主权项 |
1. A method, comprising:
receiving, by a device, a debugging establishment request from a debugging computer; securing, by the device with a cryptographic mechanism, an expiration value to generate a secured expiration value; transmitting, by the device, a unique identifier associated with the device and the secured expiration value to the debugging computer; receiving, by the device from the debugging computer, a transfer layer security (TLS) certificate, the TLS certificate including a second unique identifier based on the unique identifier and a secured TLS expiration value based on the secured expiration value; establishing, by the device, a secured and authenticated link with the debugging computer using the TLS certificate;
enabling, by the device, a debugging mode on the device responsive to:
determining that the second unique identifier matches the unique identifier,determining, with the cryptographic mechanism, that the secured TLS expiration value is valid, anddetermining that the secured TLS expiration value is within a predefined validity range; and executing, by the device in the debugging mode, debugging instructions received from the debugging computer. |