CN101122862B - After-startup patch type safe upgrading BIOS method - Google Patents

After-startup patch type safe upgrading BIOS method Download PDF

Info

Publication number
CN101122862B
CN101122862B CN2006100300317A CN200610030031A CN101122862B CN 101122862 B CN101122862 B CN 101122862B CN 2006100300317 A CN2006100300317 A CN 2006100300317A CN 200610030031 A CN200610030031 A CN 200610030031A CN 101122862 B CN101122862 B CN 101122862B
Authority
CN
China
Prior art keywords
upgrading
bios
space
code
updating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006100300317A
Other languages
Chinese (zh)
Other versions
CN101122862A (en
Inventor
郁凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitac International Corp
Original Assignee
Mitac International Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitac International Corp filed Critical Mitac International Corp
Priority to CN2006100300317A priority Critical patent/CN101122862B/en
Publication of CN101122862A publication Critical patent/CN101122862A/en
Application granted granted Critical
Publication of CN101122862B publication Critical patent/CN101122862B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)

Abstract

The present invention discloses a post-startup patching method of BIOS security updating. The method includes the following the steps: an updating space in BIOS is released for the storage of updating codes and whether the present space is updating space is checked. If there is, the updating codes in the updating space is imprinted and an update switch is added to the CMOS user settings which judges whether to activate the updating codes. A checkpoint is added, which detects the submodules which need updating before the main code of Bios calls every function code. Whether the update switch of the CMOS user setting is on is checked. If the update switch is on, whether there are submodules in the function codes is checked which needs updating or not from the check point. If there is, the updating space for the storage of updating codes is entered, and the codes corresponding with the submodules needing updating is found and called to update BIOS, which in deed updates BIOS files with security and high efficiency.

