TW201342238A - System-on-chip and booting method thereof - Google Patents

System-on-chip and booting method thereof Download PDF

Info

Publication number
TW201342238A
TW201342238A TW102109076A TW102109076A TW201342238A TW 201342238 A TW201342238 A TW 201342238A TW 102109076 A TW102109076 A TW 102109076A TW 102109076 A TW102109076 A TW 102109076A TW 201342238 A TW201342238 A TW 201342238A
Authority
TW
Taiwan
Prior art keywords
firmware image
firmware
memory
signature
code
Prior art date
Application number
TW102109076A
Other languages
Chinese (zh)
Other versions
TWI594188B (en
Inventor
Ming-Wei Hsu
Original Assignee
Asmedia Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Asmedia Technology Inc filed Critical Asmedia Technology Inc
Priority to US13/858,112 priority Critical patent/US9256744B2/en
Publication of TW201342238A publication Critical patent/TW201342238A/en
Application granted granted Critical
Publication of TWI594188B publication Critical patent/TWI594188B/en

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

A system-on-chip(SoC) and a booting method using the same are provided, the SoC is coupled to an external memory, and includes a ROM and a processor. The ROM is configured to store a first firmware image. The processor is coupled to the ROM, and is configured to access the first firmware image from the ROM and check state of the first firmware image. The CPU accesses a second firmware image from the external memory if the first firmware image is damaged, and check whether the second firmware image is legal. The processor accesses and executes the second firmware image to performs a booting process if the second firmware image is checked successfully.

Description

系統單晶片及其開機方法 System single chip and booting method thereof

本發明是有關於一種晶片,且特別是有關於一種系統單晶片(System-on-Chip,SoC)及其開機方法。 The present invention relates to a wafer, and more particularly to a system-on-chip (SoC) and a method of starting the same.

一般來說,系統單晶片或稱為系統整合晶片(System-Level Integration,SLI)是指將一個完整的計算機系統放入一個晶片或積體電路中。舉例來說,常見的系統單晶片可包括中央處理器(Central Processing Unit,CPU)、記憶體、以及週邊電路等等。系統單晶片的主要概念是將某一種應用領域的電路縮小化及/或模組化,使此應用領域的大部分功能整合在一個晶片或積體電路中,從而達到使產品外形體積減小及/或便於攜帶之功效。 In general, a system-on-a-chip or system-level integration (SLI) refers to placing a complete computer system into a single chip or integrated circuit. For example, a common system single chip may include a central processing unit (CPU), a memory, and peripheral circuits and the like. The main concept of the system single chip is to reduce and/or modularize the circuit of a certain application field, so that most of the functions of this application field are integrated into one chip or integrated circuit, so as to reduce the size of the product and / or easy to carry.

在系統單晶片的開機過程中,系統單晶片的中央處理器會從一儲存媒體中取得一個唯一的韌體映像檔,並執行此韌體映像檔進行開機。然而,當此韌體映像檔損毀或無法完整讀取時,可能會導致系統單晶片無法正常開機。 During the booting of the system single chip, the central processing unit of the system single chip will obtain a unique firmware image from a storage medium and execute the firmware image for booting. However, when the firmware image is corrupted or cannot be completely read, it may cause the system single chip to fail to boot properly.

本發明提供一種系統單晶片及其開機方法,可有效提升系統單晶片開機時的韌體使用彈性。 The invention provides a system single chip and a booting method thereof, which can effectively improve the flexibility of using the firmware when the system single chip is turned on.

本發明提出一種系統單晶片,此系統單晶片耦接一外部記憶體,此系統單晶片包括唯讀記憶體與處理器。唯讀記憶體用以儲存一第一韌體映像檔。處理器耦接唯讀記憶體,用以自唯讀記憶體讀取一第一韌體映像檔,並驗證第一韌體映像檔是否已毀損。 The invention provides a system single chip, the system single chip is coupled to an external memory, and the system single chip comprises a read-only memory and a processor. The read-only memory is used to store a first firmware image. The processor is coupled to the read-only memory for reading a first firmware image from the read-only memory and verifying whether the first firmware image has been corrupted.

若第一韌體映像檔為正常的韌體映像檔,處理器執行第一韌體映像檔進行開機程序。若第一韌體映像檔已毀損,處理器自外部記憶體讀取一第二韌體映像檔,並驗證第二韌體映像檔是否為合法的韌體映像檔。若第二韌體映像檔為驗證成功,處理器執行第二韌體映像檔進行開機程序。 If the first firmware image is a normal firmware image, the processor executes the first firmware image to boot the program. If the first firmware image is corrupted, the processor reads a second firmware image from the external memory and verifies whether the second firmware image is a legal firmware image. If the second firmware image is successfully verified, the processor executes the second firmware image to start the program.

再從另一角度來看,本案也提出一種開機方法,此開機方法適用於一系統單晶片,此系統單晶片包括一處理器,此開機方法包括:提供一唯讀記憶體,其中唯讀記憶體儲存一第一韌體映像檔;提供一外部記憶體,其中外部記憶體儲存一第二韌體映像檔;由處理器自唯讀記憶體讀取第一韌體映像檔,並驗證第一韌體映像檔是否已毀損;若第一韌體映像檔為正常的韌體映像檔的,執行第一韌體映像檔進行開機程序;若第一韌體映像檔已毀損,自外部記憶體讀取第二韌體映像檔,並驗證第二韌體映像檔是否為合法的;若第二韌體映像檔驗證成功,執行第二韌體映像 檔進行開機程序。 From another point of view, the present invention also proposes a booting method, which is applicable to a system single chip, the system single chip includes a processor, and the booting method includes: providing a read-only memory, wherein the read-only memory Storing a first firmware image; providing an external memory, wherein the external memory stores a second firmware image; the processor reads the first firmware image from the read-only memory, and verifies the first Whether the firmware image file is damaged; if the first firmware image is a normal firmware image, execute the first firmware image to start the program; if the first firmware image is damaged, read from the external memory. Take the second firmware image and verify that the second firmware image is legal; if the second firmware image is successfully verified, execute the second firmware image. The file is booted.

基於上述,本發明的系統單晶片及其開機方法,可預先提供兩個或兩個以上的韌體映像檔,以在系統單晶片的開機過程中,載入合法及/或完整的韌體映像檔以完成開機程序。 Based on the above, the system single chip of the present invention and the booting method thereof can provide two or more firmware images in advance to load a legal and/or complete firmware image during the booting of the system single chip. File to complete the boot process.

為讓本發明的上述特徵和優點能更明顯易懂,下文特舉實施例,並配合所附圖式作詳細說明如下。 The above described features and advantages of the invention will be apparent from the following description.

