CN106203071A - A kind of firmware upgrade method and device - Google Patents
A kind of firmware upgrade method and device Download PDFInfo
- Publication number
- CN106203071A CN106203071A CN201610509472.9A CN201610509472A CN106203071A CN 106203071 A CN106203071 A CN 106203071A CN 201610509472 A CN201610509472 A CN 201610509472A CN 106203071 A CN106203071 A CN 106203071A
- Authority
- CN
- China
- Prior art keywords
- firmware file
- target firmware
- record
- file
- summary info
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Abstract
The invention discloses a kind of firmware upgrade method and device.The method comprises the following steps: obtain the target firmware file for firmware updating;According to the summary data of record in target firmware file, determine the first summary info;According to default digest algorithm, extract the summary of manufacturer's firmware content of record in target firmware file, it is thus achieved that the second summary info;Contrast the first summary info and the second summary info;If the first summary info and the second summary info are consistent, then according to the hardware device identification information of record in target firmware file, use target firmware file that the firmware of corresponding hardware device is upgraded.The technical scheme that the application embodiment of the present invention is provided, can avoid using insecure firmware file to carry out the potential safety hazard that firmware upgrade brings to kernel, improve the safety of computer system.
Description
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of firmware upgrade method and device.
Background technology
In a computer, firmware, i.e. firmware, it is commonly stored the EEPROM being solidificated in hardware device
(Electrically Erasable Programmable Read-Only Memory, EEPROM)
Or in flash memory FLASH chip, carry the hardware device bottom, most basic work.
Firmware can regard the programming to hardware device as, which determines the service behaviour of hardware device.Along with hardware sets
Standby design level is more and more higher, and firmware also becomes from strength to strength, complexity.In actual applications, firmware there may be leakage
Hole bug, or because application scenarios difference needs to change corresponding firmware parameters, this upgrading being required for by firmware solves
Certainly.
In linux system, kernel supports the online upgrading of firmware, solid by obtaining from native file system and loading
Part file, is directly passed to the driving of hardware device to complete the upgrade job of hardware device firmware.
There is certain shortcoming in this method, kernel gets firmware file from native file system and is probably through non-
Legal person person amendment, forge, apply this firmware file that hardware device firmware is upgraded so that computer system exists safety
Hidden danger.
Summary of the invention
For solving above-mentioned technical problem, the present invention provides a kind of firmware upgrade method and device.
A kind of firmware upgrade method, including:
Obtain the target firmware file for firmware updating;
According to the summary data of record in described target firmware file, determine the first summary info;
According to default digest algorithm, extract the summary of manufacturer's firmware content of record in described target firmware file, obtain
Obtain the second summary info;
Contrast described first summary info and described second summary info;
If described first summary info is consistent with described second summary info, then remember according in described target firmware file
The hardware device identification information of record, uses described target firmware file to upgrade the firmware of corresponding hardware device.
In a kind of detailed description of the invention of the present invention, described according to the summary number of record in described target firmware file
According to, before determining the first summary info, described method also includes:
Determine the current version information of record in described target firmware file and rely on whether version information meets default
Version dependence, if it is, perform described according to the summary data of record in described target firmware file, determines that first plucks
Want the operation of information.
In a kind of detailed description of the invention of the present invention, determine the current version of record in described target firmware file described
Before whether this information and dependence version information meet default version dependence, described method also includes:
According to the cyclic redundancy check (CRC) mark of record in described target firmware file, whether determine described target firmware file
Completely, if it is, perform the described current version information determining record in described target firmware file and rely on version information
Whether meet the operation of default version dependence.
In a kind of detailed description of the invention of the present invention, described summary data is that manufacturer uses default described summary in advance
Algorithm, extracts in described target firmware file the summary of manufacturer's firmware content of record, and after this summary is encrypted
Data, described according in described target firmware file record summary data, determine the first summary info, including:
The identification of the manufacturer information that described target firmware file is corresponding is extracted in described target firmware file;
The trusted public keys corresponding with described identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use described trusted public keys that the summary data of record in described target firmware file is decrypted, it is thus achieved that first plucks
Want information.