Description

The method of after-startup patch type safe upgrading BIOS
[technical field]
The present invention is meant a kind of method of after-startup patch type safe upgrading BIOS especially about a kind of method of safe upgrading BIOS.
[background technology]
Owing to still can have the bug of software after most of mainboard shipment, need upgrading BIOS reparation.Yet; Because the BIOS chip of volume production mainboard is welded on the mainboard and can't dismantles; So the mainboard upgrading for volume production is the risky work of part, in case wrong burning or outage etc. cause burning failure, its result is exactly that mainboard is scrapped for most of users.
In order to avoid the burning process to be interrupted as far as possible, the most also be that the most expensive method is to use expensive back-up source, the unpredictable problem but this can not guarantee in burning, not crash, restart etc. fully.And, then can be embedded in the mainboard code, but the user can operate burning program skip detection mainboard code and burning by force sometimes at BIOS for fear of the BIOS file of wrong burning.Moreover the BIOS document time of general burning 12KB was approximately about two minutes, and the time of the BIOS of burning 1024KB is then longer, longer also just the influence by external force more easily of time and cause burning failure.
In view of this; Be necessary to develop a kind of method of safe upgrading BIOS in fact; The method of this safe upgrading BIOS adopts after-startup patch type; Utilize the method for this after-startup patch type safe upgrading BIOS; The BIOS file of upgrading for the mainboard of volume production does not involve too big change; The file of burning is little, speed is fast, even if outage in the burning process, deadlock, burning mistake do not have any influence yet, really accomplishes safety, efficient upgrading BIOS file.
[summary of the invention]
Therefore; The object of the present invention is to provide a kind of method of after-startup patch type safe upgrading BIOS; The BIOS file of upgrading for the mainboard of volume production does not involve too big change; The file of burning is little, speed is fast; Even if outage in the burning process, deadlock, burning mistake do not have any influence yet, really accomplish safety, efficient upgrading BIOS file.
For reaching above-mentioned purpose, the method for after-startup patch type safe upgrading BIOS of the present invention, this method comprises the following steps:
In BIOS, vacate in order to deposit the upgrading space of upgrade code;
Judge and work as whether front space is upgrading space;
If above-mentioned being judged as " is " burning upgrade code in upgrading space;
Whether interpolation starts the upgrading switch of upgrade code in CMOS user is provided with, and main code adds the check point whether submodule that needs upgrading is arranged before calling each function code in BIOS;
Judge that whether CMOS user is provided with for opening the upgrading switch;
If above-mentioned being judged as " is " whether the submodule that needs upgrading is arranged from check point arbitration functions code;
If above-mentioned being judged as " be ", search with the above-mentioned corresponding code of submodule of upgrading that needs and call upgrading BIOS thereby get into the upgrading space of depositing upgrade code.
Especially, the size of above-mentioned upgrading space is 64KB.
Especially, work as above-mentioned steps: judge and work as whether front space is upgrading space; When judged result is " denying ", then get into step: the refusal burning.
Especially, work as above-mentioned steps: judge that whether CMOS user is provided with for opening the upgrading switch; When judged result is " denying ", then get into step: do not upgrade.
Especially, work as above-mentioned steps: the submodule whether the needs upgrading is arranged from check point arbitration functions code; When judged result is " denying ", then get into step: do not upgrade.
Compared to prior art; The method of after-startup patch type safe upgrading BIOS of the present invention; Utilize the method for this after-startup patch type safe upgrading BIOS; The BIOS file of upgrading for the mainboard of volume production does not involve too big change; The file of burning is little, speed is fast; Even if outage in the burning process, deadlock, burning mistake do not have any influence yet, really accomplish safety, efficient upgrading BIOS file.
For the object of the invention, structural attitude and function thereof are had further understanding, conjunction with figs. describes in detail as follows now:
[description of drawings]
Fig. 1 illustrates the process flow diagram of a preferred embodiment of the method for after-startup patch type safe upgrading BIOS of the present invention.
[embodiment]
See also shown in Figure 1ly, illustrate the process flow diagram of a preferred embodiment of the method for after-startup patch type safe upgrading BIOS of the present invention.
One preferred embodiment of the method for after-startup patch type safe upgrading BIOS of the present invention, this preferred embodiment comprises the following steps:
In BIOS, vacate upgrading space (step 100) in order to deposit upgrade code;
Judge and work as whether front space is upgrading space (step 101);
If above-mentioned being judged as " is " burning upgrade code (step 102) in upgrading space;
Whether interpolation starts the upgrading switch of upgrade code in CMOS user is provided with, and main code adds check point (step 103 the) whether submodule that needs upgrading is arranged before calling each function code in BIOS;
Judge that whether CMOS user's setting is for opening upgrading switch (step 104);
If above-mentioned being judged as " is " whether submodule (step 105) that needs upgrading is arranged from check point arbitration functions code;
If above-mentioned being judged as " be ", thus get into the upgrading space of depositing upgrade code search with the above-mentioned corresponding code of submodule of upgrading that needs call upgrading BIOS(step 106).
Especially, the size of above-mentioned upgrading space is 64KB, finds the space that the BIOS file of AMI/Award/Phoenix code framework can both the vacant 64KB of going out through inspection.(for example :Award code 50000~5FFFFF section 64KB is empty).
Especially, work as above-mentioned steps: judge and work as whether front space is upgrading space; When judged result is " denying "; Then get into step: refusal burning (step 07); Because being the burning module that calls in the BIOS file, the main flow burning program carries out burning; As long as before this burning module, judge whether to be the special-purpose upgrading space of burning fresh code; Then refuse burning if not; Judge that code is very easy to realize, so just avoided the whole BIOS chip of repetition burning.
Especially, work as above-mentioned steps: judge that whether CMOS user is provided with for opening the upgrading switch; When judged result is " denying ", then get into step: do not upgrade (step 108).
Especially, work as above-mentioned steps: the submodule whether the needs upgrading is arranged from check point arbitration functions code; When judged result is " denying "; Then get into step: do not upgrade (step 109), can both revise main code very easily through inspection discovery AMI/Award/Phoenix code, add detection of code; Wherein the WARD code check point that can add is about 150, can't influence mainboard start-up time.
Compared to prior art; The method of after-startup patch type safe upgrading BIOS of the present invention; Utilize the method for this after-startup patch type safe upgrading BIOS; The BIOS file of upgrading for the mainboard of volume production does not involve too big change; The file of burning is little, speed is fast; Even if outage in the burning process, deadlock, burning mistake do not have any influence yet, really accomplish safety, efficient upgrading BIOS file.Even if burning wrong program, only otherwise open the option that starts patch among the CMOS, then erroneous procedures can not be called yet; The situation that causes system to start shooting just in case select among the CMOS to have started wrong program, if simply CMOS wire jumper short circuit once (CMOS discharge) get final product the option that does not start upgrade code of resuming default.

Claims (5)

