CN106203071A - A kind of firmware upgrade method and device - Google Patents

A kind of firmware upgrade method and device Download PDF

Info

Publication number
CN106203071A
CN106203071A CN201610509472.9A CN201610509472A CN106203071A CN 106203071 A CN106203071 A CN 106203071A CN 201610509472 A CN201610509472 A CN 201610509472A CN 106203071 A CN106203071 A CN 106203071A
Authority
CN
China
Prior art keywords
firmware file
target firmware
record
file
summary info
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610509472.9A
Other languages
Chinese (zh)
Inventor
庞伟振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201610509472.9A priority Critical patent/CN106203071A/en
Publication of CN106203071A publication Critical patent/CN106203071A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

The invention discloses a kind of firmware upgrade method and device.The method comprises the following steps: obtain the target firmware file for firmware updating;According to the summary data of record in target firmware file, determine the first summary info;According to default digest algorithm, extract the summary of manufacturer's firmware content of record in target firmware file, it is thus achieved that the second summary info;Contrast the first summary info and the second summary info;If the first summary info and the second summary info are consistent, then according to the hardware device identification information of record in target firmware file, use target firmware file that the firmware of corresponding hardware device is upgraded.The technical scheme that the application embodiment of the present invention is provided, can avoid using insecure firmware file to carry out the potential safety hazard that firmware upgrade brings to kernel, improve the safety of computer system.

