CN101122862B - After-startup patch type safe upgrading BIOS method - Google Patents
After-startup patch type safe upgrading BIOS method Download PDFInfo
- Publication number
- CN101122862B CN101122862B CN2006100300317A CN200610030031A CN101122862B CN 101122862 B CN101122862 B CN 101122862B CN 2006100300317 A CN2006100300317 A CN 2006100300317A CN 200610030031 A CN200610030031 A CN 200610030031A CN 101122862 B CN101122862 B CN 101122862B
- Authority
- CN
- China
- Prior art keywords
- upgrading
- bios
- space
- code
- updating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Stored Programmes (AREA)
Abstract
The present invention discloses a post-startup patching method of BIOS security updating. The method includes the following the steps: an updating space in BIOS is released for the storage of updating codes and whether the present space is updating space is checked. If there is, the updating codes in the updating space is imprinted and an update switch is added to the CMOS user settings which judges whether to activate the updating codes. A checkpoint is added, which detects the submodules which need updating before the main code of Bios calls every function code. Whether the update switch of the CMOS user setting is on is checked. If the update switch is on, whether there are submodules in the function codes is checked which needs updating or not from the check point. If there is, the updating space for the storage of updating codes is entered, and the codes corresponding with the submodules needing updating is found and called to update BIOS, which in deed updates BIOS files with security and high efficiency.
Description
[technical field]
The present invention is meant a kind of method of after-startup patch type safe upgrading BIOS especially about a kind of method of safe upgrading BIOS.
[background technology]
Owing to still can have the bug of software after most of mainboard shipment, need upgrading BIOS reparation.Yet; Because the BIOS chip of volume production mainboard is welded on the mainboard and can't dismantles; So the mainboard upgrading for volume production is the risky work of part, in case wrong burning or outage etc. cause burning failure, its result is exactly that mainboard is scrapped for most of users.
In order to avoid the burning process to be interrupted as far as possible, the most also be that the most expensive method is to use expensive back-up source, the unpredictable problem but this can not guarantee in burning, not crash, restart etc. fully.And, then can be embedded in the mainboard code, but the user can operate burning program skip detection mainboard code and burning by force sometimes at BIOS for fear of the BIOS file of wrong burning.Moreover the BIOS document time of general burning 12KB was approximately about two minutes, and the time of the BIOS of burning 1024KB is then longer, longer also just the influence by external force more easily of time and cause burning failure.
In view of this; Be necessary to develop a kind of method of safe upgrading BIOS in fact; The method of this safe upgrading BIOS adopts after-startup patch type; Utilize the method for this after-startup patch type safe upgrading BIOS; The BIOS file of upgrading for the mainboard of volume production does not involve too big change; The file of burning is little, speed is fast, even if outage in the burning process, deadlock, burning mistake do not have any influence yet, really accomplishes safety, efficient upgrading BIOS file.
[summary of the invention]
Therefore; The object of the present invention is to provide a kind of method of after-startup patch type safe upgrading BIOS; The BIOS file of upgrading for the mainboard of volume production does not involve too big change; The file of burning is little, speed is fast; Even if outage in the burning process, deadlock, burning mistake do not have any influence yet, really accomplish safety, efficient upgrading BIOS file.
For reaching above-mentioned purpose, the method for after-startup patch type safe upgrading BIOS of the present invention, this method comprises the following steps:
In BIOS, vacate in order to deposit the upgrading space of upgrade code;
Judge and work as whether front space is upgrading space;
If above-mentioned being judged as " is " burning upgrade code in upgrading space;
Whether interpolation starts the upgrading switch of upgrade code in CMOS user is provided with, and main code adds the check point whether submodule that needs upgrading is arranged before calling each function code in BIOS;
Judge that whether CMOS user is provided with for opening the upgrading switch;
If above-mentioned being judged as " is " whether the submodule that needs upgrading is arranged from check point arbitration functions code;
If above-mentioned being judged as " be ", search with the above-mentioned corresponding code of submodule of upgrading that needs and call upgrading BIOS thereby get into the upgrading space of depositing upgrade code.
Especially, the size of above-mentioned upgrading space is 64KB.
Especially, work as above-mentioned steps: judge and work as whether front space is upgrading space; When judged result is " denying ", then get into step: the refusal burning.
Especially, work as above-mentioned steps: judge that whether CMOS user is provided with for opening the upgrading switch; When judged result is " denying ", then get into step: do not upgrade.
Especially, work as above-mentioned steps: the submodule whether the needs upgrading is arranged from check point arbitration functions code; When judged result is " denying ", then get into step: do not upgrade.
