[go: up one dir, main page]

CN105718804B - A kind of hardware instruction calling control system - Google Patents

A kind of hardware instruction calling control system Download PDF

Info

Publication number
CN105718804B
CN105718804B CN201511034044.7A CN201511034044A CN105718804B CN 105718804 B CN105718804 B CN 105718804B CN 201511034044 A CN201511034044 A CN 201511034044A CN 105718804 B CN105718804 B CN 105718804B
Authority
CN
China
Prior art keywords
module
instruction
individual
expert
preview
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201511034044.7A
Other languages
Chinese (zh)
Other versions
CN105718804A (en
Inventor
张亚军
文桦
范豪
范本正
衡耀付
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHUMADIAN VOCATIONAL AND TECHNICAL COLLEGE
Original Assignee
ZHUMADIAN VOCATIONAL AND TECHNICAL COLLEGE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHUMADIAN VOCATIONAL AND TECHNICAL COLLEGE filed Critical ZHUMADIAN VOCATIONAL AND TECHNICAL COLLEGE
Priority to CN201511034044.7A priority Critical patent/CN105718804B/en
Publication of CN105718804A publication Critical patent/CN105718804A/en
Application granted granted Critical
Publication of CN105718804B publication Critical patent/CN105718804B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of hardware instructions to call control system, including command reception module, inside sets the instruction preview module of encrypting module, retrieves contrast module, risk operations property data base, expert's evaluation module, command output module and central processing unit.The present invention generates different passwords to different hardware instructions at random, different decryption programs is generated simultaneously, to be previewed to different hardware instructions using different preview modes, then risk assessment is carried out to the whole process of preview, finally by expert module, secondary audit is carried out, improves safety when self-service device carries out hardware instruction calling, risk operations property data base and the included more new function of expert's evaluation module simultaneously, it is further provided the safety used.