In a kind of detailed description of the invention of the present invention, described method also includes:
If described first summary info and described second summary info are inconsistent, then output and described target firmware file
For the information that unreliable upgrade file is relevant.
A kind of device for upgrading firmware, including:
Target firmware file acquisition module, for obtaining the target firmware file for firmware updating;
First summary info determines module, for according to the summary data of record in described target firmware file, determining the
One summary info;
Second summary info obtains module, for according to the digest algorithm preset, extracts in described target firmware file and remembers
The summary of manufacturer's firmware content of record, it is thus achieved that the second summary info;
Summary info contrast module, is used for contrasting described first summary info and described second summary info;
Firmware upgrade module, for when described first summary info is consistent with described second summary info, according to described
In target firmware file, the hardware device identification information of record, uses described target firmware file to consolidate corresponding hardware device
Part is upgraded.
In a kind of detailed description of the invention of the present invention, described device also includes:
Version dependence determines module, for determining the current version information of record in described target firmware file and depending on
Whether bad version information meets default version dependence, if it is, trigger described first summary info to determine module.
In a kind of detailed description of the invention of the present invention, described device also includes:
Integrity determines module, for according to the cyclic redundancy check (CRC) mark of record in described target firmware file, determining
Described target firmware file is the most complete, if it is, trigger described version dependence to determine module.
In a kind of detailed description of the invention of the present invention, described summary data is that manufacturer uses default described summary in advance
Algorithm, extracts in described target firmware file the summary of manufacturer's firmware content of record, and after this summary is encrypted
Data, described first summary info determines module, specifically for:
The identification of the manufacturer information that described target firmware file is corresponding is extracted in described target firmware file;
The trusted public keys corresponding with described identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use described trusted public keys that the summary data of record in described target firmware file is decrypted, it is thus achieved that first plucks
Want information.
In a kind of detailed description of the invention of the present invention, described device also includes:
Information output module, for when described first summary info and described second summary info are inconsistent, defeated
Going out to described target firmware file is the information that unreliable upgrade file is relevant.
The technical scheme that the application embodiment of the present invention is provided, gets after the target firmware file of firmware updating,
According to the summary data of record in target firmware file, it may be determined that the first summary info, according to default digest algorithm, permissible
Extract the summary of manufacturer's firmware content of record in this target firmware file, it is thus achieved that the second summary info, plucked by contrast first
Want information and the second summary info, determine the reliability of target firmware file, if the two is consistent, then use this target firmware literary composition
The firmware of corresponding hardware device is upgraded by part.So can avoid using insecure firmware file to carry out firmware upgrade
The potential safety hazard brought to kernel, improves the safety of computer system.
Accompanying drawing explanation
For the clearer explanation embodiment of the present invention or the technical scheme of prior art, below will be to embodiment or existing
In technology description, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some bright embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to root
Other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the implementing procedure figure of a kind of firmware upgrade method in the embodiment of the present invention;
Fig. 2 is the structural representation of a kind of device for upgrading firmware in the embodiment of the present invention.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with the accompanying drawings and detailed description of the invention
The present invention is described in further detail.Obviously, described embodiment be only a part of embodiment of the present invention rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise
Lower obtained every other embodiment, broadly falls into the scope of protection of the invention.
Shown in Figure 1, by the implementing procedure figure of a kind of firmware upgrade method that the embodiment of the present invention is provided, the method
May comprise steps of:
S110: obtain the target firmware file for firmware updating.
In actual applications, the firmware of hardware device is upgraded needing, or upgradeable solid having detected
During part file, kernel can obtain the target firmware file for firmware updating from native file system.
S120: according to the summary data of record in target firmware file, determine the first summary info.
In embodiments of the present invention, in target firmware file, record has manufacturer's firmware content and summary data, this summary number
According to using default digest algorithm in advance for manufacturer, the data obtained after extracting the summary of manufacturer's firmware content.
