Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Integrity verification method and device, terminal equipment and verification server

A technology for integrity verification and terminal equipment, applied in the direction of digital data protection, etc., can solve problems such as large amount of calculation

Pending Publication Date: 2021-06-18
HUAWEI TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides an integrity verification method, device, terminal equipment, verification server and computer-readable storage medium, which can solve the problem that all files need to be signed separately in the existing integrity verification, resulting in a large amount of calculation The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrity verification method and device, terminal equipment and verification server
  • Integrity verification method and device, terminal equipment and verification server
  • Integrity verification method and device, terminal equipment and verification server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0167] The integrity verification method provided by Embodiment 1 can be implemented on a mobile phone with the above-mentioned hardware structure / software structure, so as to perform integrity verification on the downloaded files of the mobile phone, that is, after the mobile phone downloads the file from the file server, it can be used in the application The integrity of the file is verified by the integrity verification method provided in this embodiment before, to ensure that the file downloaded by the mobile phone is a file that has not been tampered with, has a legal version, and has a traceable source. The following will combine figure 1 The integrity verification system shown in this example describes the integrity verification method provided in this embodiment in detail.

[0168] Such as Figure 5 As shown, the integrity verification method provided in this embodiment may include:

[0169] S501. Obtain the file to be verified sent by the file server and the integri...

Embodiment 2

[0217] The integrity checking method provided by Embodiment 2 can be performed in such as figure 2 The integrity verification system shown in the verification server is implemented to perform integrity verification on each terminal device, that is, the integrity verification method for each terminal device can be used to perform integrity verification on the application files in each terminal device. Check to ensure that the application files in each terminal device are files that have not been tampered with and have legal versions. The following will combine figure 2 The integrity verification system shown in this example describes the integrity verification method provided in this embodiment in detail.

[0218] Such as Figure 6 As shown, the integrity verification method provided in this embodiment may include:

[0219] S601. Acquire the integrity verification information of each terminal device, where the integrity verification information includes the initial root no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of terminals, and particularly relates to an integrity verification method and device, terminal equipment and a verification server. The method comprises the steps of obtaining a to-be-verified file sent by a file server and integrity verification information of the to-be-verified file, wherein the integrity verification information comprises root node signature information obtained by using a first signature private key to sign a target root node of a target Hash tree, child nodes related to the to-be-verified file in the target Hash tree and a first signature public key corresponding to the first signature private key, and the target hash tree is a hash tree constructed according to all files in the file server; verifying the root node signature information by using the first signature public key; and when the root node signature information passes verification, constructing a current root node corresponding to the target hash tree according to the to-be-verified file and the child nodes, and verifying the integrity of the to-be-verified file according to the current root node and the target root node, thereby solving the problem of large calculation amount caused by the need of respectively signing all files at present.

Description

technical field [0001] The present application belongs to the field of terminal technology, and in particular relates to an integrity verification method, device, terminal equipment, verification server and computer-readable storage medium. Background technique [0002] Integrity verification refers to the technical means of verifying the accuracy of files to detect whether files have been illegally tampered with. With the continuous development of network technology, files downloaded or applied by terminal devices are easily tampered with illegally. Therefore, how to verify the integrity of downloaded files or application files of terminal devices has become an urgent problem to be solved by those skilled in the art. [0003] In the prior art, it is possible to calculate hash values ​​for all files in advance, and sign and save each hash value, so as to verify the integrity of the files according to the saved signature results. This method of signing all files separately r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64G06F21/62
Inventor 李永凯
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products