10‧‧‧開機系統 10‧‧‧ boot system

11‧‧‧外部記憶體 11‧‧‧External memory

12‧‧‧系統單晶片 12‧‧‧System Single Chip

122‧‧‧唯讀記憶體 122‧‧‧Read-only memory

124‧‧‧資料記憶體 124‧‧‧Data Memory

126‧‧‧可程式記憶體 126‧‧‧Programmable memory

128‧‧‧中央處理器 128‧‧‧Central Processing Unit

31‧‧‧第一儲存區 31‧‧‧First storage area

32‧‧‧第二儲存區 32‧‧‧Second storage area

312、322‧‧‧晶片功能儲存區 312, 322‧‧‧ wafer function storage area

314、324‧‧‧韌體映像檔儲存區 314, 324‧‧‧ firmware image file storage area

316、326‧‧‧韌體資訊儲存區 316, 326‧‧‧ firmware information storage area

41‧‧‧映像檔長度欄位 41‧‧‧Image length field

42‧‧‧映像檔位元碼欄位 42‧‧‧Image stall code field

43‧‧‧簽章欄位 43‧‧‧Signature field

44‧‧‧檢查總和欄位 44‧‧‧Check the sum field

45‧‧‧校驗碼欄位 45‧‧‧ check code field

S202~S218、S502~S528‧‧‧步驟 S202~S218, S502~S528‧‧‧ steps

圖1為根據本發明一實施例所繪示的系統單晶片的開機系統的示意圖。 FIG. 1 is a schematic diagram of a system for booting a single wafer of a system according to an embodiment of the invention.

圖2為根據本發明一實施例所繪示的開機方法。 FIG. 2 illustrates a booting method according to an embodiment of the invention.

圖3為根據本發明一實施例所繪示的外部記憶體儲存韌體映像檔的示意圖。 FIG. 3 is a schematic diagram of an external memory storage firmware image file according to an embodiment of the invention.

圖4為根據本發明一實施例所繪示的韌體映像檔之格式的示意圖。 4 is a schematic diagram of a format of a firmware image file according to an embodiment of the invention.

圖5為根據本發明一實施例所繪示的開機方法的流程圖。 FIG. 5 is a flowchart of a booting method according to an embodiment of the invention.

圖1為根據本發明一實施例所繪示的系統單晶片(System On a Chip,SoC)的開機系統的示意圖。請參照圖1,系統單晶片的開機系統10包括外部記憶體11以及系統單晶片12。外部記憶 體11例如是快閃記憶體(flash memory)等可用以儲存資料的各式儲存媒體。系統單晶片12是由處理器、記憶體等電子電路集成的單一晶片,例如,適用於處理通用串列匯流排(Universal Serial Bus,USB)2.0或USB 3.0之信號的系統單晶片等等,且本發明不限制系統單晶片12的種類。外部記憶體11與系統單晶片12之間例如是透過串列週邊介面(Serial Peripheral Interface,SPI)匯流排(bus)等各式匯流排相互耦接。 FIG. 1 is a schematic diagram of a system on a chip (SoC) booting system according to an embodiment of the invention. Referring to FIG. 1, the system single-chip booting system 10 includes an external memory 11 and a system single chip 12. External memory The body 11 is, for example, a flash memory or a variety of storage media that can be used to store data. The system single chip 12 is a single chip integrated by electronic circuits such as a processor and a memory, for example, a system single chip suitable for processing signals of a universal serial bus (USB) 2.0 or USB 3.0, and the like, and The invention does not limit the type of system single wafer 12. The external memory 11 and the system single chip 12 are coupled to each other by, for example, various bus bars such as a serial peripheral interface (SPI) bus.

系統單晶片12包括唯讀記憶體(Read Only Memory,ROM)122、資料記憶體124、可程式記憶體126以及處理器128。唯讀記憶體122可用以儲存系統單晶片12出廠前就預先寫入的資料。資料記憶體124與可程式記憶體126例如是隨機存取記憶體(Random Access Memory,RAM)。特別是,由於可程式記憶體126主要是用來儲存二位元程式碼(binary code),且資料記憶體124主要是用來儲存其他的各種資料,因此資料記憶體124需具備較快速的讀寫速度,而可程式記憶體126的讀寫速度則不受限制。處理器128為系統單晶片12的核心元件,用以負責系統單晶片12的整體運作,並提供運算與資料處理功能。 The system single chip 12 includes a read only memory (ROM) 122, a data memory 124, a programmable memory 126, and a processor 128. The read-only memory 122 can be used to store data previously written by the system single chip 12 from the factory. The data memory 124 and the programmable memory 126 are, for example, random access memory (RAM). In particular, since the programmable memory 126 is mainly used to store a binary code, and the data memory 124 is mainly used to store other various data, the data memory 124 needs to have a faster read. The writing speed is not limited, and the read/write speed of the programmable memory 126 is not limited. The processor 128 is the core component of the system single chip 12, and is responsible for the overall operation of the system single chip 12, and provides arithmetic and data processing functions.

在本實施例中,唯讀記憶體122儲存有第一韌體映像檔(firmware image),外部記憶體11儲存有第二韌體映像檔,並且此兩個韌體映像檔可分別帶有系統單晶片12中各個構件或電子電路的設定及/或驅動程式。第一韌體映像檔與第二韌體映像檔可以相同也可以不相同。舉例來說,第二韌體映像檔可以是第一韌體 映像檔的備份(backup)。或者,第一韌體映像檔與第二韌體映像檔也可以是不同版本的韌體映像檔(例如,驅動程式版本不同等等),視實務上的需求而定。 In this embodiment, the read-only memory 122 stores a first firmware image, the external memory 11 stores a second firmware image, and the two firmware images can respectively have a system. Setting and/or driving of individual components or electronic circuits in the single wafer 12. The first firmware image may or may not be the same as the second firmware image. For example, the second firmware image may be the first firmware Backup of the image file. Alternatively, the first firmware image and the second firmware image may also be different versions of the firmware image (for example, different driver versions, etc.), depending on practical requirements.

當儲存於唯讀記憶體122中的第一韌體映像檔損毀或處理器128無法完整對第一韌體映像檔進行讀取時,處理器128改為讀取外部記憶體11中的第二韌體映像檔,並利用第二韌體映像檔對系統單晶片11進行開機程序。 When the first firmware image stored in the read-only memory 122 is corrupted or the processor 128 cannot completely read the first firmware image, the processor 128 reads the second in the external memory 11 instead. The firmware image file is used to boot the system single chip 11 using the second firmware image.

圖2為根據本案之一實施例所繪示的開機方法。以下將以系統單晶片的開機系統10搭配圖2對此方法進行詳細說明。請同時參照圖1與圖2,在步驟S202中,提供唯讀記憶體122,其中,唯讀記憶體122儲存一第一韌體映像檔。在步驟S204中,提供外部記憶體11,其中,外部記憶體11儲存一第二韌體映像檔。 FIG. 2 is a schematic diagram of a booting method according to an embodiment of the present disclosure. The method will be described in detail below with the system single-chip booting system 10 in conjunction with FIG. 2. Referring to FIG. 1 and FIG. 2 simultaneously, in step S202, a read-only memory 122 is provided, wherein the read-only memory 122 stores a first firmware image. In step S204, the external memory 11 is provided, wherein the external memory 11 stores a second firmware image.

在步驟S206中,當處理器128偵測到一開機訊號或偵測到系統單晶片12通電時,處理器128可以自唯讀記憶體122中讀取第一韌體映像檔。然後,在步驟S208中,處理器128驗證第一韌體映像檔是否為正常或完整的韌體映像檔。 In step S206, when the processor 128 detects a power-on signal or detects that the system single chip 12 is powered on, the processor 128 can read the first firmware image from the read-only memory 122. Then, in step S208, the processor 128 verifies whether the first firmware image is a normal or complete firmware image.