Compared to prior art; The method of after-startup patch type safe upgrading BIOS of the present invention; Utilize the method for this after-startup patch type safe upgrading BIOS; The BIOS file of upgrading for the mainboard of volume production does not involve too big change; The file of burning is little, speed is fast; Even if outage in the burning process, deadlock, burning mistake do not have any influence yet, really accomplish safety, efficient upgrading BIOS file.
For the object of the invention, structural attitude and function thereof are had further understanding, conjunction with figs. describes in detail as follows now:
[description of drawings]
Fig. 1 illustrates the process flow diagram of a preferred embodiment of the method for after-startup patch type safe upgrading BIOS of the present invention.
[embodiment]
See also shown in Figure 1ly, illustrate the process flow diagram of a preferred embodiment of the method for after-startup patch type safe upgrading BIOS of the present invention.
One preferred embodiment of the method for after-startup patch type safe upgrading BIOS of the present invention, this preferred embodiment comprises the following steps:
In BIOS, vacate upgrading space (step 100) in order to deposit upgrade code;
Judge and work as whether front space is upgrading space (step 101);
If above-mentioned being judged as " is " burning upgrade code (step 102) in upgrading space;
Whether interpolation starts the upgrading switch of upgrade code in CMOS user is provided with, and main code adds check point (step 103 the) whether submodule that needs upgrading is arranged before calling each function code in BIOS;
Judge that whether CMOS user's setting is for opening upgrading switch (step 104);
If above-mentioned being judged as " is " whether submodule (step 105) that needs upgrading is arranged from check point arbitration functions code;
If above-mentioned being judged as " be ", thus get into the upgrading space of depositing upgrade code search with the above-mentioned corresponding code of submodule of upgrading that needs call upgrading BIOS(step 106).
Especially, the size of above-mentioned upgrading space is 64KB, finds the space that the BIOS file of AMI/Award/Phoenix code framework can both the vacant 64KB of going out through inspection.(for example :Award code 50000~5FFFFF section 64KB is empty).
Especially, work as above-mentioned steps: judge and work as whether front space is upgrading space; When judged result is " denying "; Then get into step: refusal burning (step 07); Because being the burning module that calls in the BIOS file, the main flow burning program carries out burning; As long as before this burning module, judge whether to be the special-purpose upgrading space of burning fresh code; Then refuse burning if not; Judge that code is very easy to realize, so just avoided the whole BIOS chip of repetition burning.
Especially, work as above-mentioned steps: judge that whether CMOS user is provided with for opening the upgrading switch; When judged result is " denying ", then get into step: do not upgrade (step 108).
Especially, work as above-mentioned steps: the submodule whether the needs upgrading is arranged from check point arbitration functions code; When judged result is " denying "; Then get into step: do not upgrade (step 109), can both revise main code very easily through inspection discovery AMI/Award/Phoenix code, add detection of code; Wherein the WARD code check point that can add is about 150, can't influence mainboard start-up time.
Compared to prior art; The method of after-startup patch type safe upgrading BIOS of the present invention; Utilize the method for this after-startup patch type safe upgrading BIOS; The BIOS file of upgrading for the mainboard of volume production does not involve too big change; The file of burning is little, speed is fast; Even if outage in the burning process, deadlock, burning mistake do not have any influence yet, really accomplish safety, efficient upgrading BIOS file.Even if burning wrong program, only otherwise open the option that starts patch among the CMOS, then erroneous procedures can not be called yet; The situation that causes system to start shooting just in case select among the CMOS to have started wrong program, if simply CMOS wire jumper short circuit once (CMOS discharge) get final product the option that does not start upgrade code of resuming default.
Claims (5)
1. the method for an after-startup patch type safe upgrading BIOS is characterized in that, this method comprises the following steps: at least
In BIOS, vacate in order to deposit the upgrading space of upgrade code;
Judge and work as whether front space is upgrading space;
If above-mentioned judgement is a upgrading space, burning upgrade code in upgrading space;
Whether interpolation starts the upgrading switch of upgrade code in CMOS user is provided with, and main code adds the check point whether submodule that needs upgrading is arranged before calling each function code in BIOS;
Judge that whether CMOS user is provided with for opening the upgrading switch;
If above-mentioned being judged as opened the upgrading switch, whether the submodule that needs upgrading is arranged from check point arbitration functions code;
If the above-mentioned submodule that needs upgrading that is judged as is searched with the above-mentioned corresponding code of submodule of upgrading that needs and is called upgrading BIOS thereby get into the upgrading space of depositing upgrade code.
2. the method for after-startup patch type safe upgrading BIOS as claimed in claim 1 is characterized in that, the size of this upgrading space is 64KB.
3. the method for after-startup patch type safe upgrading BIOS as claimed in claim 1 is characterized in that, works as above-mentioned steps: judge and work as whether front space is upgrading space; When judged result is " denying ", then get into step: refusal burning, flow process end.