According to the summary data of record in target firmware file, it may be determined that the first summary info.If target firmware is civilian
In part, the summary data of record is non-encrypted data, then can be directly defined as by the summary data of record in target firmware file
First summary info.In actual applications, for strengthening the safety of firmware file, summary data can be encrypted, according to
The summary data of record in target firmware file, it may be determined that the first summary info.
In a kind of detailed description of the invention of the present invention, summary data is that manufacturer uses default digest algorithm in advance, carries
Take in target firmware file the summary of the firmware content of record, and the data after this summary is encrypted, step S120
May comprise steps of:
Step one: extract the identification of the manufacturer information that target firmware file is corresponding in target firmware file;
Step 2: search the trusted public keys corresponding with identification of the manufacturer information from the trusted public keys storehouse being obtained ahead of time;
Step 3: use trusted public keys that the summary data of record in target firmware file is decrypted, it is thus achieved that first plucks
Want information.
For ease of describing, above three step is combined and illustrates.
The identification of the manufacturer information that this target firmware file is corresponding, i.e. this target firmware can be recorded in target firmware file
File is which manufacturer provides.Manufacturer, when issuing firmware file, issues it for key that cryptographic digest is used simultaneously
To PKI.
Kernel can be obtained ahead of time the trusted public keys of multiple manufacturer, and this trusted public keys is that manufacturer is in encrypting manufacturer's firmware
The PKI of the double secret key that the summary held is used.The trusted public keys of acquisition can be stored in trusted public keys storehouse by kernel.Can
In letter PKI storehouse, the storage corresponding with the trusted public keys that this manufacturer issues of the identification of the manufacturer information of each manufacturer.
Corresponding identification of the manufacturer information can be extracted, then from the trusted public keys storehouse being obtained ahead of time in target firmware file
The trusted public keys that middle lookup is corresponding with this identification of the manufacturer information.
After finding the trusted public keys corresponding with identification of the manufacturer information in trusted public keys storehouse, it is possible to use this trusted public keys
Being decrypted the summary data of record in target firmware file, the summary data after deciphering is the first summary info.
Specifically used enciphering and deciphering algorithm can be preassigned enciphering and deciphering algorithm, it is also possible to be in target firmware file
The enciphering and deciphering algorithm of record.
S130: according to default digest algorithm, extracts the summary of manufacturer's firmware content of record in target firmware file, obtains
Obtain the second summary info.The digest algorithm here preset at is consistent with the digest algorithm corresponding to summary data in step S120.
In embodiments of the present invention, the digest algorithm preset can be preassigned a kind of digest algorithm, it is also possible to be
The digest algorithm of record in target firmware file.
According to default digest algorithm, the summary of manufacturer's firmware content of record in target firmware file can be extracted, obtain
Obtain the second summary info.
It should be noted that the execution sequence of step S120 and step S130 is not limited by the embodiment of the present invention.
S140: contrast the first summary info and the second summary info.
In step S120, kernel determines the first summary info, and this first summary info is corresponding, manufacturer in advance according to
The summary of manufacturer's firmware content that the digest algorithm preset extracts.In step S130, kernel obtains the second summary info, and this is years old
Two summary infos are corresponding, the summary of manufacturer's firmware content that kernel extracts according to the digest algorithm preset.
By the first summary info and the second summary info are compared, it may be determined that this target firmware file reliable
Property.
S150: if the first summary info and the second summary info are consistent is then hard according to record in target firmware file
Part equipment identification information, uses target firmware file to upgrade the firmware of corresponding hardware device.
If the first summary info and the second summary info are consistent, then show the probability that this target firmware file is tampered
Less, reliability is higher, can use this target firmware according to the hardware device identification information of record in this target firmware file
The firmware of corresponding hardware device is upgraded by file.Concrete, this target firmware file can be passed to accordingly by kernel
The driving of hardware device, to complete the upgrade job of the firmware of this hardware device.
If the first summary info and the second summary info are inconsistent, then show that this target firmware file may be usurped
Changing, reliability is less.If using this target firmware file that the firmware of hardware device is upgraded, may be to department of computer science
System produces harm.In such a case, it is possible to be not loaded with this target firmware file.Can also export and with this target firmware file be
The information that unreliable upgrade file is relevant, prompting this target firmware file of user may be destroyed.