若此第一韌體映像檔為正常的韌體映像檔或完整的,在步驟S210中,處理器128讀取第一韌體映像檔進行開機程序。若第一韌體映像檔已毀損或不完整的韌體映像檔,在步驟S212中,處理器128可接續自外部記憶體11讀取並執行第二韌體映像檔。 If the first firmware image is a normal firmware file or is complete, in step S210, the processor 128 reads the first firmware image for booting. If the first firmware image has corrupted or incomplete firmware image, the processor 128 can continue to read and execute the second firmware image from the external memory 11 in step S212.

然後,在步驟S214中,處理器128驗證第二韌體映像檔是否為合法或完整的。若第二韌體映像檔為合法或完整的,在步 驟S214中,處理器128執行第二韌體映像檔進行開機程序。 Then, in step S214, the processor 128 verifies whether the second firmware image is legal or complete. If the second firmware image is legal or complete, in step In step S214, the processor 128 executes the second firmware image to perform the booting process.

在步驟S216中,若第二韌體映像檔為不完整或不合法的韌體映像檔時,處理器128可執行儲存於唯讀記憶體122的一基本開機程序,以在有限的條件下將系統單晶片12開機。特別是,若處理器128僅是利用基本開機程序將系統單晶片12開機,可能會導致系統單晶片12中的多數構件及/或電子電路沒有被完整的驅動(因為詳細的設定及/或驅動資訊是定義於韌體映像檔中),並使得系統單晶片12可提供的功能大幅地縮減。 In step S216, if the second firmware image is an incomplete or illegal firmware image, the processor 128 may execute a basic boot process stored in the read-only memory 122 to be under limited conditions. The system single chip 12 is powered on. In particular, if the processor 128 only turns on the system single chip 12 using the basic boot process, most of the components and/or electronic circuits in the system single chip 12 may not be fully driven (because of detailed settings and/or drivers). The information is defined in the firmware image and greatly reduces the functionality that the system single chip 12 can provide.

圖3為根據本案之一實施例所繪示的儲存韌體映像檔的示意圖。請參照圖3,第一儲存區31位於唯讀記憶體122,第二儲存區32位於外部記憶體11。第一儲存區31用以儲存第一韌體映像檔與第一輔助資訊,第二儲存區32用以儲存第二韌體映像檔與第二輔助資訊。 FIG. 3 is a schematic diagram of a storage firmware image file according to an embodiment of the present disclosure. Referring to FIG. 3, the first storage area 31 is located in the read-only memory 122, and the second storage area 32 is located in the external memory 11. The first storage area 31 is configured to store the first firmware image and the first auxiliary information, and the second storage area 32 is configured to store the second firmware image and the second auxiliary information.

詳細而言,第一儲存區31可包括晶片功能儲存區312、韌體映像檔儲存區314以及韌體資訊儲存區316。晶片功能儲存區312用來儲存系統單晶片12的一些額外設定資訊,例如系統單晶片12中各元件的電源(power)設定等等。韌體映像檔儲存區314用來儲存第一韌體映像檔。韌體資訊儲存區316用來儲存與第一韌體映像檔有關的使用者自訂資訊,例如,使用者名稱、使用者自訂的字串(string)及/或超時(time out)設定等等。 In detail, the first storage area 31 may include a wafer function storage area 312, a firmware image storage area 314, and a firmware information storage area 316. The wafer function storage area 312 is used to store some additional setting information of the system single chip 12, such as power settings of various components in the system single chip 12, and the like. The firmware image storage area 314 is used to store the first firmware image. The firmware information storage area 316 is used to store user-defined information related to the first firmware image, such as a user name, a user-defined string, and/or a time out setting. and many more.

晶片功能儲存區312與韌體資訊儲存區316即儲存有第一輔助資訊。相類似地,第二儲存區32也可包括晶片功能儲存區 322、韌體映像檔儲存區324以及韌體資訊儲存區326,其中晶片功能儲存區322用來儲存系統單晶片12的一些額外設定資訊,韌體映像檔儲存區324用來儲存第二韌體映像檔,並且韌體資訊儲存區326用來儲存與第二韌體映像檔有關的使用者自訂資訊。晶片功能儲存區322與韌體資訊儲存區326即儲存有第二輔助資訊。然而,本案之實施例並不以此為限。 The chip function storage area 312 and the firmware information storage area 316 store the first auxiliary information. Similarly, the second storage area 32 may also include a wafer function storage area. 322. The firmware image storage area 324 and the firmware information storage area 326, wherein the chip function storage area 322 is used to store some additional setting information of the system single chip 12, and the firmware image storage area 324 is used to store the second firmware. The image file and the firmware information storage area 326 are used to store user-defined information related to the second firmware image. The chip function storage area 322 and the firmware information storage area 326 store the second auxiliary information. However, the embodiments of the present invention are not limited thereto.

在本案中,唯讀記憶體122與/或外部記憶體11還可以包括其他的儲存區以儲存其他的韌體映像檔(例如,第三韌體映像檔)及/或輔助資訊(例如,第三輔助資訊)等等。 In the present case, the read-only memory 122 and/or the external memory 11 may also include other storage areas for storing other firmware images (eg, third firmware images) and/or auxiliary information (eg, Three auxiliary information) and so on.

此外,圖4為根據本案之實施例所繪示的韌體映像檔之格式的示意圖。請參照圖4,以儲存第一韌體映像檔的韌體映像檔儲存區314為例,韌體映像檔儲存區314包括映像檔長度欄位41、映像檔位元碼(binary code)欄位42、簽章(signature)欄位43、檢查總和(checksum)欄位44以及校驗碼欄位45。 In addition, FIG. 4 is a schematic diagram of a format of a firmware image file according to an embodiment of the present disclosure. Referring to FIG. 4, for example, the firmware image storage area 314 storing the first firmware image includes the image length field 41 and the binary code field. 42. Signature field 43, checksum field 44 and check code field 45.

映像檔長度欄位41用來儲存第一韌體映像檔的長度資訊,並且此長度資訊可用來查詢其他欄位的資訊(例如,各欄位的起始位址或位元數)。位元碼欄位42用來儲存第一韌體映像檔的映像檔位元碼(以下統稱為第一映像檔位元碼),也就是第一韌體映像檔的程式主體。簽章欄位43用來儲存第一韌體映像檔的簽章(以下統稱為第一簽章),檢查總和欄位44用來儲存第一韌體映像檔的檢查總和,以及校驗碼欄位45用來儲存第一韌體映像檔的校驗碼(以下統稱為第一校驗碼)。在本實施例中,校驗碼例如 是循環冗餘校驗(Cyclic redundancy check,CRC),但可視實務上的需求改變校驗碼的種類。在本實施例中,韌體映像檔儲存區314及各個欄位的長度皆可以視實務上的需求加以調整。 The image length field 41 is used to store the length information of the first firmware image, and the length information can be used to query information of other fields (for example, the starting address or the number of bits of each field). The bit code field 42 is used to store the image file bit code of the first firmware image (hereinafter collectively referred to as the first image file bit code), that is, the program body of the first firmware image file. The signature field 43 is used to store the signature of the first firmware image (hereinafter collectively referred to as the first signature), and the checksum field 44 is used to store the checksum of the first firmware image and the check code column. Bit 45 is used to store the check code of the first firmware image (hereinafter collectively referred to as the first check code). In this embodiment, the check code is for example It is a Cyclic Redundancy Check (CRC), but the type of check code is changed according to the requirements of the actual practice. In this embodiment, the firmware image storage area 314 and the length of each field can be adjusted according to practical requirements.