Description

A kind of hardware instruction calling control system
Technical field
The present invention relates to hardware instructions to call field, and in particular to a kind of hardware instruction calling control system.
Background technique
Self-service device refers to that user passes through computer terminal, one kind of the contact of entirely autonomous progress various businesses Terminal device.Self-service device is made of multiple components such as keyboard, card reader, background terminal, and each component all can serve as one Hardware, and have itself instruction set and instruction sequence.Hardware is in the instruction set or instruction for receiving upper layer software (applications) transmission After sequence, the instruction in collection or instruction sequence is executed instruction, so that each hardware can be by executing instruction in self-service device Information exchange is carried out to complete the various functions of autonomous device.
At present the instruction set in self-service device and instruction sequence include operate normally instruction set, operate normally instruction sequence, Test maintaining instruction set and test maintaining instruction sequence.And the permission that each hardware executes instruction is open permission, i.e. hardware The instruction in any instruction set or instruction sequence of upper layer software (applications) transmission can be executed.
But hardware is executing certain instructions, such as Encryption Keyboard hardware command-destruct, can directly damage Encryption Keyboard, reduce The safety of self-service device.
Summary of the invention
To solve the above problems, the present invention provides a kind of hardware instructions to call control system, by multiple audit, solve When self-service device carries out hardware instruction calling, existing safety low problem.
To achieve the above object, the technical scheme adopted by the invention is as follows:
A kind of hardware instruction calling control system, including
Command reception module configures different decryption programs for receiving hardware instruction, and according to different instructions;
Instruction preview module, inside sets encrypting module, the hardware instruction data reconciliation sent for receiving instruction receiving module Close program, and use the preview that is instructed of different instruction preview modes for different decryption programs, and by the mistake of preview Journey is sent to retrieval contrast module;
Retrieve contrast module, for by the data in the process of received preview and risk operations property data base into Row comparison, and the calculating assessment of similarity is carried out, assessment result will be calculated and be sent to expert's evaluation module;
Risk operations property data base, for storing the feature of various risk operations;
Expert's evaluation module, for passing through the auditing rule in expert's evaluation module to by retrieval contrast module audit Instruction carries out secondary audit, if sending command output module by audit for the instruction, if not passing through, referring to this Order is sent to risk operations property data base, and will audit unacceptable notice and be sent to and send the terminal of instruction and show;
Command output module, for sending instructions to corresponding hardware device;
Central processing unit, using single-chip microcontroller, for cooperateing with above-mentioned module to work.
Wherein, the risk operations property data base is connected with a update module, is used for through web crawlers timing in net Webpage relevant to formula or document are searched in network, and are sent risk operations property data base for these related datas and stored up It deposits.
Wherein, a variety of preview models for different hardware instruction are equipped in described instruction preview module.
Wherein, it is communicated between described instruction receiving module and instruction preview module using binary channels link block, When any one channel is communicated, another alternate channel carries out key updating.
Wherein, the encrypting module encrypt the step of include:
The parameter run in S1, initialization evolution, initializes population in evolution using self feed back mapping function, with Machine generates the initial population containing certain amount individual;
S2, the frequency adaptive value for being used to examine each individual frequency in current population is calculated and for examining each individual sequence The sequence adaptive value of column;
S3, each individual of comparison and other individual adaptive values of population where it, calculate each individual in current population Order;
S4, each individual Hamming distance corresponding with each individual chromosome length of other in current population is calculated, according to Hamming distance obtains the crowding distance of each individual;
S5, elder generation carry out descending arrangement to the individual in population according to rank value, then on the basis of above-mentioned sequence, according still further to Crowding distance value carries out ascending order arrangement to the individual in population;
S6, random sampling is carried out to the current population after sequence, extracts a random number, plaintext is carried out using random number Segmentation, obtains final ciphertext.
Wherein, the legal operating instruction under normal mode of operation is stored in expert's evaluation module, legal operation refers to Enable the legal test maintaining instruction set and legal test maintaining instruction sequence under sequence, test maintaining mode.
Wherein, after every progress once accesses, that is, a key updating is carried out.
Wherein, expert's evaluation module is connected with a human expert module, for passing through 3G network, Wi-Fi network side Formula, bluetooth approach update the auditing rule in expert's evaluation module.
The invention has the following advantages:
The present invention generates different passwords to different hardware instructions at random, while generating different decryption programs, thus Different hardware instructions is previewed using different preview modes, risk assessment then is carried out to the whole process of preview, Finally by expert module, secondary audit is carried out, improves safety when self-service device carries out hardware instruction calling, while wind Dangerous operating characteristics database and the included more new function of expert's evaluation module, it is further provided the safety used.
Detailed description of the invention
Fig. 1 is the system block diagram that control system is called in a kind of hardware instruction of the embodiment of the present invention.
Specific embodiment
In order to which objects and advantages of the present invention are more clearly understood, the present invention is carried out with reference to embodiments further It is described in detail.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to limit this hair It is bright.
As shown in Figure 1, the embodiment of the invention provides a kind of hardware instructions to call control system, including
Command reception module configures different decryption programs for receiving hardware instruction, and according to different instructions;
Instruction preview module, inside sets encrypting module, the hardware instruction data reconciliation sent for receiving instruction receiving module Close program, and use the preview that is instructed of different instruction preview modes for different decryption programs, and by the mistake of preview Journey is sent to retrieval contrast module;
Retrieve contrast module, for by the data in the process of received preview and risk operations property data base into Row comparison, and the calculating assessment of similarity is carried out, assessment result will be calculated and be sent to expert's evaluation module;
Risk operations property data base, for storing the feature of various risk operations;
Expert's evaluation module, for passing through the auditing rule in expert's evaluation module to by retrieval contrast module audit Instruction carries out secondary audit, if sending command output module by audit for the instruction, if not passing through, referring to this Order is sent to risk operations property data base, and will audit unacceptable notice and be sent to and send the terminal of instruction and show;
Command output module, for sending instructions to corresponding hardware device;
Central processing unit, using single-chip microcontroller, for cooperateing with above-mentioned module to work.
The risk operations property data base is connected with a update module, for being looked into a network by web crawlers timing Webpage relevant to formula or document are looked for, and sends risk operations property data base for these related datas and stores.
Described instruction previews a variety of preview models being equipped in module for different hardware instruction.
It is communicated between described instruction receiving module and instruction preview module using binary channels link block, any one When a channel is communicated, another alternate channel carries out key updating.
The encrypting module encrypt the step of include:
The parameter run in S1, initialization evolution, initializes population in evolution using self feed back mapping function, with Machine generates the initial population containing certain amount individual;
S2, the frequency adaptive value for being used to examine each individual frequency in current population is calculated and for examining each individual sequence The sequence adaptive value of column;
S3, each individual of comparison and other individual adaptive values of population where it, calculate each individual in current population Order;
S4, each individual Hamming distance corresponding with each individual chromosome length of other in current population is calculated, according to Hamming distance obtains the crowding distance of each individual;
S5, elder generation carry out descending arrangement to the individual in population according to rank value, then on the basis of above-mentioned sequence, according still further to Crowding distance value carries out ascending order arrangement to the individual in population;
S6, random sampling is carried out to the current population after sequence, extracts a random number, plaintext is carried out using random number Segmentation, obtains final ciphertext.
Legal operating instruction under normal mode of operation, legal operating instruction sequence are stored in expert's evaluation module Column, legal test maintaining instruction set and legal test maintaining instruction sequence under test maintaining mode.
After every progress once accesses, that is, carry out a key updating.
Expert's evaluation module is connected with a human expert module, for passing through 3G network, Wi-Fi network mode, indigo plant Tooth method updates the auditing rule in expert's evaluation module.
This specific implementation generates different passwords to different hardware instructions at random, while generating different decryption programs, To be previewed to different hardware instructions using different preview modes, risk then is carried out to the whole process of preview and is commented Estimate, finally by expert module, carry out secondary audit, improves safety when self-service device carries out hardware instruction calling, together When the risk operations property data base and included more new function of expert's evaluation module, it is further provided the safety used.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (8)