The method that the application embodiment of the present invention is provided, gets after the target firmware file of firmware updating, according to
The summary data of record in target firmware file, it may be determined that the first summary info, according to default digest algorithm, can extract
The summary of manufacturer's firmware content of record in this target firmware file, it is thus achieved that the second summary info, by contrast the first summary letter
Breath and the second summary info, determine the reliability of target firmware file, if the two is consistent, then uses this target firmware file pair
The firmware of corresponding hardware device is upgraded.So can avoid using insecure firmware file to carry out firmware upgrade to interior
The potential safety hazard that nucleus band comes, improves the safety of computer system.
In one embodiment of the invention, before step S120, the method can also comprise the following steps:
Determine the current version information of record in target firmware file and rely on whether version information meets default version
Dependence, if it is, perform the operation of step S120.
In embodiments of the present invention, target firmware file can record current version information and relied on version information.
After kernel gets target firmware file, can first determine the current version information of record in this target firmware file and rely on version
Whether this information meets default version dependence.The version dependence preset can be set according to practical situation,
Such as, the version number relied in version information needs less than the version number in current version information.
If met, then continue executing with the operation of step S120, if it is not, then this target firmware file may be unreliable,
This target firmware file can be not loaded with, or relevant information the most corresponding to version can be exported.
In one embodiment of the invention, the current version information of record and dependence version in determining target firmware file
Before whether this information meets default version dependence, the method can also comprise the following steps:
According to the cyclic redundancy check (CRC) mark of record in target firmware file, determine that target firmware file is the most complete, as
Fruit is, then perform determine the current version information of record in target firmware file and rely on whether version information meets default version
The operation of this dependence.
In embodiments of the present invention, target firmware file can record cyclic redundancy check (CRC) mark.According to this circulation
Redundancy check identifies, it may be determined that this target firmware file is the most complete, determines if it is, continue executing with version dependence
Operation or executive summary information contrast operation.
In actual applications, the various embodiments described above can be combined, improve the safety of system, wait camouflage to hiding
Virus also has preferable preventive effect.
In embodiments of the present invention, target firmware file can have an as shown in table 1 file format preset:
Table 1
Cyclic redundancy check (CRC) mark CRC32: for determining the integrity of target firmware file according to this mark, it is to avoid because adding
Carry information dropout that is abnormal and that cause;
Identification of the manufacturer VendorId: for the manufacturer belonging to record object firmware file;
Hardware device mark ProductId: for the hardware device corresponding to record object firmware file;
Current version Current Version: for record object firmware file current version information;
Rely on version Request Version: for the dependence version letter that record object firmware file current version is corresponding
Breath;
Summary data Encrypt Digest: use digest algorithm acquisition to pluck manufacturer's firmware content for recording needle
Want, and the data after using enciphering and deciphering algorithm and manufacturer's private key that this summary is encrypted;
Digest algorithm Digest Method: generate the digest algorithm that summary data is used for recording;
Enciphering and deciphering algorithm Encrypt Method: the enciphering and deciphering algorithm used for docket data;
Size Size: for recording the size of manufacturer's firmware content;
Manufacturer firmware content Vendor Firmware Content: be used for recording manufacturer's firmware content.
Each manufacturer, when issuing firmware file, can generate according to above-mentioned file format and have unified file format
Firmware file.After kernel gets firmware file, this firmware file can be entered according to these information of record in firmware file
Row is complete and security screening, to avoid insecure firmware file to work the mischief security of system.