特別是,簽章欄位43中第一韌體映像檔的簽章,檢查總和欄位44中第一韌體映像檔的檢查總和,以及校驗碼欄位45中第一韌體映像檔的校驗碼可同時或單獨用來驗證第一韌體映像檔是否合法或者是否完整。此外,第二韌體映像檔與韌體映像檔儲存區324的格式可從上述第一韌體映像檔與韌體映像檔儲存區314類推,在此便不贅述。 In particular, the signature of the first firmware image in the signature field 43, the sum of the checks of the first firmware image in the sum field 44, and the first firmware image in the check code field 45. The check code can be used simultaneously or separately to verify that the first firmware image is legal or complete. In addition, the format of the second firmware image file and the firmware image file storage area 324 can be analogized from the first firmware image file and the firmware image file storage area 314, and details are not described herein.

詳細而言,圖5為根據本案實施例所繪示的開機方法的流程圖。請同時參照圖1與圖5,在步驟S502中,處理器128偵測一開機訊號或驗證系統單晶片12是否通電。若處理器128偵測到開機訊號或系統單晶片12已通電,處理器128可自唯讀記憶體122讀取第一韌體映像檔中的第一簽章(例如,從圖4的簽章欄位43)。 In detail, FIG. 5 is a flowchart of a booting method according to an embodiment of the present disclosure. Referring to FIG. 1 and FIG. 5 simultaneously, in step S502, the processor 128 detects a boot signal or verifies whether the system single chip 12 is powered. If the processor 128 detects the power-on signal or the system single chip 12 is powered on, the processor 128 can read the first signature in the first firmware image from the read-only memory 122 (eg, from the signature of FIG. 4) Field 43).

以圖3為例,處理器128可從唯讀記憶體122中的位址0X0080開始讀取韌體映像檔儲存區314中的資訊。接著,在步驟S506中,處理器128從唯讀記憶體122中讀取預先儲存的一驗證簽章,並驗證第一簽章是否與此驗證簽章相同。若第一簽章與此驗證簽章相同,則在步驟S508中,處理器128自唯讀記憶體122讀取第一韌體映像檔中的第一校驗碼與第一映像檔位元碼(例如,從圖4的校驗碼欄位45與映像檔位元碼欄位42),將第一校 驗碼儲存於資料記憶體124,並將第一映像檔位元碼儲存於可程式記憶體126。 Taking FIG. 3 as an example, the processor 128 can read the information in the firmware image storage area 314 from the address 0X0080 in the read-only memory 122. Next, in step S506, the processor 128 reads a pre-stored verification signature from the read-only memory 122 and verifies whether the first signature is identical to the verification signature. If the first signature is the same as the verification signature, in step S508, the processor 128 reads the first verification code and the first image file in the first firmware image from the read-only memory 122. (for example, from the check code field 45 of Figure 4 and the image file size field 42), the first school will be The code is stored in the data memory 124, and the first image file is stored in the programmable memory 126.

然後,在步驟S510中,處理器128根據第一映像檔位元碼計算第一評估碼。接著,在步驟S512中,處理器128驗證第一評估碼是否與第一校驗碼相同。若第一評估碼與第一校驗碼相同,表示第一韌體映像檔為正常的韌體映像檔或完整的,因此,在步驟S514中,處理器128執行儲存於可程式記憶體126中第一韌體映像檔的第一映像檔位元碼進行開機程序。 Then, in step S510, the processor 128 calculates a first evaluation code based on the first mapped gear bit code. Next, in step S512, the processor 128 verifies whether the first evaluation code is the same as the first verification code. If the first evaluation code is the same as the first verification code, it indicates that the first firmware image is a normal firmware image or is complete. Therefore, in step S514, the processor 128 executes the storage in the programmable memory 126. The first image file of the first firmware image is booted.

此外,在步驟S506中,若第一簽章與驗證簽章不相同,或者在步驟S512中,若第一評估碼與第一校驗碼不相同,表示第一韌體映像檔已毀損或完整的。因此,在步驟S516中,處理器128可以接續自外部記憶體11讀取第二韌體映像檔中的簽章(以下統稱為第二簽章),並將第二簽章儲存於資料記憶體124。 In addition, in step S506, if the first signature is different from the verification signature, or in step S512, if the first evaluation code is different from the first verification code, it indicates that the first firmware image is damaged or complete. of. Therefore, in step S516, the processor 128 can continue to read the signature in the second firmware image from the external memory 11 (hereinafter collectively referred to as the second signature), and store the second signature in the data memory. 124.

以圖3為例,處理器128可以從外部記憶體11中的位址0X10080開始讀取韌體映像檔儲存區324中的資訊。然後,在步驟S518中,處理器128同樣驗證第二簽章是否與預先儲存於唯讀記憶體122中的上述驗證簽章相同。若第一簽章與此驗證簽章相同,則在步驟S520中,處理器128自外部記憶體11讀取第二韌體映像檔中的校驗碼(以下統稱為第二校驗碼)與映像檔位元碼(以下統稱為第二映像檔位元碼),將第二校驗碼儲存於資料記憶體124,並將第二映像檔位元碼儲存於可程式記憶體126。 Taking FIG. 3 as an example, the processor 128 can read the information in the firmware image storage area 324 from the address 0X10080 in the external memory 11. Then, in step S518, the processor 128 also verifies whether the second signature is identical to the verification signature previously stored in the read-only memory 122. If the first signature is the same as the verification signature, the processor 128 reads the verification code (hereinafter collectively referred to as the second verification code) in the second firmware image from the external memory 11 in step S520. The image file element code (hereinafter collectively referred to as the second image file bit code) stores the second check code in the data memory 124 and stores the second image file in the programmable memory 126.

然後,在步驟S522中,處理器128根據第二映像檔位元 碼計算第二評估碼。接著,在步驟S524中,處理器128驗證第二評估碼是否與第二校驗碼相同。若第二評估碼與第二校驗碼相同,表示第二韌體映像檔為合法或完整的,因此,在步驟S526中,處理器128執行儲存於可程式記憶體126中第二韌體映像檔的第二映像檔位元碼進行開機程序。 Then, in step S522, the processor 128 is based on the second image file bit. The code calculates a second evaluation code. Next, in step S524, the processor 128 verifies whether the second evaluation code is the same as the second verification code. If the second evaluation code is the same as the second verification code, indicating that the second firmware image is legal or complete, therefore, in step S526, the processor 128 executes the second firmware image stored in the programmable memory 126. The second image file of the file is used to start the program.

此外,在步驟S518中,若第二簽章與驗證簽章不相同,或者在步驟S524中,若第二評估碼與第二校驗碼不相同,表示第二韌體映像檔驗證失敗或不是完整的,因此,在步驟S528中,處理器128會執行儲存於唯讀記憶體122中的基本開機程序。 In addition, in step S518, if the second signature is different from the verification signature, or in step S524, if the second evaluation code is different from the second verification code, indicating that the second firmware image verification fails or is not Complete, therefore, in step S528, the processor 128 executes the basic boot process stored in the read only memory 122.