4. the method for after-startup patch type safe upgrading BIOS as claimed in claim 1 is characterized in that, works as above-mentioned steps: judge that whether CMOS user is provided with for opening the upgrading switch; When judged result is " denying ", then get into step: do not upgrade the flow process end.
5. the method for after-startup patch type safe upgrading BIOS as claimed in claim 1 is characterized in that, works as above-mentioned steps: the submodule whether the needs upgrading is arranged from check point arbitration functions code; When judged result is " denying ", then get into step: do not upgrade the flow process end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006100300317A CN101122862B (en) | 2006-08-11 | 2006-08-11 | After-startup patch type safe upgrading BIOS method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006100300317A CN101122862B (en) | 2006-08-11 | 2006-08-11 | After-startup patch type safe upgrading BIOS method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101122862A CN101122862A (en) | 2008-02-13 |
CN101122862B true CN101122862B (en) | 2012-01-11 |
Family
ID=39085207
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006100300317A Expired - Fee Related CN101122862B (en) | 2006-08-11 | 2006-08-11 | After-startup patch type safe upgrading BIOS method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101122862B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103577318B (en) * | 2012-08-07 | 2018-01-30 | 腾讯科技(深圳)有限公司 | A kind of code detection method and device |
CN104572210A (en) * | 2015-01-21 | 2015-04-29 | 浪潮电子信息产业股份有限公司 | Main board VR renewing method |
CN107423626B (en) * | 2017-07-19 | 2020-07-21 | 南京百敖软件有限公司 | Method for updating trust chain of BIOS (basic input output System) based on continuous Hash value |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1362670A (en) * | 2001-01-05 | 2002-08-07 | 神基科技股份有限公司 | Automatic system BIOS repairing method |
CN1403915A (en) * | 2001-09-10 | 2003-03-19 | 英业达股份有限公司 | Computer antiviral method and computer adopting the method |
CN1811707A (en) * | 2005-01-25 | 2006-08-02 | 英业达股份有限公司 | Automatic updating and back-up BIOS method |
-
2006
- 2006-08-11 CN CN2006100300317A patent/CN101122862B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1362670A (en) * | 2001-01-05 | 2002-08-07 | 神基科技股份有限公司 | Automatic system BIOS repairing method |
CN1403915A (en) * | 2001-09-10 | 2003-03-19 | 英业达股份有限公司 | Computer antiviral method and computer adopting the method |
CN1811707A (en) * | 2005-01-25 | 2006-08-02 | 英业达股份有限公司 | Automatic updating and back-up BIOS method |
Also Published As
Publication number | Publication date |
---|---|
CN101122862A (en) | 2008-02-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106610840A (en) | FOTA (Firmware Over-The-Air) upgrade method and system | |
CN105760200A (en) | Terminal device and system updating method thereof | |
CN101594613A (en) | The method of terminal equipment and upgrading thereof, system | |
CN101826026A (en) | Embedded equipment and on-line updating system and method of firmware in embedded equipment | |
CN101251813A (en) | Device and method for mobile telephone system recovery | |
CN102184111B (en) | The equipment of operating system online upgrading method and tape operation system | |
CN102236764A (en) | Method and monitoring system for Android system to defend against desktop information attack | |
US7404072B2 (en) | System and method for loading a valid image from one of a plurality of images into a memory of a network device | |
CN101122862B (en) | After-startup patch type safe upgrading BIOS method | |
WO2015154538A1 (en) | Memory booting method and device | |
CN108345464A (en) | A kind of the startup method and Android vehicle device of Android system | |
CN102073508A (en) | Method and apparatus for upgrading terminals and software thereof | |
CN103984585A (en) | Method for upgrading Linux kernel in running process of kernel module capable of being plugged in thermal mode | |
CN101384063A (en) | Method and system for terminal equipment repairing and updating, system manufacturing method | |
US20070050612A1 (en) | Boot program update and restoration system and method thereof | |
CN103455750A (en) | High-security verification method and high-security verification system for embedded devices | |
CN103177213B (en) | A kind of software vulnerability restorative procedure and system | |
CN114793196B (en) | Firmware upgrading method, device, equipment and storage medium | |
CN108959915B (en) | Rootkit detection method, rootkit detection device and server | |
CN101464876B (en) | Data updating method for electronic dictionary machine | |
CN100374969C (en) | Method for searching and killing virus and computer therefor | |
CN109766115A (en) | A kind of foolproof method and system of smart machine upgrading | |
CN111949290B (en) | Hot patch management method and device, electronic equipment and storage medium | |
CN113656051A (en) | Automatic upgrading method for android system equipment | |
CN107562440A (en) | A kind of eeprom method for updating edition and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120111 Termination date: 20140811 |
|
EXPY | Termination of patent right or utility model |