Corresponding to above method embodiment, the embodiment of the present invention additionally provides a kind of device for upgrading firmware.See Fig. 2 institute
Showing, this device can include with lower module:
Target firmware file acquisition module 210, for obtaining the target firmware file for firmware updating;
First summary info determines module 220, for according to the summary data of record in target firmware file, determining first
Summary info;
Second summary info obtains module 230, for according to the digest algorithm preset, extracts record in target firmware file
The summary of manufacturer's firmware content, it is thus achieved that the second summary info;
Summary info contrast module 240, for contrast the first summary info and the second summary info;
Firmware upgrade module 250, for when the first summary info and the second summary info are consistent, according to target firmware literary composition
The hardware device identification information of record in part, uses target firmware file to upgrade the firmware of corresponding hardware device.
The device that the application embodiment of the present invention is provided, gets after the target firmware file of firmware updating, according to
The summary data of record in target firmware file, it may be determined that the first summary info, according to default digest algorithm, can extract
The summary of manufacturer's firmware content of record in this target firmware file, it is thus achieved that the second summary info, by contrast the first summary letter
Breath and the second summary info, determine the reliability of target firmware file, if the two is consistent, then uses this target firmware file pair
The firmware of corresponding hardware device is upgraded.So can avoid using insecure firmware file to carry out firmware upgrade to interior
The potential safety hazard that nucleus band comes, improves the safety of computer system.
In one embodiment of the invention, this device can also include with lower module:
Version dependence determines module, for determining the current version information of record in target firmware file and relying on version
Whether this information meets default version dependence, if it is, trigger the first summary info to determine module 220.
In one embodiment of the invention, this device can also include with lower module:
Integrity determines module, for according to the cyclic redundancy check (CRC) mark of record in target firmware file, determining target
Firmware file is the most complete, if it is, trigger version dependence to determine module.
In a kind of detailed description of the invention of the present invention, summary data is that manufacturer uses default digest algorithm in advance, carries
Take in target firmware file the summary of manufacturer's firmware content of record, and the data after this summary is encrypted, first
Summary info determines module 220, specifically for:
The identification of the manufacturer information that target firmware file is corresponding is extracted in target firmware file;
The trusted public keys corresponding with identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use trusted public keys that the summary data of record in target firmware file is decrypted, it is thus achieved that the first summary info.
In one embodiment of the invention, this device can also include with lower module:
Information output module, for when the first summary info and the second summary info are inconsistent, exports and target
Firmware file is the information that unreliable upgrade file is relevant.
In this specification, each embodiment uses the mode gone forward one by one to describe, and what each embodiment stressed is and other
The difference of embodiment, between each embodiment, same or similar part sees mutually.For filling disclosed in embodiment
For putting, owing to it corresponds to the method disclosed in Example, so describe is fairly simple, relevant part sees method part
Illustrate.
Professional further appreciates that, in conjunction with the unit of each example that the embodiments described herein describes
And algorithm steps, it is possible to electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware and
The interchangeability of software, the most generally describes composition and the step of each example according to function.These
Function performs with hardware or software mode actually, depends on application-specific and the design constraint of technical scheme.Specialty
Technical staff specifically should can be used for using different methods to realize described function to each, but this realization should not
Think beyond the scope of this invention.
The method described in conjunction with the embodiments described herein or the step of algorithm can direct hardware, processor be held
The software module of row, or the combination of the two implements.Software module can be placed in random access memory (RAM), internal memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, depositor, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Above a kind of firmware upgrade method provided by the present invention and device are described in detail.Used herein
Principle and the embodiment of the present invention are set forth by specific case, and the explanation of above example is only intended to help to understand this
The method of invention and core concept thereof.It should be pointed out that, for those skilled in the art, without departing from this
On the premise of bright principle, it is also possible to the present invention is carried out some improvement and modification, these improve and modification also falls into present invention power
In the protection domain that profit requires.
Claims (10)
1. a firmware upgrade method, it is characterised in that including:
Obtain the target firmware file for firmware updating;
According to the summary data of record in described target firmware file, determine the first summary info;
According to default digest algorithm, extract the summary of manufacturer's firmware content of record in described target firmware file, it is thus achieved that the
Two summary infos;
Contrast described first summary info and described second summary info;
If described first summary info is consistent with described second summary info, then according to record in described target firmware file
Hardware device identification information, uses described target firmware file to upgrade the firmware of corresponding hardware device.