在本實施例中,處理器128還會將一重試次數記錄於資料記憶體124,並且在每次偵測到開機訊號或系統單晶片12通電時,將此重試次數初始化(例如,歸零)。在第一韌體映像檔的驗證階段中,若處理器128驗證第一韌體映像檔已毀損,則處理器128可根據此重試次數判斷是重複執行對於第一韌體映像檔的驗證,或者切換至第二韌體映像檔的驗證階段。在第二韌體映像檔的證階段中,處理器128同樣可根據此重試次數判斷是重複執行對於第二韌體映像檔的驗證,或者切換至執行基本開機程序。 In this embodiment, the processor 128 also records a number of retries in the data memory 124, and initializes the number of retries each time the power-on signal is detected or the system single chip 12 is powered on (for example, zeroing) ). In the verification phase of the first firmware image, if the processor 128 verifies that the first firmware image has been corrupted, the processor 128 may determine, according to the number of retries, that the verification of the first firmware image is repeated. Or switch to the verification phase of the second firmware image. In the verification phase of the second firmware image, the processor 128 can also determine, based on the number of retries, whether the verification of the second firmware image is repeated or to perform the basic boot process.

此外,在本實施例中,若處理器128決定執行第一韌體映像檔進行開機程序,則處理器128也可自唯讀記憶體122讀取上述第一輔助資料,以根據此第一輔助資料執行對於系統單晶片12的第一設定操作。以圖3為例,第一輔助資料例如是儲存於晶片功能儲存區312及/或韌體資訊儲存區316的資料。 In addition, in this embodiment, if the processor 128 determines to execute the first firmware image to perform the booting process, the processor 128 may also read the first auxiliary data from the read-only memory 122, according to the first auxiliary. The data performs a first set operation for the system single chip 12. Taking FIG. 3 as an example, the first auxiliary data is, for example, data stored in the chip function storage area 312 and/or the firmware information storage area 316.

若處理器128決定執行第二韌體映像檔進行開機程序,則處理器128也可自外部記憶體11讀取第二輔助資料,以根據此第二輔助資料執行對於系統單晶片12的第二設定操作。以圖3為例,此第二輔助資料例如是儲存於晶片功能儲存區322及/或韌體資訊儲存區326的資料。此外,此第一設定操作與第二設定操作例如是針對系統單晶片12的電源等硬體相關資源進行的額外設定,或在系統中加入使用者自訂的名稱或字串等等。 If the processor 128 determines to execute the second firmware image to perform the boot process, the processor 128 may also read the second auxiliary data from the external memory 11 to execute the second for the system single chip 12 according to the second auxiliary data. Set the operation. For example, in FIG. 3, the second auxiliary material is, for example, data stored in the chip function storage area 322 and/or the firmware information storage area 326. In addition, the first setting operation and the second setting operation are, for example, additional settings for hardware related resources such as power supply of the system single chip 12, or adding a user-defined name or string or the like to the system.

此外,在一實施例中,外部記憶體11還可儲存一第三韌體映像檔。若處理器128驗證第二韌體映像檔,且驗證失敗時,處理器128可自外部記憶體11讀取此第三韌體映像檔,並驗證此第三韌體映像檔是否為合法或完整的。 In addition, in an embodiment, the external memory 11 can also store a third firmware image. If the processor 128 verifies the second firmware image and the verification fails, the processor 128 can read the third firmware image from the external memory 11 and verify whether the third firmware image is legal or complete. of.

若此第三韌體映像檔為合法或完整的,則處理器128執行此第三韌體映像檔進行開機程序。若處理器128驗證此第三韌體映像檔同樣驗證失敗或完整的,則執行基本開機程序。 If the third firmware image is legal or complete, the processor 128 executes the third firmware image to perform the boot process. If the processor 128 verifies that the third firmware image is also failed to verify or is complete, then the basic boot process is performed.

在本實施例中,處理器128也可接收來自一輸入介面的更新指令,並根據此更新指令更新儲存於外部記憶體11的第二韌體映像檔,或新增一第三韌體映像檔於外部記憶體11中。舉例來說,假設系統單晶片12為支援USB 3.0的系統單晶片,則系統單晶片12會包括一USB介面,並且處理器128可接收來自此USB介面的更新指令。例如,此更新指令可包括一寫入指令與一新的韌體映像檔。 In this embodiment, the processor 128 can also receive an update command from an input interface, and update the second firmware image stored in the external memory 11 according to the update command, or add a third firmware image. In the external memory 11. For example, assuming that the system single chip 12 is a system single chip supporting USB 3.0, the system single chip 12 will include a USB interface, and the processor 128 can receive an update command from the USB interface. For example, the update command can include a write command and a new firmware image.

在處理器128接收到此更新指令之後,處理器128可根 據此更新指令中的寫入指令選定外部記憶體11中的一個或多個韌體映像檔,並以此新的韌體映像檔更新被選定的一個或多個韌體映像檔。以圖3為例,若此寫入指令指定以一新的韌體映像檔更新儲存於外部記憶體11的韌體映像檔儲存區324中的韌體映像檔,則處理器128可從外部記憶體11中的位址0x10080開始將此新的韌體映像檔覆蓋於韌體映像檔儲存區314中。 After the processor 128 receives the update instruction, the processor 128 may root One or more firmware images in the external memory 11 are selected in accordance with the write command in the update command, and the selected one or more firmware images are updated with the new firmware image. Taking FIG. 3 as an example, if the write command specifies to update the firmware image stored in the firmware image storage area 324 of the external memory 11 with a new firmware image, the processor 128 can externally memorize. Address 0x10080 in volume 11 begins to overlay this new firmware image in firmware image file storage area 314.

此外,處理器128也可根據此更新指令同時或單獨更新儲存於外部記憶體11之晶片功能儲存區322、韌體映像檔儲存區324及/或韌體資訊儲存區326中的資訊,以提升本發明使用上的彈性。 In addition, the processor 128 can also update the information stored in the chip function storage area 322, the firmware image storage area 324, and/or the firmware information storage area 326 of the external memory 11 simultaneously or separately according to the update instruction. The elasticity of use of the present invention.

值得一提的是,上述第一韌體映像檔與第二韌體映像檔儲存在外部記憶體11及/或唯讀記憶體122中的位址,也可以是在系統單晶片12的開機過程中,由處理器128適應性地決定。換言之,以圖3為例,處理器128實際上可將儲存於第一儲存區31的韌體映像檔視為第一韌體映像檔,並將儲存於第二儲存區32的韌體映像檔視為第二韌體映像檔。或者,處理器128也可將儲存於第二儲存區32的韌體映像檔視為第一韌體映像檔,並將儲存於第一儲存區31的韌體映像檔視為第二韌體映像檔,視不同的情況而可以有不同的選擇。 It is worth mentioning that the address of the first firmware image and the second firmware image stored in the external memory 11 and/or the read-only memory 122 may also be the boot process of the system single chip 12. The processor 128 is adaptively determined. In other words, taking FIG. 3 as an example, the processor 128 can actually treat the firmware image stored in the first storage area 31 as the first firmware image and the firmware image stored in the second storage area 32. Considered as the second firmware image. Alternatively, the processor 128 may also regard the firmware image stored in the second storage area 32 as the first firmware image and the firmware image stored in the first storage area 31 as the second firmware image. File, depending on the situation, can have different options.