1. control system is called in a kind of hardware instruction, which is characterized in that including
Command reception module configures different decryption programs for receiving hardware instruction, and according to different instructions;
Instruction preview module, inside sets encrypting module, for receiving the hardware instruction data and decryption journey of command reception module transmission Sequence, and sent out for the preview that different decryption programs uses different instruction preview modes to be instructed, and by the process of preview It is sent to retrieval contrast module;
Contrast module is retrieved, for carrying out the data in the process of received preview and risk operations property data base pair Than, and the calculating assessment of similarity is carried out, assessment result will be calculated and be sent to expert's evaluation module;
Risk operations property data base, for storing the feature of various risk operations;
Expert's evaluation module, for the instruction by the auditing rule in expert's evaluation module to being audited by retrieval contrast module Secondary audit is carried out, if sending command output module by audit for the instruction, if not passing through, which being sent To risk operations property data base, and will audit it is unacceptable notice be sent to send instruction terminal show;
Command output module, for sending instructions to corresponding hardware device;
Central processing unit, using single-chip microcontroller, for cooperateing with above-mentioned module to work.
2. control system is called in a kind of hardware instruction according to claim 1, which is characterized in that the risk operations feature Database is connected with a update module, for searching relevant webpage or document in a network by web crawlers timing, and will These related datas are sent to risk operations property data base and are stored.
3. control system is called in a kind of hardware instruction according to claim 1, which is characterized in that described instruction previews module The interior a variety of preview models being equipped with for different hardware instruction.
4. control system is called in a kind of hardware instruction according to claim 1, which is characterized in that described instruction receiving module It is communicated between instruction preview module using binary channels link block, when any one channel is communicated, another Alternate channel carries out key updating.
5. control system is called in a kind of hardware instruction according to claim 1, which is characterized in that the encrypting module encryption The step of include:
The parameter run in S1, initialization evolution, initializes population in evolution using self feed back mapping function, random raw At the initial population containing certain amount individual;
S2, the frequency adaptive value for being used to examine each individual frequency in current population is calculated and for examining each individual sequence Sequence adaptive value;
S3, each individual of comparison and other individual adaptive values of population where it, calculate the order of each individual in current population;
S4, each individual Hamming distance corresponding with each individual chromosome length of other in current population is calculated, according to Hamming Distance obtains the crowding distance of each individual;
S5, elder generation carry out descending arrangement to the individual in population according to rank value, then on the basis of above-mentioned arrangement, according still further to crowded Distance value carries out ascending order arrangement to the individual in population;
S6, random sampling is carried out to the current population after sequence, extracts a random number, using random number to dividing in plain text It cuts, obtains final ciphertext.
6. control system is called in a kind of hardware instruction according to claim 1, which is characterized in that expert's evaluation module Inside store the legal survey under legal operating instruction under normal mode of operation, legal operating instruction sequence, test maintaining mode Try maintenance instruction collection and legal test maintaining instruction sequence.
7. control system is called in a kind of hardware instruction according to claim 1, which is characterized in that every once to be accessed Afterwards, that is, a key updating is carried out.
8. control system is called in a kind of hardware instruction according to claim 1, which is characterized in that expert's evaluation module It is connected with a human expert module, for updating in expert's evaluation module by 3G network, Wi-Fi network mode, bluetooth approach Auditing rule.
CN201511034044.7A 2015-12-25 2015-12-25 A kind of hardware instruction calling control system Expired - Fee Related CN105718804B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511034044.7A CN105718804B (en) 2015-12-25 2015-12-25 A kind of hardware instruction calling control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511034044.7A CN105718804B (en) 2015-12-25 2015-12-25 A kind of hardware instruction calling control system