Method the most according to claim 1, it is characterised in that described according to plucking of recording in described target firmware file
Wanting data, before determining the first summary info, described method also includes:
Determine the current version information of record in described target firmware file and rely on whether version information meets default version
Dependence, if it is, perform described according to the summary data of record in described target firmware file, determines the first summary letter
The operation of breath.
Method the most according to claim 2, it is characterised in that determine that record in described target firmware file works as described
Before whether front version information and dependence version information meet default version dependence, described method also includes:
According to the cyclic redundancy check (CRC) mark of record in described target firmware file, determine that described target firmware file is the completeest
Whole, if it is, perform the described current version information determining in described target firmware file record and rely on version information and be
The no operation meeting default version dependence.
4. according to the method described in any one of claims 1 to 3, it is characterised in that described summary data is that manufacturer uses in advance
The described digest algorithm preset, extracts the summary of manufacturer's firmware content of record in described target firmware file, and to this summary
Data after being encrypted, described according to the summary data of record in described target firmware file, determine the first summary letter
Breath, including:
The identification of the manufacturer information that described target firmware file is corresponding is extracted in described target firmware file;
The trusted public keys corresponding with described identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use described trusted public keys that the summary data of record in described target firmware file is decrypted, it is thus achieved that the first summary letter
Breath.
Method the most according to claim 4, it is characterised in that described method also includes:
If described first summary info and described second summary info are inconsistent, then output and described target firmware file are not
The information that reliable upgrade file is relevant.
6. a device for upgrading firmware, it is characterised in that including:
Target firmware file acquisition module, for obtaining the target firmware file for firmware updating;
First summary info determines module, for according to the summary data of record in described target firmware file, determining that first plucks
Want information;
Second summary info obtains module, for according to the digest algorithm preset, extracts record in described target firmware file
The summary of manufacturer's firmware content, it is thus achieved that the second summary info;
Summary info contrast module, is used for contrasting described first summary info and described second summary info;
Firmware upgrade module, for when described first summary info is consistent with described second summary info, according to described target
In firmware file, the hardware device identification information of record, uses described target firmware file to enter the firmware of corresponding hardware device
Row upgrading.
Device the most according to claim 6, it is characterised in that described device also includes:
Version dependence determines module, for determining the current version information of record in described target firmware file and relying on version
Whether this information meets default version dependence, if it is, trigger described first summary info to determine module.
Device the most according to claim 7, it is characterised in that described device also includes:
Integrity determines module, for according to the cyclic redundancy check (CRC) mark of record in described target firmware file, determining described
Target firmware file is the most complete, if it is, trigger described version dependence to determine module.
9. according to the device described in any one of claim 6 to 8, it is characterised in that described summary data is that manufacturer uses in advance
The described digest algorithm preset, extracts the summary of manufacturer's firmware content of record in described target firmware file, and to this summary
Data after being encrypted, described first summary info determines module, specifically for:
The identification of the manufacturer information that described target firmware file is corresponding is extracted in described target firmware file;
The trusted public keys corresponding with described identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use described trusted public keys that the summary data of record in described target firmware file is decrypted, it is thus achieved that the first summary letter
Breath.