舉例來說,在一實施例中,當處理器128更新儲存於外部記憶體11中的韌體映像檔時,處理器128可同步更新儲存於外部記憶體11中的一韌體更新資訊。然後,在系統單晶片12的開 機過程中,處理器128可以查詢此韌體更新資訊,並根據此韌體更新資訊決定第一韌體映像檔與第二韌體映像檔的位址。例如,透過查詢此韌體更新資訊,處理器128可從唯讀記憶體122中的一個或多個韌體映像檔中選擇版本最新或讀取優先順序最高的韌體映像檔作為上述第一韌體映像檔而優先讀取並驗證,並從外部記憶體11中的一個或多個韌體映像檔中選擇版本最新或讀取優先順序最高的韌體映像檔作為上述第二韌體映像檔等等。而在版本最新或讀取優先順序最高的第一及/或第二韌體映像檔驗證失敗之後,處理器128同樣可根據此韌體更新資訊讀取其他的韌體映像檔,並重複上述驗證動作,在此不一一贅述。 For example, in an embodiment, when the processor 128 updates the firmware image stored in the external memory 11, the processor 128 can synchronously update a firmware update information stored in the external memory 11. Then, on the system single chip 12 During the process, the processor 128 can query the firmware update information, and determine the address of the first firmware image and the second firmware image according to the firmware update information. For example, by querying the firmware update information, the processor 128 may select the firmware version file with the latest version or the highest reading priority from the one or more firmware images in the read-only memory 122 as the first toughness. The image file is preferentially read and verified, and the firmware image with the latest version or the highest reading priority is selected from one or more firmware images in the external memory 11 as the second firmware image, etc. Wait. After the verification of the first and/or second firmware image with the latest version or the highest read priority, the processor 128 can also read other firmware images according to the firmware update information, and repeat the above verification. Actions are not repeated here.

此外,此韌體更新資訊也可以是由處理器128根據使用者的操作而加以設定,例如定義各個韌體映像檔的讀取優先順序等等。 In addition, the firmware update information may also be set by the processor 128 according to the user's operation, such as defining a read priority order of each firmware image file, and the like.

特別是,上述韌體更新資訊還可以包括各個韌體映像檔儲存區中的韌體映像檔之更新時間等各種識別資訊。藉此,處理器128可根據此韌體更新資訊將外部記憶體11中更新時間較晚的韌體映像檔作為第二韌體映像檔,並將外部記憶體11中更新時間較早的韌體映像檔作為第二韌體映像檔驗證失敗之後讀取的第三韌體映像檔等等,本發明不對其限制。 In particular, the firmware update information may further include various identification information such as an update time of the firmware image file in each firmware image storage area. In this way, the processor 128 can use the firmware update file in the external memory 11 as the second firmware image as the second firmware image according to the firmware update information, and update the firmware in the external memory 11 with an earlier update time. The image file is the third firmware image file read after the failure of the second firmware image verification, and the like, and the present invention is not limited thereto.

綜上所述,本發明的系統單晶片及其開機方法,可預先提供兩個或兩個以上的韌體映像檔,以在系統單晶片的開機過程中,載入合法及/或完整的韌體映像檔以完成開機程序。 In summary, the system single chip of the present invention and the booting method thereof can provide two or more firmware images in advance to load legal and/or complete toughness during the booting process of the system single chip. The image file is used to complete the boot process.

雖然本發明已以實施例揭露如上,然其並非用以限定本發明,任何所屬技術領域中具有通常知識者,在不脫離本發明的精神和範圍內,當可作些許的更動與潤飾,故本發明的保護範圍當視後附的申請專利範圍所界定者為準。 Although the present invention has been disclosed in the above embodiments, it is not intended to limit the present invention, and any one of ordinary skill in the art can make some changes and refinements without departing from the spirit and scope of the present invention. The scope of the invention is defined by the scope of the appended claims.

S202~S218‧‧‧步驟 S202~S218‧‧‧Steps

Claims (17)

