[go: up one dir, main page]

CN102083069B - A kind of method and apparatus detecting integrity of mobile terminal memory data - Google Patents

A kind of method and apparatus detecting integrity of mobile terminal memory data Download PDF

Info

Publication number
CN102083069B
CN102083069B CN200910241580.2A CN200910241580A CN102083069B CN 102083069 B CN102083069 B CN 102083069B CN 200910241580 A CN200910241580 A CN 200910241580A CN 102083069 B CN102083069 B CN 102083069B
Authority
CN
China
Prior art keywords
data
mobile terminal
block
ciphertext
counter values
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200910241580.2A
Other languages
Chinese (zh)
Other versions
CN102083069A (en
Inventor
李春雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN200910241580.2A priority Critical patent/CN102083069B/en
Priority to PCT/CN2010/072499 priority patent/WO2010148788A1/en
Publication of CN102083069A publication Critical patent/CN102083069A/en
Application granted granted Critical
Publication of CN102083069B publication Critical patent/CN102083069B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/108Source integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method detecting integrity of mobile terminal memory data, the sequence number of computing detection module determination data to be tested block; The corresponding summary ciphertext of presetting of computing detection module deciphering is preset summary expressly, and the data summarization comparing data to be tested block is made a summary expressly with default, and determine identical, then current data to be tested blocks of data is complete.The invention also discloses a kind of device detecting integrity of mobile terminal memory data, adopt this device effectively can detect the integrality of mobile terminal memory data, avoid the data in memory to be illegally modified.