1. the method for an after-startup patch type safe upgrading BIOS is characterized in that, this method comprises the following steps: at least
In BIOS, vacate in order to deposit the upgrading space of upgrade code;
Judge and work as whether front space is upgrading space;
If above-mentioned judgement is a upgrading space, burning upgrade code in upgrading space;
Whether interpolation starts the upgrading switch of upgrade code in CMOS user is provided with, and main code adds the check point whether submodule that needs upgrading is arranged before calling each function code in BIOS;
Judge that whether CMOS user is provided with for opening the upgrading switch;
If above-mentioned being judged as opened the upgrading switch, whether the submodule that needs upgrading is arranged from check point arbitration functions code;
If the above-mentioned submodule that needs upgrading that is judged as is searched with the above-mentioned corresponding code of submodule of upgrading that needs and is called upgrading BIOS thereby get into the upgrading space of depositing upgrade code.
2. the method for after-startup patch type safe upgrading BIOS as claimed in claim 1 is characterized in that, the size of this upgrading space is 64KB.
3. the method for after-startup patch type safe upgrading BIOS as claimed in claim 1 is characterized in that, works as above-mentioned steps: judge and work as whether front space is upgrading space; When judged result is " denying ", then get into step: refusal burning, flow process end.
4. the method for after-startup patch type safe upgrading BIOS as claimed in claim 1 is characterized in that, works as above-mentioned steps: judge that whether CMOS user is provided with for opening the upgrading switch; When judged result is " denying ", then get into step: do not upgrade the flow process end.
5. the method for after-startup patch type safe upgrading BIOS as claimed in claim 1 is characterized in that, works as above-mentioned steps: the submodule whether the needs upgrading is arranged from check point arbitration functions code; When judged result is " denying ", then get into step: do not upgrade the flow process end.
CN2006100300317A 2006-08-11 2006-08-11 After-startup patch type safe upgrading BIOS method Expired - Fee Related CN101122862B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006100300317A CN101122862B (en) 2006-08-11 2006-08-11 After-startup patch type safe upgrading BIOS method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006100300317A CN101122862B (en) 2006-08-11 2006-08-11 After-startup patch type safe upgrading BIOS method

Publications (2)

Publication Number Publication Date
CN101122862A CN101122862A (en) 2008-02-13
CN101122862B true CN101122862B (en) 2012-01-11

Family

ID=39085207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006100300317A Expired - Fee Related CN101122862B (en) 2006-08-11 2006-08-11 After-startup patch type safe upgrading BIOS method

Country Status (1)

Country Link
CN (1) CN101122862B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577318B (en) * 2012-08-07 2018-01-30 腾讯科技(深圳)有限公司 A kind of code detection method and device
CN104572210A (en) * 2015-01-21 2015-04-29 浪潮电子信息产业股份有限公司 Main board VR renewing method
CN107423626B (en) * 2017-07-19 2020-07-21 南京百敖软件有限公司 Method for updating trust chain of BIOS (basic input output System) based on continuous Hash value

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1362670A (en) * 2001-01-05 2002-08-07 神基科技股份有限公司 Automatic system BIOS repairing method
CN1403915A (en) * 2001-09-10 2003-03-19 英业达股份有限公司 Computer antiviral method and computer adopting the method
CN1811707A (en) * 2005-01-25 2006-08-02 英业达股份有限公司 Automatic updating and back-up BIOS method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1362670A (en) * 2001-01-05 2002-08-07 神基科技股份有限公司 Automatic system BIOS repairing method
CN1403915A (en) * 2001-09-10 2003-03-19 英业达股份有限公司 Computer antiviral method and computer adopting the method
CN1811707A (en) * 2005-01-25 2006-08-02 英业达股份有限公司 Automatic updating and back-up BIOS method

Also Published As

Publication number Publication date
CN101122862A (en) 2008-02-13

Similar Documents

Publication Publication Date Title
CN106610840A (en) FOTA (Firmware Over-The-Air) upgrade method and system
CN105760200A (en) Terminal device and system updating method thereof
CN101594613A (en) The method of terminal equipment and upgrading thereof, system
CN101826026A (en) Embedded equipment and on-line updating system and method of firmware in embedded equipment
CN101251813A (en) Device and method for mobile telephone system recovery
CN102184111B (en) The equipment of operating system online upgrading method and tape operation system
CN102236764A (en) Method and monitoring system for Android system to defend against desktop information attack
US7404072B2 (en) System and method for loading a valid image from one of a plurality of images into a memory of a network device
CN101122862B (en) After-startup patch type safe upgrading BIOS method
WO2015154538A1 (en) Memory booting method and device
CN108345464A (en) A kind of the startup method and Android vehicle device of Android system
CN102073508A (en) Method and apparatus for upgrading terminals and software thereof
CN103984585A (en) Method for upgrading Linux kernel in running process of kernel module capable of being plugged in thermal mode
CN101384063A (en) Method and system for terminal equipment repairing and updating, system manufacturing method
US20070050612A1 (en) Boot program update and restoration system and method thereof
CN103455750A (en) High-security verification method and high-security verification system for embedded devices
CN103177213B (en) A kind of software vulnerability restorative procedure and system
CN114793196B (en) Firmware upgrading method, device, equipment and storage medium
CN108959915B (en) Rootkit detection method, rootkit detection device and server
CN101464876B (en) Data updating method for electronic dictionary machine
CN100374969C (en) Method for searching and killing virus and computer therefor
CN109766115A (en) A kind of foolproof method and system of smart machine upgrading
CN111949290B (en) Hot patch management method and device, electronic equipment and storage medium
CN113656051A (en) Automatic upgrading method for android system equipment
CN107562440A (en) A kind of eeprom method for updating edition and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120111

Termination date: 20140811

EXPY Termination of patent right or utility model