一種系統單晶片,耦接一外部記憶體,該系統單晶片包括:一唯讀記憶體,用以儲存一第一韌體映像檔;一處理器,耦接該唯讀記憶體,用以自該唯讀記憶體讀取該第一韌體映像檔,並驗證該第一韌體映像檔之狀態,若該第一韌體映像檔為正常狀態,該處理器執行該第一韌體映像檔以進行一開機程序,若該第一韌體映像檔為已毀損狀態,該處理器自該外部記憶體讀取一第二韌體映像檔,並驗證該第二韌體映像檔是否合法;若該第二韌體映像檔驗證為合法,該處理器執行該第二韌體映像檔以執行該開機程序。 A system single chip coupled to an external memory, the system single chip includes: a read-only memory for storing a first firmware image; and a processor coupled to the read-only memory for self- The read-only memory reads the first firmware image and verifies the state of the first firmware image. If the first firmware image is in a normal state, the processor executes the first firmware image. To perform a booting process, if the first firmware image is in a corrupted state, the processor reads a second firmware image from the external memory, and verifies whether the second firmware image is legal; The second firmware image is verified to be legitimate, and the processor executes the second firmware image to execute the boot process. 如申請專利範圍第1項所述的系統單晶片,其中該處理器自該唯讀記憶體讀取該第一韌體映像檔中的一第一簽章,並判斷該第一簽章是否與預設的一驗證簽章相同,若該第一簽章與該驗證簽章不相同,該處理器判定該第一韌體映像檔為已毀損韌體映像檔。 The system single chip of claim 1, wherein the processor reads a first signature in the first firmware image from the read-only memory, and determines whether the first signature is The preset verification signature is the same. If the first signature is different from the verification signature, the processor determines that the first firmware image is a corrupted firmware image. 如申請專利範圍第2項所述的系統單晶片,其中若該第一簽章與該驗證簽章相同,該處理器自該唯讀記憶體讀取該第一韌體映像檔中的一第一校驗碼與一第一映像檔位元碼,根據該第一映像檔位元碼計算一第一評估碼,並驗證該第一評估碼是否與該第一校驗碼相同,其中若該第一評估碼與該第一校驗碼相同,該處理器判定該 第一韌體映像檔為正常的韌體映像檔的。 The system single chip of claim 2, wherein if the first signature is the same as the verification signature, the processor reads a first one of the first firmware images from the read-only memory. a check code and a first image file bit code, calculating a first evaluation code according to the first image file bit code, and verifying whether the first evaluation code is the same as the first verification code, wherein The first evaluation code is the same as the first verification code, and the processor determines that The first firmware image is a normal firmware image. 如申請專利範圍第1項所述的系統單晶片,其中該處理器自該外部記憶體讀取該第二韌體映像檔中的一第二簽章,並驗證該第二簽章是否與預設的一驗證簽章相同,其中若該第二簽章與該驗證簽章不相同,該處理器判定該第二韌體映像檔驗證失敗。 The system single chip of claim 1, wherein the processor reads a second signature from the external firmware from the external memory and verifies whether the second signature is The verification signature is the same, wherein if the second signature is different from the verification signature, the processor determines that the second firmware image verification fails. 如申請專利範圍第4項所述的系統單晶片,其中若該第二簽章與該驗證簽章相同,該處理器自該外部記憶體讀取該第二韌體映像檔中的一第二校驗碼與一第二映像檔位元碼,根據該第二映像檔位元碼計算一第二評估碼,並判斷該第二評估碼是否與該第二校驗碼相同,其中若該第二評估碼與該第二校驗碼相同,該處理器判定該第二韌體映像檔驗證成功。 The system single chip of claim 4, wherein if the second signature is the same as the verification signature, the processor reads a second one of the second firmware images from the external memory. a check code and a second image file bit code, calculating a second evaluation code according to the second image file bit code, and determining whether the second evaluation code is the same as the second verification code, wherein the first The second evaluation code is the same as the second verification code, and the processor determines that the second firmware image is successfully verified. 如申請專利範圍第1項所述的系統單晶片,其中該處理器更根據一更新指令,更新儲存於該外部記憶體的該第二韌體映像檔,或新增一第三韌體映像檔於該外部記憶體中。 The system single chip of claim 1, wherein the processor further updates the second firmware image stored in the external memory according to an update command, or adds a third firmware image. In the external memory. 如申請專利範圍第1項所述的系統單晶片,其中該唯讀記憶體具有一第一儲存區,該第一儲存區儲存有該第一韌體映像檔與一第一輔助資料,該外部記憶體具有一第二儲存區,並且該第二儲存區儲存有該第二韌體映像檔與一第二輔助資料,其中若該處理器執行該第一韌體映像檔執行該開機程序,該處理器自該唯讀記憶體讀取該第一輔助資料,以根據該第一輔助資料執行對於該系統單晶片的一第一設定操作, 其中若該處理器執行該第二韌體映像檔執行該開機程序,該處理器更自該外部記憶體讀取該第二輔助資料,以根據該第二輔助資料執行對於該系統單晶片的一第二設定操作。 The system single chip of claim 1, wherein the read-only memory has a first storage area, the first storage area stores the first firmware image and a first auxiliary material, the external The memory has a second storage area, and the second storage area stores the second firmware image and a second auxiliary data, wherein if the processor executes the first firmware image to execute the booting process, the The processor reads the first auxiliary data from the read-only memory to perform a first setting operation on the single-chip of the system according to the first auxiliary data, If the processor executes the booting process by executing the second firmware image, the processor further reads the second auxiliary data from the external memory to perform one for the single chip of the system according to the second auxiliary data. The second setting operation. 如申請專利範圍第1項所述的系統單晶片,其中該外部記憶體儲存一第三韌體映像檔,其中若該第二韌體映像檔驗證失敗,該處理器自該外部記憶體讀取該第三韌體映像檔,並驗證該第三韌體映像檔是否為合法的,其中若該第三韌體映像檔驗證成功,該處理器執行該第三韌體映像檔執行該開機程序。 The system single chip of claim 1, wherein the external memory stores a third firmware image, wherein the processor reads from the external memory if the second firmware image fails to be verified. The third firmware image file and verifying whether the third firmware image file is legal. If the third firmware image file is successfully verified, the processor executes the third firmware image file to execute the booting process. 一種開機方法,適用於一系統單晶片,該系統單晶片包括一處理器,該開機方法包括:提供一唯讀記憶體,其中該唯讀記憶體儲存一第一韌體映像檔;提供一外部記憶體,其中該外部記憶體儲存一第二韌體映像檔;由該處理器自該唯讀記憶體讀取該第一韌體映像檔,並驗證該第一韌體映像檔之狀態;若該第一韌體映像檔為正常的狀態,執行該第一韌體映像檔進行一開機程序;若該第一韌體映像檔為已毀損狀態,自該外部記憶體讀取該第二韌體映像檔,並驗證該第二韌體映像檔是否為合法的;以及若該第二韌體映像檔驗證成功,執行該第二韌體映像檔執行 該開機程序。 A booting method is applicable to a system single chip, the system single chip includes a processor, the booting method includes: providing a read-only memory, wherein the read-only memory stores a first firmware image; providing an external a memory, wherein the external memory stores a second firmware image; the processor reads the first firmware image from the read-only memory, and verifies the state of the first firmware image; The first firmware image is in a normal state, and the first firmware image is executed to perform a booting process; if the first firmware image is in a damaged state, the second firmware is read from the external memory. An image file and verifying whether the second firmware image file is legal; and if the second firmware image file is successfully verified, executing the second firmware image file execution The boot process. 如申請專利範圍第9項所述的開機方法,其中該處理器自該唯讀記憶體讀取該第一韌體映像檔,並驗證該第一韌體映像檔是否已毀損之步驟包括:自該唯讀記憶體讀取該第一韌體映像檔中的一第一簽章;驗證該第一簽章是否與預設的一驗證簽章相同;以及若該第一簽章與該驗證簽章不相同,判定該第一韌體映像檔已毀損。 The booting method of claim 9, wherein the processor reads the first firmware image from the read-only memory and verifies whether the first firmware image has been damaged: The read-only memory reads a first signature in the first firmware image; verifies whether the first signature is the same as a preset verification signature; and if the first signature is signed with the verification signature The chapter is different, and it is determined that the first firmware image has been corrupted. 如申請專利範圍第10項所述的開機方法,其中由該處理器自該唯讀記憶體讀取該第一韌體映像檔,並驗證該第一韌體映像檔是否已毀損之步驟更包括:若該第一簽章與該驗證簽章相同,自該唯讀記憶體讀取該第一韌體映像檔中的一第一校驗碼與一第一映像檔位元碼;根據該第一映像檔位元碼計算一第一評估碼;驗證該第一評估碼是否與該第一校驗碼相同;以及若該第一評估碼與該第一校驗碼相同,判定該第一韌體映像檔為正常的韌體映像檔。 The booting method of claim 10, wherein the step of reading, by the processor, the first firmware image from the read-only memory and verifying whether the first firmware image has been corrupted further comprises If the first signature is the same as the verification signature, reading a first verification code and a first mapping location code in the first firmware image from the read-only memory; Calculating a first evaluation code by an image gear bit code; verifying whether the first evaluation code is the same as the first verification code; and determining the first toughness if the first evaluation code is the same as the first verification code The body image is a normal firmware image. 如申請專利範圍第9項所述的開機方法,其中自該外部記憶體讀取該第二韌體映像檔,並驗證該第二韌體映像檔是否為合法的之步驟包括:自該外部記憶體讀取該第二韌體映像檔中的一第二簽章;驗證該第二簽章是否與預設的一驗證簽章相同;以及 若該第二簽章與該驗證簽章不相同,判定該第二韌體映像檔驗證失敗。 The booting method of claim 9, wherein the step of reading the second firmware image from the external memory and verifying whether the second firmware image is legal comprises: from the external memory Reading a second signature in the second firmware image; verifying whether the second signature is the same as a preset verification signature; If the second signature is different from the verification signature, it is determined that the verification of the second firmware image fails. 如申請專利範圍第12項所述的開機方法,其中自該外部記憶體讀取該第二韌體映像檔,並驗證該第二韌體映像檔是否為合法的之步驟更包括:若該第二簽章與該驗證簽章相同,自該外部記憶體讀取該第二韌體映像檔中的一第二校驗碼與一第二映像檔位元碼;根據該第二映像檔位元碼計算一第二評估碼;驗證該第二評估碼是否與該第二校驗碼相同;以及若該第二評估碼與該第二校驗碼相同,判定該第二韌體映像檔驗證成功的。 The booting method of claim 12, wherein the step of reading the second firmware image from the external memory and verifying whether the second firmware image is legal further comprises: if the The second signature is the same as the verification signature, and reads a second verification code and a second image location code in the second firmware image from the external memory; according to the second image file bit The code calculates a second evaluation code; verifies whether the second evaluation code is the same as the second verification code; and if the second evaluation code is the same as the second verification code, determines that the second firmware image is successfully verified of. 如申請專利範圍第9項所述的開機方法,更包括:根據一更新指令,更新儲存於該外部記憶體的該第二韌體映像檔,或新增一第三韌體映像檔於該外部記憶體中。 The booting method of claim 9, further comprising: updating the second firmware image stored in the external memory according to an update command, or adding a third firmware image to the external In memory. 如申請專利範圍第14項所述的開機方法,更包括:同步更新一韌體更新資訊;以及在該系統單晶片的開機過程中,查詢該韌體更新資訊,以根據該韌體更新資訊決定該第一韌體映像檔與該第二韌體映像檔的位址。 For example, the booting method described in claim 14 further includes: synchronously updating a firmware update information; and querying the firmware update information during the booting of the single chip of the system, to determine the firmware update information according to the firmware update information. The address of the first firmware image file and the second firmware image file. 如申請專利範圍第9項所述的開機方法,其中執行該第一韌體映像檔執行該開機程序的步驟包括:自該唯讀記憶體讀取一第一輔助資料,以根據該第一輔助資 料執行對於該系統單晶片的一第一設定操作,其中執行該第二韌體映像檔執行該開機程序的步驟包括:自該外部記憶體讀取一第二輔助資料,以根據該第二輔助資料執行對於該系統單晶片的一第二設定操作。 The booting method of claim 9, wherein the step of executing the first firmware image to execute the booting process comprises: reading a first auxiliary material from the read-only memory, according to the first auxiliary Capital Performing a first setting operation for the single chip of the system, wherein performing the second firmware image to perform the booting process comprises: reading a second auxiliary material from the external memory, according to the second auxiliary The data performs a second set operation for the single wafer of the system. 如申請專利範圍第9項所述的開機方法,更包括:若該第二韌體映像檔驗證失敗,自該外部記憶體讀取一第三韌體映像檔,並驗證該第三韌體映像檔是否為合法的;以及若該第三韌體映像檔驗證成功,執行該第三韌體映像檔執行該開機程序。 The booting method of claim 9, further comprising: if the second firmware image fails to be verified, reading a third firmware image from the external memory, and verifying the third firmware image Whether the file is legal; and if the third firmware image is successfully verified, executing the third firmware image to execute the booting process.
TW102109076A 2012-04-10 2013-03-14 System-on-chip and booting method thereof TWI594188B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/858,112 US9256744B2 (en) 2012-04-10 2013-04-08 System-on-chip and booting method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US201261622017P 2012-04-10 2012-04-10