Device the most according to claim 9, it is characterised in that described device also includes:
Information output module, for when described first summary info and described second summary info are inconsistent, output with
Described target firmware file is the information that unreliable upgrade file is relevant.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610509472.9A CN106203071A (en) | 2016-06-30 | 2016-06-30 | A kind of firmware upgrade method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610509472.9A CN106203071A (en) | 2016-06-30 | 2016-06-30 | A kind of firmware upgrade method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106203071A true CN106203071A (en) | 2016-12-07 |
Family
ID=57464446
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610509472.9A Pending CN106203071A (en) | 2016-06-30 | 2016-06-30 | A kind of firmware upgrade method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106203071A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106685653A (en) * | 2016-12-29 | 2017-05-17 | 同济大学 | Vehicle remote firmware updating method and device based on information security technology |
CN106815050A (en) * | 2016-12-30 | 2017-06-09 | 深圳怡化电脑股份有限公司 | A kind of firmware management method and device of embedded device |
CN107491328A (en) * | 2017-08-02 | 2017-12-19 | 广东美的暖通设备有限公司 | Updating firmware program method, system and electric equipment |
CN108446133A (en) * | 2018-03-29 | 2018-08-24 | 广东美的暖通设备有限公司 | Firmware upgrade control method, firmware upgrade control system and electric appliance |
CN108848094A (en) * | 2018-06-22 | 2018-11-20 | 平安科技(深圳)有限公司 | Data security validation method, device, system, computer equipment and storage medium |
CN109117168A (en) * | 2018-08-29 | 2019-01-01 | 拓攻(南京)机器人有限公司 | Unmanned plane firmware update, device, unmanned plane and storage medium |
CN109214168A (en) * | 2018-08-27 | 2019-01-15 | 阿里巴巴集团控股有限公司 | Firmware upgrade method and device |
CN109240721A (en) * | 2018-08-24 | 2019-01-18 | 江苏恒宝智能系统技术有限公司 | A kind of method of MCU online upgrading |
CN109977674A (en) * | 2017-12-28 | 2019-07-05 | 航天信息股份有限公司 | The method for upgrading software and device of embedded device |
CN110764811A (en) * | 2019-09-05 | 2020-02-07 | 深圳优地科技有限公司 | Firmware upgrading method and device |
CN112699345A (en) * | 2020-12-30 | 2021-04-23 | 合肥市芯海电子科技有限公司 | Method, system, equipment and storage medium for safe operation of firmware |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101436141A (en) * | 2008-11-21 | 2009-05-20 | 深圳创维数字技术股份有限公司 | Firmware upgrading and encapsulating method and device based on digital signing |
CN102141940A (en) * | 2010-12-29 | 2011-08-03 | Tcl集团股份有限公司 | Device, method and system for recovering firmware update |
CN102981881A (en) * | 2012-12-10 | 2013-03-20 | 中兴通讯股份有限公司 | Method and system for preventing mobile terminal from being updated to illegal firmware version |
CN104166565A (en) * | 2014-08-11 | 2014-11-26 | 成都瑞博慧窗信息技术有限公司 | Intelligent display terminal firmware updating method |
US20150199518A1 (en) * | 2014-01-10 | 2015-07-16 | Canon Kabushiki Kaisha | Image forming apparatus that performs update of firmware, and control method therefor |
-
2016
- 2016-06-30 CN CN201610509472.9A patent/CN106203071A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101436141A (en) * | 2008-11-21 | 2009-05-20 | 深圳创维数字技术股份有限公司 | Firmware upgrading and encapsulating method and device based on digital signing |
CN102141940A (en) * | 2010-12-29 | 2011-08-03 | Tcl集团股份有限公司 | Device, method and system for recovering firmware update |
CN102981881A (en) * | 2012-12-10 | 2013-03-20 | 中兴通讯股份有限公司 | Method and system for preventing mobile terminal from being updated to illegal firmware version |
US20150199518A1 (en) * | 2014-01-10 | 2015-07-16 | Canon Kabushiki Kaisha | Image forming apparatus that performs update of firmware, and control method therefor |
CN104166565A (en) * | 2014-08-11 | 2014-11-26 | 成都瑞博慧窗信息技术有限公司 | Intelligent display terminal firmware updating method |
Non-Patent Citations (2)
Title |
---|
中国信息安全产品测评认证中心编著: "《信息安全理论与技术》", 30 September 2003 * |
廖滨华: "《网络知识与应用》", 31 March 2014 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106685653A (en) * | 2016-12-29 | 2017-05-17 | 同济大学 | Vehicle remote firmware updating method and device based on information security technology |
