检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:袁凤培 YUAN Fengpei(CCTEG Changzhou Research Institute,Changzhou 213015,China;Tiandi(Changzhou)Automation Co.,Ltd.,Changzhou 213015,China)
机构地区:[1]中煤科工集团常州研究院有限公司,江苏常州213015 [2]天地(常州)自动化股份有限公司,江苏常州213015
出 处:《煤矿机电》2022年第5期1-5,共5页Colliery Mechanical & Electrical Technology
基 金:国家级安全生产监管监察技术支撑能力建设项目(2018ZX001Z07)。
摘 要:矿用嵌入式软件的特点是生产难度大,成本高,周期长,非常容易被破解,且具有易复制、复制成本低等性质。现有的嵌入式设备应用程序保护方法有程序加密、SN码静态授权、CRP代码读保护等措施,从实践反馈来看,这些方法均存在程序泄漏风险,无法彻底解决隐患。为了更好地保护软件开发者及用户的合法权益,研究了非对称密钥算法、Hash算法、数字签名等技术,提出了一种基于数字签名技术的应用程序授权方法。开发了用于嵌入式设备应用程序授权的手持仪及PC服务程序,搭建硬件系统平台,测试关键技术,验证了方法的可行性。结果表明该方法具有难破解、易实施、硬件依赖度低等优点,可大量推广应用。The characteristics of mining embedded software are that it is difficult to produce,high cost,long cycle,very easy to crack,and easy to copy,low copy cost,etc.The existing embedded device application protection methods include program encryption,SN code static authorization,CRP code read protection and other measures.From practice feedback,these methods have program leakage risks and cannot completely solve the hidden dangers.In order to better protect the legitimate rights and interests of software developers and users,asymmetric key algorithm,Hash algorithm,digital signature and other technologies were studied,and an application authorization method based on digital signature technology was proposed.The handheld instrument and PC service program for embedded device application program authorization were developed,the hardware system platform was built,and the key technologies were tested to verify the feasibility of the method.The results showed that this method was difficult to crack,easy to implement,low hardware dependency,and could be widely used.
关 键 词:矿用嵌入式设备 应用程序授权 非对称密钥算法 ECDSA RSA 公钥验签
分 类 号:TP273[自动化与计算机技术—检测技术与自动化装置]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.249