Description

A kind of method and apparatus detecting integrity of mobile terminal memory data
Technical field
The present invention relates to mobile terminal safety mechanism field, refer to a kind of method and apparatus detecting integrity of mobile terminal memory data especially.
Background technology
Along with maturation and the development of electronic technology, mobile terminal, such as mobile phone, more and more universal, and this has brought very large convenience, meets fast pace, high efficiency social demand, receives praises from customers.Some mobile operator are in order to better develop client, with the price lower than cost, mobile phone is sold to user sometimes, even free of cost is to user, simultaneously, mobile operator can require that these mobile phones must lock the network of this operator, or lock the user identification module (SIM) of this operator, i.e. so-called locking network and card.But market exists some personnel or tissue, they drive by interests, illegal data or the code rewriting mobile phone memory, cracks mobile phone, makes it the function losing lock network or pintle hook lock, thus mobile operator and mobile-phone manufacturers is suffered massive losses.Like this, just require that the data in opponent's machine memory and code are protected, prevent from being cracked.
But; in prior art; after data are downloaded to mobile phone memory; just the key component of data is protected, the data that only protection is relevant with lock network or pintle hook lock, exist and walk around the possibility that protected data division carries out illegal modifications; and; after there are illegal modifications data to be downloaded, then the data these be illegally modified are downloaded in mobile phone, indirectly make the possibility that the data integrity in mobile phone memory is destroyed.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method and apparatus detecting integrity of mobile terminal memory data, effectively the integrality of checking mobile terminal memory data.
For achieving the above object, technical scheme of the present invention is achieved in that
The invention provides a kind of method detecting integrity of mobile terminal memory data, comprising:
The sequence number of computing detection module determination data to be tested block;
The corresponding summary ciphertext of presetting of computing detection module deciphering is preset summary expressly, and the data summarization comparing data to be tested block is made a summary expressly with default, and determine identical, then current data to be tested blocks of data is complete.
In such scheme, comprise, module is set data are divided into arbitrarily some data blocks, extract data summarization and encrypt, become and preset summary ciphertext, be stored in mobile terminal memory.
In such scheme, comprising: counter is set in mobile terminal memory, module installation mobile terminal manufacturer key key be set and be downloaded to mobile terminal memory, ciphering counters numerical value, becoming counter values ciphertext.
In such scheme, the sequence number of described computing detection module determination data to be tested block, comprise: computing detection module key deciphers counter values ciphertext and becomes counter values expressly, call and determine data block sequence number function, determine data block sequence number to be detected according to the Output rusults of function, extract the data summarization of data block to be detected.
In such scheme, the data summarization that described computing detection module compares data to be tested block with preset and make a summary expressly after, comprise further: counter values plaintext is encrypted, is stored in mobile terminal memory.
Present invention also offers a kind of device detecting integrity of mobile terminal memory data, comprising:
Mobile terminal memory, for storing data block, presetting summary ciphertext;
Computing detection module, determines data to be tested block sequence number, and it is preset summary expressly that summary ciphertext is preset in deciphering, and the data summarization of data block more to be detected is made a summary expressly with default, and conform to, current data to be tested block is complete.
In such scheme, comprising: module is set, for data are divided into arbitrarily some data blocks, extract data summarization, and encrypt, become and preset summary ciphertext, be stored in mobile terminal memory.
In such scheme, comprising: counter arranges module, the described module that arranges is further used for: arrange key and be downloaded in mobile terminal memory; Described counter arranges module, for arranging counter in mobile terminal memory, by computing detection module key, counter values is encrypted to counter values ciphertext.
In such scheme, described computing detection module also for: decipher counter values ciphertext with key and become counter values expressly, call and determine data block sequence number function, determine data block sequence number to be detected according to the Output rusults of function, extract the data summarization of data block to be detected.
As can be seen here, adopt the present invention and device, can by detecting the mode of mobile terminal data integrality, summary ciphertext is preset in mobile terminal memory, then hashing algorithm is utilized to obtain the data summarization of data block in mobile terminal memory, with default summary comparison, if conformed to just start application program for mobile terminal, once detect that the data integrity of mobile terminal is destroyed, mobile terminal cannot be opened, thus the data of effective protection mobile terminal are not tampered, decrease the loss of operator and mobile terminal manufacturer, deblocking is detected, effectively can shorten the time of detection.
Accompanying drawing explanation
Fig. 1 is that the present invention detects integrity of mobile terminal memory data method realization figure;
Fig. 2 determines data block sequence number function realization figure in the present invention;
Fig. 3 is that the present invention detects integrity of mobile terminal memory data device realization figure.
Embodiment
Basic thought of the present invention is: data are divided into arbitrarily some data blocks, extract the data summarization of each data block, data summarization is encrypted and becomes summary ciphertext, for default summary ciphertext, then be downloaded in mobile terminal memory, counter arranges module and arranges counter in memory, counter values is encrypted to counter values ciphertext by computing detection module, during each start, computing detection module according to the counter values of deciphering expressly, detect the respective data blocks in mobile terminal memory, extract the data summarization of data block, the default summary ciphertext of deciphering respective data blocks becomes to preset summary expressly, the data summarization of data block expressly conforms to default summary, then start application program for mobile terminal.
Below by a specific embodiment, the present invention is conducted further description, as shown in Figure 1,
Step 101, module is set data are divided into arbitrarily some data blocks, the length of each data block can be specified arbitrarily by mobile terminal manufacturer, described data are the application code of mobile terminal, described data to be divided into arbitrarily: carry out Data Placement on computers by before downloaded to mobile terminal memory, the data after division by downloaded to mobile phone memory.For data address range from 0x0000H (hexadecimal) to 0x5FFFH (hexadecimal), suppose to be divided into 3 data blocks, the address realm (hexadecimal) of each data block is as follows:
The address realm of data block 1 is: 0x0000H ~ 0x0FFFH, and data block 1 sequence number is number1;
The address realm of data block 2 is: 0x1000H ~ 0x2FFFH, and data block 2 sequence number is number2;
The address realm of data block 3 is: 0x3000H ~ 0x5FFFH, and data block 3 sequence number is number3.
Three data blocks are corresponding therewith, mobile terminal manufacturer extracts the data block summary of three data blocks according to hashing algorithm, the present invention is for message digest algorithm (MD5) algorithm in hashing algorithm, and according to data encryption standard (DES) algorithm, three data block summaries are encrypted, become data block summary ciphertext, this data block summary ciphertext, for presetting summary ciphertext, is respectively s_Digest1, s_Digest2 and s_Digest3.
