z的第三信息(0011 0101 1010 1001)的校验值为1110,即可以理解为可以调整第三信息所追加的4位信息,用来改变校验信息,使得校验信息与第二信息相等。上述调整方法可以是逐次尝试进行修正,CRC4中可以最多尝试16次。在CRC校验算法的修正方法中,CRC8可以最多尝试256次,CRC16可以最多尝试65536次。应理解,上述只是举例说明修正信息的方法,并不构成限定。
经过修正第三信息,可以生成第六信息。上述的修正过程结束后,第六信息可以为0011 0101 1010 1001,第六信息的校验信息同样为1110。应理解,经过后处理的第六信息可以是未被篡改的第一信息,再一次读取到的第六信息应当为第一信息,此时不能够确定第一信息是否被篡改。既可以理解为,在篡改验证之前,可以将信息处理为验证篡改时未篡改的信息,当需要再一次使用这个信息时,先验证该信息(第一信息)是否被篡改。
应理解,上述是以嵌入式软件为例,说明在篡改验证之前,可以对编译后的二进制信息进行的后处理过程,对于具体的第五信息的处理方法并不构成限定。
当对嵌入式软件的后处理结束后,可以通过第三信息生成第六信息。当需要再次使用这一信息时,需要根据第一信息验证嵌入式软件是否被篡改,即可以理解为,此时的第一信息有可能是已经被篡改的信息。第一信息的篡改情况是未知的,当验证第一信息未被篡改时,可以启动开嵌入式软件,执行相关内容。即在使用第一信息前对信息进行预处理来验证其篡改与否。请参阅图3,如图3所示是本申请实施例公开的又一种篡改验证方法的流程示意图。
本示例中,待验证的第一信息被读入芯片后,可以开始第一信息的验证。
可以通过嵌入式软件信息的相关信息判断第一信息是否为合法信息,即第一信息是否是嵌入式软件编译后经过后处理的第一信息,例如,可以确定第一信息包括的嵌入式软件信息的相关信息是对应嵌入式软件的标识,且可以确定这个标识与本地记录的标识一致,即该第一信息为合法信息,否则为非法信息。对于合法信息可以继续验证,对于非法信息可以显示该信息为非法信息,并可 以停止使用这个第一信息。
当确定第一信息为合法信息时,可以提取第一信息中的第二信息,一种情况下,可以计算出将第一信息(0011 0101 1010 1001)中的第二信息,先剔除信息Z,即得到0011 0101 1010,接着可以根据本地的这个第一信息对应的位置信息(0011 0000 0011),提取出位置信息中对应位置为1的信息为第二信息,即可以得到第二信息为1110。
可以根据读取到的第一信息和第一校验算法生成第四信息,上述第一信息为0011 0101 1010 1001,可以根据本地记录确定第一信息对应的校验算法为CRC4。根据CRC4可以生成第四信息为1110,此时可以确定该嵌入式软件未被篡改。
可以判断第一信息是否被篡改。当第二信息等于第四信息时,则可以判断第一信息未被篡改。当第二信息不等于第一信息时,则可以确定第一信息已被篡改。一种情况下,接收的的第一信息为0011 0101 1010 1001,则可以得到第四信息为1110,第二信息也为1110,因此第一信息未被篡改。另一种情况下,接收的第一信息为0011 0111 1010 1001时,提取出的第二信息为1110,计算得到的第四信息为1011,第二信息与第四信息不相同,因此可以判断第一信息已经被篡改。
最后,当确定第一信息未被篡改时,进一步可以显示该嵌入式软件未被篡改的验证结果,并可以执行这个第一信息的相关任务。当确定第一信息被篡改时,进一步可以显示出该嵌入式软件已被篡改的结果,并可以及时停止相关任务的执行,避免可能发生的不可预知的严重后果。
应理解,上述是举例说明在嵌入式软件中对编译信息的后处理过程和篡改验证的预处理过程,并不对其处理方法构成限定。
基于上述方法,请参阅图4,图4是本申请实施例公开的一种篡改验证装置的结构示意图。如图4所示,该篡改验证装置可以包括:
提取单元401,从第一信息中提取第二信息,所述第一信息包括第三信息,所述第三信息包括所述第二信息和第三信息对应的信息,所述第二信息根据所述第三信息对应的信息生成;
生成单元402,根据所述第一信息生成第四信息;
确定单元403,当所述第二信息与所述第四信息相同时,确定所述第一信息未被篡改。
作为一种可能的实施方式,所述提取单元401,具体用于:从所述第一信息中的特定位置提取所述第二信息。
作为一种可能的实施方式,所述第二信息为所述第三信息对应的信息的校验信息,所述第四信息为所述第一信息的校验信息。
作为一种可能的实施方式,所述生成单元402具体用于:
根据信息与校验算法的对应关系,获取第一校验算法,所述第一校验算法为所述第一信息对应的校验算法;
使用所述第一校验算法计算所述第一信息的校验信息,得到第四信息。
作为一种可能的实施方式,该篡改验证装置还可以包括:
获取单元404,用于获取第五信息,所述第五信息为所述第三信息对应的信息;
所述获取单元404,还可以用于根据信息与校验算法的对应关系,获取第二校验算法,所述第二校验算法为所述第五信息对应的校验算法,所述第一校验算法与所述第二校验算法相同;
所述提取单元401,具体用于使用所述第二校验算法计算所述第五信息的校验信息,得到所述第二信息。
作为一种可能的实施方式,该篡改验证装置还可以包括:
修正单元405,用于根据所述第二信息和所述第二校验算法对所述第三信息进行修正,得到第六信息,根据第六信息和第一校验算法生成的校验信息与第二信息相同。
作为一种可能的实施方式,所述第一信息、所述第二信息、所述第三信息、所述第四信息、所述第五信息和所述第六信息均为二进制信息。
基于上述方法,请参阅图5,图5是本申请实施例公开的另一种篡改验证装置的结构示意图。如图5所示,该篡改验证装置可以包括处理器501、存储器502和总线503。存储器502可以是独立存在的,可以通过总线503与处理器501相连接。存储器502也可以和处理器501集成在一起。其中,总线503用于实现这些 组件之间的连接。
在一个实施例中,该篡改验证装置可以为篡改验证设备或者篡改验证设备内的模块(例如,芯片),存储器502中存储的计算机程序指令被执行时,该处理器501用于控制提取单元401、生成单元402、确定单元403、获取单元404和修正单元405在上述实施例中执行的操作,上述设备或者设备内的模块还可以用于执行上述图1方法实施例中篡改验证设备执行的各种方法,不再赘述。
本申请实施例还公开一种计算机可读存储介质,其上存储有指令,该指令被执行时执行上述方法实施例中的方法。
本申请实施例还公开一种包括指令的计算机程序产品,该指令被执行时执行上述方法实施例中的方法。
以上所述的具体实施方式,对本申请的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本申请的具体实施方式而已,并不用于限定本申请的保护范围,凡在本申请的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本申请的保护范围之内。