Publications (2)

Publication Number Publication Date
CN105718804A CN105718804A (en) 2016-06-29
CN105718804B true CN105718804B (en) 2019-03-19

Family

ID=56147070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511034044.7A Expired - Fee Related CN105718804B (en) 2015-12-25 2015-12-25 A kind of hardware instruction calling control system

Country Status (1)

Country Link
CN (1) CN105718804B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107608891B (en) * 2017-09-21 2020-12-15 中国航空无线电电子研究所 Data processing application detection method based on instruction
CN110309644B (en) * 2019-06-28 2021-03-19 兆讯恒达科技股份有限公司 Instruction information processing method
CN114157463B (en) * 2021-11-23 2024-10-08 四川邮电职业技术学院 Network information safety early warning platform based on big data analysis

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003010951A1 (en) * 2001-07-24 2003-02-06 Citibank, N.A. Method and system for data management in electronic payments transactions
CN101493793A (en) * 2009-02-19 2009-07-29 深圳市紫金支点技术股份有限公司 ATM test method and device
CN103064678A (en) * 2012-12-24 2013-04-24 广州广电运通金融电子股份有限公司 Method and device for call control of hardware instruction

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7594111B2 (en) * 2002-12-19 2009-09-22 Massachusetts Institute Of Technology Secure execution of a computer program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003010951A1 (en) * 2001-07-24 2003-02-06 Citibank, N.A. Method and system for data management in electronic payments transactions
CN101493793A (en) * 2009-02-19 2009-07-29 深圳市紫金支点技术股份有限公司 ATM test method and device
CN103064678A (en) * 2012-12-24 2013-04-24 广州广电运通金融电子股份有限公司 Method and device for call control of hardware instruction

Also Published As

Publication number Publication date
CN105718804A (en) 2016-06-29

Similar Documents

Publication Publication Date Title
CN108984733B (en) Cross-domain data fusion method, system and storage medium
Papalexakis et al. Network anomaly detection using co-clustering
DiMarzio et al. Chain stiffness and the lattice theory of polymer phases
CN106411506B (en) Key derivation method and device suitable for digital cash
EP2778951A1 (en) Database encryption system, method and program
US20130179684A1 (en) Encrypted database system, client terminal, encrypted database server, natural joining method, and program
CN110378781A (en) Data monitoring method, device, computer equipment and storage medium
CN105718804B (en) A kind of hardware instruction calling control system
EP2992478B1 (en) Disrupting password attack using compression
CN111783124A (en) Data processing method and device based on privacy protection and server
CN110163008B (en) Security audit method and system for deployed encryption model
CN111539009A (en) Supervised feature binning method and device for protecting private data
CN107704768A (en) A kind of multiple key classification safety search method of ciphertext
CN114611008B (en) User service strategy determination method and device based on federal learning and electronic equipment
US20150270958A1 (en) Decryptable index generation method for range search, search method, and decryption method
Zaeem et al. Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes
CN109597949A (en) Third party based on data normalization buries point identification generation method and equipment
CN109714157A (en) SDN cross-domain access control method for resisting encryption of key exposure attribute
CN105306200B (en) The encryption method and device of network account password
CN106257449A (en) A kind of information determines method and apparatus
CN110489992A (en) Desensitization method and system based on big data platform
CN103761469B (en) The method and apparatus executing Password Management in input method application
Aruchamy et al. Enhancing security of medical images using code-based intermittent encryption and convolutional neural network
CN103593592B (en) User data encryption and decryption method
CN105553982B (en) Router safety detection method and system and router

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190319

Termination date: 20191225