The general principle of described MD5 algorithm is, first information filling is carried out to data block, after making filling, the byte length of data is the integral multiple of 512, data block after filling is carried out dividing into groups to process with 512, each component is the subgroup of 16 32, according to the algorithmic rule of MD5, four-wheel cycling is carried out to grouped data by four link variables of MD5 algorithm, the result drawn continues the computing next group data being carried out to MD5 algorithm, finally draw 4 link variables through computing, the cascade of these 4 link variables is exactly data summarization.
Described DES algorithm has fully demonstrated obscuring and spreading principle of Shannon proposition, the password of DES algorithm is block cipher, its block length is 64 (bit), key length is also 64, comprise 8 odd parity bit, therefore, actual effective key length is 56, the method that the key step-by-step of the plaintext group after grouping and 56 substitutes or exchanges is formed the encryption method of ciphertext group.
The parameter of DES algorithm has three: the key of enabling decryption of encrypted, data, mode of operation.When mode of operation is encryption mode, the data that need encrypt are divided into groups according to 64, according to the rule of DES algorithm, initial permutation is carried out to 64 bit data, 64 keys are selected after Transposition Transform according to reducing of DES algorithmic rule, by the key grouping obtained, the key of grouping is carried out ring shift left according to DES algorithmic rule respectively, reduce selection Transposition Transform successively again, obtain sub-key 1, the like, sub-key 2...... can be obtained, totally 16 sub-keys, 16 sub-double secret key 64 bit data are utilized to carry out 16 product of transformation according to DES algorithmic rule successively, carry out last position to the data after conversion to change, it is the inverse process of initial permutation that position, end is changed, the ciphertext after encrypting can be obtained, when mode of operation is decryption mode, the flow process of handling process and encryption is similar, time difference is to carry out 16 product of transformation with sub-key, the order of 16 sub-key uses is contrary.
Arrange module installation mobile terminal manufacturer key (key), wherein, described key is that mobile terminal manufacturer is by arranging module according to DES algorithm to the regular data of carrying out self-defining of the requirement of key.
Arranging module downloads in mobile terminal memory by the address realm of three data blocks, data block and sequence number, default summary ciphertext and key, in addition, counter arranges module in mobile terminal memory, arranges a counter, described counter, can arrange according to universal method, be generally and arrange data, the requirement according to different situations counts, and the value of counter is 1 or 2 or 3.Computing detection module key is encrypted nonce counter numerical value, nonce counter numerical value ciphertext s_Count after encryption is stored in mobile terminal memory, described key is encrypted can adopts symmetric encipherment algorithm to nonce counter numerical value, also can adopt rivest, shamir, adelman, the present invention is for DES algorithm the most typical in symmetric encipherment algorithm.Like this, following data message is comprised in mobile terminal memory: data block, data block sequence number and address realm, default summary ciphertext, key sum counter numerical value ciphertext.
Step 102, during mobile terminal-opening, the nonce counter numerical value plaintext m_Count of deciphering gained, according to DES algorithm deciphering s_Count, stores in a memory in the mobile terminal by computing detection module key.
Step 103, computing detection module determines current data to be tested block sequence number according to the numerical value of m_Count in memory, such as, when m_Count is 1, computing detection module calls determines data to be tested block sequence number function, and the data block sequence number to be detected that this function exports is number2, and namely to be detected is data block 2, same, when m_Count is 2, to be detected is data block 3, when m_Count is 3, to be detected is data block 1, is described when the present invention is 1 for m_Count.
Step 104, computing detection module utilizes MD5 algorithm to extract the data summarization 2 of data block 2, and according to the default summary ciphertext s_Digest2 of DES algorithm block of unencrypted data 2, obtains the default summary plaintext m_Digest2 of data block 2.
Step 105, whether computing detection module comparison data summary 2 is identical with m_Digest2, if identical, performs step 106; Otherwise perform step 107.
Step 106, computing detection module key is according to DES algorithm for encryption counter values expressly m_Count, and use in order to during next mobile terminal-opening, mobile terminal can normally start.
Step 107, flow process terminates, and during next mobile terminal-opening, repeats above-mentioned flow process.
Call in step 103 really that given data block sequence number function handling process is as shown in Figure 2:
Step 201, computing detection module judges whether nonce counter numerical value plaintext m_Count is more than or equal to the data block quantity (max_Number) in memory, if so, performs step 202, otherwise performs step 203;
Step 202, counter values expressly m_Count counts from 0;
Step 203, counter values expressly m_Count increases by 1;
Step 204, computing detection module by counter values expressly m_Count assignment to data to be tested block sequence number Number.
Based on above method, present invention also offers the device that a kind of substep detects integrity of mobile terminal memory data, as shown in Figure 3, comprising:
Module 301 is set, for data are divided into arbitrarily some data blocks, extract the data block summary of each data block, data block summary is encrypted to data block summary ciphertext, become and preset summary ciphertext, and the default summary ciphertext of deciphering data to be tested block becomes to preset summary expressly, and above-mentioned data are stored in mobile terminal memory 304.
Counter arranges module 302, for arranging counter in mobile terminal memory 304;
Computing detection module 303, for counter values is encrypted to counter values ciphertext, extract the data summarization of data to be tested block, compared with the data summarization of data block to be detected extracted and the default of data to be tested block being made a summary expressly, conform to, these data to be tested block is complete.
Mobile terminal memory 304, for storing data block, data block sequence number and address realm, presetting summary ciphertext, key sum counter numerical value ciphertext.
Module 301 is set, for being downloaded in mobile terminal memory 304 the regular self-defining key of key according to DES algorithm.
Computing detection module 303 also for, deciphering counter values ciphertext with key becomes counter values expressly, expressly call according to counter values and determine data to be tested block sequence number function, thus determine data to be tested block, extract the data summarization of data block to be detected.
Computing detection module 303 is further used for, decipher the default summary ciphertext corresponding with data to be tested block, become and preset summary expressly, relatively the data summarization of data to be tested block is made a summary expressly with default, after conforming to, expressly become counter values ciphertext with key ciphering counters numerical value and be stored in mobile terminal memory 304.
The above arranges the relevant device that module is arranged in mobile terminal manufacturer, and described computing detection module, counter arranges module and mobile terminal memory is positioned at mobile terminal.
The above, be only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention, and all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (7)