CN106685653B (en) * | 2016-12-29 | 2020-07-07 | 同济大学 | Vehicle remote firmware updating method and device based on information security technology |
CN106815050B (en) * | 2016-12-30 | 2020-06-09 | 深圳怡化电脑股份有限公司 | Firmware management method and device of embedded equipment |
CN106815050A (en) * | 2016-12-30 | 2017-06-09 | 深圳怡化电脑股份有限公司 | A kind of firmware management method and device of embedded device |
CN107491328A (en) * | 2017-08-02 | 2017-12-19 | 广东美的暖通设备有限公司 | Updating firmware program method, system and electric equipment |
CN109977674A (en) * | 2017-12-28 | 2019-07-05 | 航天信息股份有限公司 | The method for upgrading software and device of embedded device |
CN108446133A (en) * | 2018-03-29 | 2018-08-24 | 广东美的暖通设备有限公司 | Firmware upgrade control method, firmware upgrade control system and electric appliance |
CN108848094A (en) * | 2018-06-22 | 2018-11-20 | 平安科技(深圳)有限公司 | Data security validation method, device, system, computer equipment and storage medium |
CN108848094B (en) * | 2018-06-22 | 2021-04-16 | 平安科技(深圳)有限公司 | Data security verification method, device, system, computer equipment and storage medium |
CN109240721A (en) * | 2018-08-24 | 2019-01-18 | 江苏恒宝智能系统技术有限公司 | A kind of method of MCU online upgrading |
CN109214168A (en) * | 2018-08-27 | 2019-01-15 | 阿里巴巴集团控股有限公司 | Firmware upgrade method and device |
CN109117168A (en) * | 2018-08-29 | 2019-01-01 | 拓攻(南京)机器人有限公司 | Unmanned plane firmware update, device, unmanned plane and storage medium |
CN110764811A (en) * | 2019-09-05 | 2020-02-07 | 深圳优地科技有限公司 | Firmware upgrading method and device |
CN112699345A (en) * | 2020-12-30 | 2021-04-23 | 合肥市芯海电子科技有限公司 | Method, system, equipment and storage medium for safe operation of firmware |
CN112699345B (en) * | 2020-12-30 | 2022-12-09 | 合肥市芯海电子科技有限公司 | Method, system, equipment and storage medium for safe operation of firmware |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106203071A (en) | A kind of firmware upgrade method and device | |
WO2020192406A1 (en) | Method and apparatus for data storage and verification | |
CN105765897B (en) | A kind of security information preparation method, safe verification method and related chip | |
CN108255505A (en) | A kind of firmware update, device, equipment and computer readable storage medium | |
CN107430658B (en) | Security software certification and verifying | |
US20090019275A1 (en) | Secure Boot Method and Semiconductor Memory System Using the Method | |
CN113014539B (en) | Internet of things equipment safety protection system and method | |
CN104794388B (en) | application program access protection method and application program access protection device | |
CN108108631A (en) | A kind of root key processing method and relevant apparatus | |
JP2007034875A (en) | Use management method for peripheral, electronic system and constituent device therefor | |
US20100185873A1 (en) | System and method for file processing and file processing program | |
CN109144552A (en) | A kind of boot firmware method for refreshing and device | |
CN105247833B (en) | Self-certified apparatus and method for | |
CN104123488A (en) | Method and device for verifying application program | |
CN104715208A (en) | Platform integrity checking method based on TPM chip | |
US10387653B2 (en) | Secure provisioning of semiconductor chips in untrusted manufacturing factories | |
CN103370718B (en) | Use the data guard method of distributed security key, equipment and system | |
KR101425456B1 (en) | Information generation system and method therefor | |
CN105303093A (en) | Token verification method for cryptographic smart token | |
US8499357B1 (en) | Signing a library file to verify a callback function | |
CN106203142A (en) | A kind of method and device of the Primary Hard Drive data protecting computer | |
CN106095468B (en) | A kind of computer starting method and device | |
CN112825093B (en) | Security baseline checking method, host, server, electronic device and storage medium | |
CN107743306B (en) | Intelligent POS machine WIFI setting method based on multi-password control and intelligent POS machine | |
CN111723379A (en) | Trusted protection method, system, equipment and storage medium for trusted platform zone intelligent terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |
|
RJ01 | Rejection of invention patent application after publication |