Claims (10)

  1. 一种篡改验证方法,其特征在于,包括:
    从第一信息中提取第二信息,所述第一信息包括第三信息,所述第三信息包括所述第二信息和第三信息对应的信息,所述第二信息根据所述第三信息对应的信息生成;
    根据所述第一信息生成第四信息;
    当所述第二信息与所述第四信息相同时,确定所述第一信息未被篡改。
  2. 根据权利要求1所述的方法,其特征在于,所述从第一信息中提取第二信息包括:
    从所述第一信息中的特定位置提取所述第二信息。
  3. 根据权利要求1所述的方法,其特征在于,所述第二信息为所述第三信息对应的信息的校验信息,所述第四信息为所述第一信息的校验信息。
  4. 根据权利要求3所述的方法,其特征在于,所述根据所述第一信息生成第四信息包括:
    根据信息与校验算法的对应关系,获取第一校验算法,所述第一校验算法为所述第一信息对应的校验算法;
    使用所述第一校验算法计算所述第一信息的校验信息,得到第四信息。
  5. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    获取第五信息,所述第五信息为所述第三信息对应的信息;
    根据信息与校验算法的对应关系,获取第二校验算法,所述第二校验算法为所述第五信息对应的校验算法,所述第一校验算法与所述第二校验算法相同;
    使用所述第二校验算法计算所述第五信息的校验信息,得到所述第二信息。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    根据所述第二信息和所述第二校验算法对所述第三信息进行修正,得到第六信息,根据第六信息和第一校验算法生成的校验信息与第二信息相同。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,所述第一信息、所述第二信息、所述第三信息、所述第四信息、所述第五信息和所述第六信息均为二进制信息。
  8. 一种篡改验证装置,其特征在于,包括用于执行如权利要求1-7任一项所述的方法的单元。
  9. 一种篡改验证装置,其特征在于,包括处理器和存储器,所述处理器调用所述存储器中存储的计算机程序实现如权利要求1-7任一项所述的方法。
  10. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机程序或计算机指令,当所述计算机程序或计算机指令被运行时,实现如权利要求1-7任一项所述的方法。
PCT/CN2020/134547 2020-12-08 2020-12-08 一种篡改验证方法及装置 WO2022120572A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202080025333.3A CN113795840A (zh) 2020-12-08 2020-12-08 一种篡改验证方法及装置
PCT/CN2020/134547 WO2022120572A1 (zh) 2020-12-08 2020-12-08 一种篡改验证方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/134547 WO2022120572A1 (zh) 2020-12-08 2020-12-08 一种篡改验证方法及装置