1. detect a method for integrity of mobile terminal memory data, it is characterized in that, the method comprises:
Module is set data are divided into arbitrarily some data blocks, extract the data summarization of each data block, be encrypted to become to data summarization and preset summary ciphertext, data block and default summary ciphertext are stored in mobile terminal memory;
Counter values is encrypted to counter values ciphertext by computing detection module, during each start, expressly determine the sequence number of data to be tested block according to the counter values of deciphering, and detect corresponding data to be tested block in the memory of mobile terminal, extract the data summarization of corresponding data to be tested block;
The corresponding summary ciphertext of presetting of computing detection module deciphering is for presetting summary expressly, and the data summarization comparing data to be tested block is made a summary expressly with corresponding presetting, and when determining identical, current data to be tested blocks of data is complete, and mobile terminal normally starts; When determining difference, this subtask terminates.
2. method according to claim 1, is characterized in that, the method also comprises: in mobile terminal memory, arrange counter; Module installation mobile terminal manufacturer key key is set and is downloaded to mobile terminal memory.
3. method according to claim 2, is characterized in that, described computing detection module expressly determines the sequence number of data to be tested block according to counter values, comprising:
Computing detection module key deciphers counter values ciphertext and becomes counter values expressly, calls and determines data block sequence number function, determine data block sequence number to be detected according to the Output rusults of function.
4. method according to claim 3, is characterized in that, the data summarization that described computing detection module compares data to be tested block with preset and make a summary expressly after, comprise further: counter values plaintext is encrypted, is stored in mobile terminal memory.
5. detect a device for integrity of mobile terminal memory data, it is characterized in that, this device comprises:
Module is set, data are divided into arbitrarily some data blocks, extract the data summarization of each data block, data summarization is encrypted into and presets summary ciphertext;
Mobile terminal memory, for storing data block, presetting summary ciphertext;
Computing detection module, counter values is encrypted to counter values ciphertext, when starting shooting, the counter values according to deciphering expressly determines data to be tested block sequence number at every turn, and detect corresponding data to be tested block in the memory of mobile terminal, extract the data summarization of corresponding data to be tested block;
The corresponding summary ciphertext of presetting of deciphering is for presetting summary expressly, and the data summarization of data block more to be detected is made a summary expressly with corresponding presetting, and the then current data to be tested block that conforms to is complete, and mobile terminal normally starts; When not conforming to, this subtask terminates.
6. device according to claim 5, is characterized in that, this device also comprises: counter arranges module,
The described module that arranges is further used for: arrange key and be downloaded in mobile terminal memory;
Described counter arranges module, for arranging counter in mobile terminal memory, by computing detection module key, counter values is encrypted to counter values ciphertext.
7. device according to claim 6, it is characterized in that, described computing detection module also for: decipher counter values ciphertext with key and become counter values expressly, call and determine data block sequence number function, determine data block sequence number to be detected according to the Output rusults of function.
CN200910241580.2A 2009-11-26 2009-11-26 A kind of method and apparatus detecting integrity of mobile terminal memory data Expired - Fee Related CN102083069B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN200910241580.2A CN102083069B (en) 2009-11-26 2009-11-26 A kind of method and apparatus detecting integrity of mobile terminal memory data
PCT/CN2010/072499 WO2010148788A1 (en) 2009-11-26 2010-05-06 Method and apparatus for detecting data integrity of memory of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910241580.2A CN102083069B (en) 2009-11-26 2009-11-26 A kind of method and apparatus detecting integrity of mobile terminal memory data