Publications (2)

Publication Number Publication Date
TW201342238A true TW201342238A (en) 2013-10-16
TWI594188B TWI594188B (en) 2017-08-01

Family

ID=49771470

Family Applications (1)

Application Number Title Priority Date Filing Date
TW102109076A TWI594188B (en) 2012-04-10 2013-03-14 System-on-chip and booting method thereof

Country Status (1)

Country Link
TW (1) TWI594188B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9479331B2 (en) 2014-08-20 2016-10-25 Apple Inc. Managing security in a system on a chip (SOC) that powers down a secure processor
US9619377B2 (en) 2014-05-29 2017-04-11 Apple Inc. System on a chip with always-on processor which reconfigures SOC and supports memory-only communication mode
US9778728B2 (en) 2014-05-29 2017-10-03 Apple Inc. System on a chip with fast wake from sleep
US10031000B2 (en) 2014-05-29 2018-07-24 Apple Inc. System on a chip with always-on processor
TWI763192B (en) * 2020-12-18 2022-05-01 技嘉科技股份有限公司 Electronic device and inspection method for data integrity

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI755695B (en) * 2020-03-12 2022-02-21 智微科技股份有限公司 Boot method for system on chip

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060159023A1 (en) * 2005-01-14 2006-07-20 International Business Machines Corporation CRC error history mechanism
TWI472948B (en) * 2008-11-07 2015-02-11 Socle Technology Corp Control system and a security checking method thereof
TW201027324A (en) * 2009-01-14 2010-07-16 Giga Byte Tech Co Ltd Embedded electronic device free from being stuck in update failure and method of making the same
KR101201622B1 (en) * 2010-08-19 2012-11-14 삼성에스디에스 주식회사 Soc with security function and device and scan method using the same

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9619377B2 (en) 2014-05-29 2017-04-11 Apple Inc. System on a chip with always-on processor which reconfigures SOC and supports memory-only communication mode
US9778728B2 (en) 2014-05-29 2017-10-03 Apple Inc. System on a chip with fast wake from sleep
US10031000B2 (en) 2014-05-29 2018-07-24 Apple Inc. System on a chip with always-on processor
US10261894B2 (en) 2014-05-29 2019-04-16 Apple Inc. System on a chip with always-on processor which reconfigures SOC and supports memory-only communication mode
US10488230B2 (en) 2014-05-29 2019-11-26 Apple Inc. System on a chip with always-on processor
US10571996B2 (en) 2014-05-29 2020-02-25 Apple Inc. System on a chip with fast wake from sleep
US10915160B2 (en) 2014-05-29 2021-02-09 Apple Inc. System on a chip with fast wake from sleep
US11079261B2 (en) 2014-05-29 2021-08-03 Apple Inc. System on a chip with always-on processor
US9479331B2 (en) 2014-08-20 2016-10-25 Apple Inc. Managing security in a system on a chip (SOC) that powers down a secure processor
TWI763192B (en) * 2020-12-18 2022-05-01 技嘉科技股份有限公司 Electronic device and inspection method for data integrity

Also Published As

Publication number Publication date
TWI594188B (en) 2017-08-01

Similar Documents

Publication Publication Date Title
TWI594188B (en) System-on-chip and booting method thereof
US9256744B2 (en) System-on-chip and booting method thereof
TWI525542B (en) System and method for starting and updating UEFI BIOS, recording media and computer program products
US8751783B2 (en) Booting computing devices with EFI aware operating systems
JP2008016020A (en) Method for accelerating execution of bios
WO2012149759A1 (en) Method and device for achieving compatibility of different processors
WO2013013396A1 (en) Method and system for managing bios configuration data of basic input/output system
EP2660713A1 (en) Patch mechanism in embedded controller for memory access
TW201818253A (en) Detection system and detection method
US9348603B2 (en) Electronic apparatus and booting method
TW201314574A (en) Method and device for updating BIOS program for computer system
TWI537826B (en) Booting method of main chip
US9507665B2 (en) Computing device and method for accessing BIOS using middleware controller of the computing device
WO2012155439A1 (en) System and method for bios booting
JP5561791B2 (en) Information processing apparatus, information processing method, and information processing program
US9983885B2 (en) BIOS system with non-volatile data memory
US9311075B2 (en) Electronic apparatus and BIOS updating apparatus thereof
TWI556172B (en) Computer and booting method thereof
JP6264948B2 (en) Information processing apparatus, hardware test control method, and program
TW201430702A (en) Method and system for updating firmware
TWI544392B (en) Capacitive touch electronic apparatus, touch control device, and mode selection method for the capacitive touch electronic apparatus
TWI684114B (en) Configuration method and system of general purpose input/output
JP5333262B2 (en) Processing device, BIOS update method, and BIOS update program
TWI796178B (en) Electronic device and method for patching code
JP2009093270A (en) Computer system and startup method therefor