Publications (1)

Publication Number Publication Date
WO2022120572A1 true WO2022120572A1 (zh) 2022-06-16

Family

ID=79181234

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/134547 WO2022120572A1 (zh) 2020-12-08 2020-12-08 一种篡改验证方法及装置

Country Status (2)

Country Link
CN (1) CN113795840A (zh)
WO (1) WO2022120572A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090049308A1 (en) * 2006-12-19 2009-02-19 Hongxia Jin Method for Effective Tamper Resistance
CN104298935A (zh) * 2014-09-25 2015-01-21 广东欧珀移动通信有限公司 嵌入式设备固件的保护方法与装置
CN105373747A (zh) * 2015-12-09 2016-03-02 上海斐讯数据通信技术有限公司 防止***被篡改的文件生成方法、文件验证方法及***
CN110503434A (zh) * 2019-07-15 2019-11-26 平安普惠企业管理有限公司 基于哈希算法的数据验证方法、装置、设备和存储介质
CN111459496A (zh) * 2020-04-07 2020-07-28 珠海格力电器股份有限公司 一种防篡改的程序文件的生成方法、设备的升级方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090049308A1 (en) * 2006-12-19 2009-02-19 Hongxia Jin Method for Effective Tamper Resistance
CN104298935A (zh) * 2014-09-25 2015-01-21 广东欧珀移动通信有限公司 嵌入式设备固件的保护方法与装置
CN105373747A (zh) * 2015-12-09 2016-03-02 上海斐讯数据通信技术有限公司 防止***被篡改的文件生成方法、文件验证方法及***
CN110503434A (zh) * 2019-07-15 2019-11-26 平安普惠企业管理有限公司 基于哈希算法的数据验证方法、装置、设备和存储介质
CN111459496A (zh) * 2020-04-07 2020-07-28 珠海格力电器股份有限公司 一种防篡改的程序文件的生成方法、设备的升级方法

Also Published As

Publication number Publication date
CN113795840A (zh) 2021-12-14

Similar Documents

Publication Publication Date Title
WO2021012552A1 (zh) 一种登录处理方法及相关设备
US9300470B2 (en) Semiconductor device and method of writing data to semiconductor device
US11797296B2 (en) Hot updating method of script file package and hot updating device of script file package
US20180204004A1 (en) Authentication method and apparatus for reinforced software
US9946474B2 (en) Storing and accessing data
CN114116313A (zh) 一种备份数据处理方法及装置
CN111901124B (zh) 一种通信安全防护方法、装置及电子设备
CN106888094B (zh) 一种签名方法及服务器
WO2022120572A1 (zh) 一种篡改验证方法及装置
JP6488954B2 (ja) 暗号データ処理方法、暗号データ処理システム、暗号データ処理装置および暗号データ処理プログラム
CN108376212B (zh) 执行代码安全保护方法、装置及电子装置
US9185106B2 (en) Access control method and mobile terminal which employs an access control method
CN110572371B (zh) 基于html5本地存储机制的身份唯一性校验控制方法
WO2006062166A1 (ja) 電子データ検証装置
CN107292172B (zh) 用于相对于参考计算机文件自动验证目标计算机文件的方法
CN111740817A (zh) 电力数据采集***中集中器的代码篡改检测方法及***
CN117113437B (zh) 一种文件篡改检测方法、装置、计算机设备及存储介质
CN117411644B (zh) 一种数字签名验证方法、装置、电子设备及存储介质
US20240195636A1 (en) Hardened Encoded Message Check for RSA Signature Verification
CN117574333A (zh) 一种备份软件License有效期的校验方法
CN105554033A (zh) 一种图像输入设备的可信认证方法及其图像输入设备
CN116418511A (zh) 一种基于国密算法的qkd设备的固件完整性校验方法及***
JP6124338B2 (ja) 情報処理システム
Baghdasaryan et al. FIDO UAF Authenticator Commands
KR20220161304A (ko) 보안 요소에서 디지털 정보를 안전하게 프로세싱하는 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20964517

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20964517

Country of ref document: EP

Kind code of ref document: A1