Publications (2)

Publication Number Publication Date
CN102083069A CN102083069A (en) 2011-06-01
CN102083069B true CN102083069B (en) 2015-09-16

Family

ID=43385934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910241580.2A Expired - Fee Related CN102083069B (en) 2009-11-26 2009-11-26 A kind of method and apparatus detecting integrity of mobile terminal memory data

Country Status (2)

Country Link
CN (1) CN102083069B (en)
WO (1) WO2010148788A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932650B (en) * 2011-08-11 2018-01-19 索尼公司 Video data integrity protection and verification method, equipment and system
CN103488952B (en) * 2013-09-24 2017-01-18 华为技术有限公司 File integrity verification method and file processor
CN106022107A (en) * 2015-10-30 2016-10-12 北京中电华大电子设计有限责任公司 Method and system for protecting program execution integrity

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005031619A2 (en) * 2003-09-26 2005-04-07 Ren Liu Setup and application of mapping cryptogram and device and method thereof
CN1700639A (en) * 2004-05-21 2005-11-23 华为技术有限公司 Method for exporting and importing WLAN authentication and privacy infrastructure certificate information
CN101202630A (en) * 2007-12-07 2008-06-18 中国电信股份有限公司 Method and system for adding decipher in TR069 integrative terminal management platform
CN101233769A (en) * 2005-06-13 2008-07-30 高通股份有限公司 Apparatus and method for managing firmware verification on a wireless device
CN101247416A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Firmware downloading method, preprocessing method and integrality verification method based on OTA
CN101373440A (en) * 2008-10-09 2009-02-25 北京飞天诚信科技有限公司 A firmware upgrade data processing method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7480796B2 (en) * 2001-06-07 2009-01-20 Kwan Sofware Engineering, Inc. System and method for authenticating data using incompatible digest functions
CN100394393C (en) * 2006-03-10 2008-06-11 四川大学 Data Consistency Detection Method in Information System

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005031619A2 (en) * 2003-09-26 2005-04-07 Ren Liu Setup and application of mapping cryptogram and device and method thereof
CN1700639A (en) * 2004-05-21 2005-11-23 华为技术有限公司 Method for exporting and importing WLAN authentication and privacy infrastructure certificate information
CN101233769A (en) * 2005-06-13 2008-07-30 高通股份有限公司 Apparatus and method for managing firmware verification on a wireless device
CN101202630A (en) * 2007-12-07 2008-06-18 中国电信股份有限公司 Method and system for adding decipher in TR069 integrative terminal management platform
CN101247416A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Firmware downloading method, preprocessing method and integrality verification method based on OTA
CN101373440A (en) * 2008-10-09 2009-02-25 北京飞天诚信科技有限公司 A firmware upgrade data processing method and device

Also Published As

Publication number Publication date
WO2010148788A1 (en) 2010-12-29
CN102083069A (en) 2011-06-01

Similar Documents

Publication Publication Date Title
CN112637836A (en) Data processing method and device, electronic equipment and storage medium
EP0482371B1 (en) Method and apparatus for controlling the use of a public key, based on the level of integrity for the key
EP2367316B1 (en) Method and circuitry for detecting a fault attack
CN111639348B (en) Management method and device of database keys
CN102647279B (en) Encryption method, encrypted card, terminal equipment and interlocking of phone and card device
CN107395368A (en) Without the digital signature method in media environment and solution encapsulating method and decryption method
CN115766244B (en) Internet of vehicles information encryption method, device, computer equipment and storage medium
CN104639561A (en) Method for safely obtaining secret key
CN114826590B (en) A packet mode encryption method, decryption method, device and equipment thereof
CN114205377B (en) Binding method, binding device, binding storage medium and binding program product for Internet of things equipment
CN108737070A (en) Based on the power grid data transmission method of mobile terminal for improving des encryption algorithm
CN102624710B (en) Sensitive information transmission method and sensitive information transmission system
CN101552792B (en) A method and apparatus for transmitting information with dynamic secondary cipher key
CN104601820A (en) Mobile terminal information protection method based on TF password card
CN114499825A (en) Double-control key management method, system, encryption machine and storage medium
CN102083069B (en) A kind of method and apparatus detecting integrity of mobile terminal memory data
CN101673250B (en) Method and device for protecting codes or data in mobile phone memory
CN112039654A (en) Electric meter data security acquisition method for resisting man-in-the-middle attack
CN102056156B (en) Computer Data Security is downloaded to the method and system of mobile terminal
Tang et al. A one-time pad encryption algorithm based on one-way hash and conventional block cipher
CN102045709B (en) Mobile terminal application data downloading method, system and mobile terminal
CN102622561A (en) Enciphering and deciphering method for invoking data in software
CN118174933A (en) Data security transmission method based on Internet of things
CN102170355A (en) Management method of remote upgrade secret key in information safety equipment
CN116707770A (en) White box encryption method and device based on AES128 and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150916

Termination date: 20201126