Description

A kind of firmware upgrade method and device
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of firmware upgrade method and device.
Background technology
In a computer, firmware, i.e. firmware, it is commonly stored the EEPROM being solidificated in hardware device (Electrically Erasable Programmable Read-Only Memory, EEPROM) Or in flash memory FLASH chip, carry the hardware device bottom, most basic work.
Firmware can regard the programming to hardware device as, which determines the service behaviour of hardware device.Along with hardware sets Standby design level is more and more higher, and firmware also becomes from strength to strength, complexity.In actual applications, firmware there may be leakage Hole bug, or because application scenarios difference needs to change corresponding firmware parameters, this upgrading being required for by firmware solves Certainly.
In linux system, kernel supports the online upgrading of firmware, solid by obtaining from native file system and loading Part file, is directly passed to the driving of hardware device to complete the upgrade job of hardware device firmware.
There is certain shortcoming in this method, kernel gets firmware file from native file system and is probably through non- Legal person person amendment, forge, apply this firmware file that hardware device firmware is upgraded so that computer system exists safety Hidden danger.
Summary of the invention
For solving above-mentioned technical problem, the present invention provides a kind of firmware upgrade method and device.
A kind of firmware upgrade method, including:
Obtain the target firmware file for firmware updating;
According to the summary data of record in described target firmware file, determine the first summary info;
According to default digest algorithm, extract the summary of manufacturer's firmware content of record in described target firmware file, obtain Obtain the second summary info;
Contrast described first summary info and described second summary info;
If described first summary info is consistent with described second summary info, then remember according in described target firmware file The hardware device identification information of record, uses described target firmware file to upgrade the firmware of corresponding hardware device.
In a kind of detailed description of the invention of the present invention, described according to the summary number of record in described target firmware file According to, before determining the first summary info, described method also includes:
Determine the current version information of record in described target firmware file and rely on whether version information meets default Version dependence, if it is, perform described according to the summary data of record in described target firmware file, determines that first plucks Want the operation of information.
In a kind of detailed description of the invention of the present invention, determine the current version of record in described target firmware file described Before whether this information and dependence version information meet default version dependence, described method also includes:
According to the cyclic redundancy check (CRC) mark of record in described target firmware file, whether determine described target firmware file Completely, if it is, perform the described current version information determining record in described target firmware file and rely on version information Whether meet the operation of default version dependence.
In a kind of detailed description of the invention of the present invention, described summary data is that manufacturer uses default described summary in advance Algorithm, extracts in described target firmware file the summary of manufacturer's firmware content of record, and after this summary is encrypted Data, described according in described target firmware file record summary data, determine the first summary info, including:
The identification of the manufacturer information that described target firmware file is corresponding is extracted in described target firmware file;
The trusted public keys corresponding with described identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use described trusted public keys that the summary data of record in described target firmware file is decrypted, it is thus achieved that first plucks Want information.
In a kind of detailed description of the invention of the present invention, described method also includes:
If described first summary info and described second summary info are inconsistent, then output and described target firmware file For the information that unreliable upgrade file is relevant.
A kind of device for upgrading firmware, including:
Target firmware file acquisition module, for obtaining the target firmware file for firmware updating;
First summary info determines module, for according to the summary data of record in described target firmware file, determining the One summary info;
Second summary info obtains module, for according to the digest algorithm preset, extracts in described target firmware file and remembers The summary of manufacturer's firmware content of record, it is thus achieved that the second summary info;
Summary info contrast module, is used for contrasting described first summary info and described second summary info;
Firmware upgrade module, for when described first summary info is consistent with described second summary info, according to described In target firmware file, the hardware device identification information of record, uses described target firmware file to consolidate corresponding hardware device Part is upgraded.
In a kind of detailed description of the invention of the present invention, described device also includes:
Version dependence determines module, for determining the current version information of record in described target firmware file and depending on Whether bad version information meets default version dependence, if it is, trigger described first summary info to determine module.
In a kind of detailed description of the invention of the present invention, described device also includes:
Integrity determines module, for according to the cyclic redundancy check (CRC) mark of record in described target firmware file, determining Described target firmware file is the most complete, if it is, trigger described version dependence to determine module.
In a kind of detailed description of the invention of the present invention, described summary data is that manufacturer uses default described summary in advance Algorithm, extracts in described target firmware file the summary of manufacturer's firmware content of record, and after this summary is encrypted Data, described first summary info determines module, specifically for:
The identification of the manufacturer information that described target firmware file is corresponding is extracted in described target firmware file;
The trusted public keys corresponding with described identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use described trusted public keys that the summary data of record in described target firmware file is decrypted, it is thus achieved that first plucks Want information.
In a kind of detailed description of the invention of the present invention, described device also includes:
Information output module, for when described first summary info and described second summary info are inconsistent, defeated Going out to described target firmware file is the information that unreliable upgrade file is relevant.
The technical scheme that the application embodiment of the present invention is provided, gets after the target firmware file of firmware updating, According to the summary data of record in target firmware file, it may be determined that the first summary info, according to default digest algorithm, permissible Extract the summary of manufacturer's firmware content of record in this target firmware file, it is thus achieved that the second summary info, plucked by contrast first Want information and the second summary info, determine the reliability of target firmware file, if the two is consistent, then use this target firmware literary composition The firmware of corresponding hardware device is upgraded by part.So can avoid using insecure firmware file to carry out firmware upgrade The potential safety hazard brought to kernel, improves the safety of computer system.
Accompanying drawing explanation
For the clearer explanation embodiment of the present invention or the technical scheme of prior art, below will be to embodiment or existing In technology description, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some bright embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to root Other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the implementing procedure figure of a kind of firmware upgrade method in the embodiment of the present invention;
Fig. 2 is the structural representation of a kind of device for upgrading firmware in the embodiment of the present invention.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with the accompanying drawings and detailed description of the invention The present invention is described in further detail.Obviously, described embodiment be only a part of embodiment of the present invention rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, broadly falls into the scope of protection of the invention.
Shown in Figure 1, by the implementing procedure figure of a kind of firmware upgrade method that the embodiment of the present invention is provided, the method May comprise steps of:
S110: obtain the target firmware file for firmware updating.
In actual applications, the firmware of hardware device is upgraded needing, or upgradeable solid having detected During part file, kernel can obtain the target firmware file for firmware updating from native file system.
S120: according to the summary data of record in target firmware file, determine the first summary info.
In embodiments of the present invention, in target firmware file, record has manufacturer's firmware content and summary data, this summary number According to using default digest algorithm in advance for manufacturer, the data obtained after extracting the summary of manufacturer's firmware content.
According to the summary data of record in target firmware file, it may be determined that the first summary info.If target firmware is civilian In part, the summary data of record is non-encrypted data, then can be directly defined as by the summary data of record in target firmware file First summary info.In actual applications, for strengthening the safety of firmware file, summary data can be encrypted, according to The summary data of record in target firmware file, it may be determined that the first summary info.
In a kind of detailed description of the invention of the present invention, summary data is that manufacturer uses default digest algorithm in advance, carries Take in target firmware file the summary of the firmware content of record, and the data after this summary is encrypted, step S120 May comprise steps of:
Step one: extract the identification of the manufacturer information that target firmware file is corresponding in target firmware file;
Step 2: search the trusted public keys corresponding with identification of the manufacturer information from the trusted public keys storehouse being obtained ahead of time;
Step 3: use trusted public keys that the summary data of record in target firmware file is decrypted, it is thus achieved that first plucks Want information.
For ease of describing, above three step is combined and illustrates.
The identification of the manufacturer information that this target firmware file is corresponding, i.e. this target firmware can be recorded in target firmware file File is which manufacturer provides.Manufacturer, when issuing firmware file, issues it for key that cryptographic digest is used simultaneously To PKI.
Kernel can be obtained ahead of time the trusted public keys of multiple manufacturer, and this trusted public keys is that manufacturer is in encrypting manufacturer's firmware The PKI of the double secret key that the summary held is used.The trusted public keys of acquisition can be stored in trusted public keys storehouse by kernel.Can In letter PKI storehouse, the storage corresponding with the trusted public keys that this manufacturer issues of the identification of the manufacturer information of each manufacturer.
Corresponding identification of the manufacturer information can be extracted, then from the trusted public keys storehouse being obtained ahead of time in target firmware file The trusted public keys that middle lookup is corresponding with this identification of the manufacturer information.
After finding the trusted public keys corresponding with identification of the manufacturer information in trusted public keys storehouse, it is possible to use this trusted public keys Being decrypted the summary data of record in target firmware file, the summary data after deciphering is the first summary info.
Specifically used enciphering and deciphering algorithm can be preassigned enciphering and deciphering algorithm, it is also possible to be in target firmware file The enciphering and deciphering algorithm of record.
S130: according to default digest algorithm, extracts the summary of manufacturer's firmware content of record in target firmware file, obtains Obtain the second summary info.The digest algorithm here preset at is consistent with the digest algorithm corresponding to summary data in step S120.
In embodiments of the present invention, the digest algorithm preset can be preassigned a kind of digest algorithm, it is also possible to be The digest algorithm of record in target firmware file.
According to default digest algorithm, the summary of manufacturer's firmware content of record in target firmware file can be extracted, obtain Obtain the second summary info.
It should be noted that the execution sequence of step S120 and step S130 is not limited by the embodiment of the present invention.
S140: contrast the first summary info and the second summary info.
In step S120, kernel determines the first summary info, and this first summary info is corresponding, manufacturer in advance according to The summary of manufacturer's firmware content that the digest algorithm preset extracts.In step S130, kernel obtains the second summary info, and this is years old Two summary infos are corresponding, the summary of manufacturer's firmware content that kernel extracts according to the digest algorithm preset.
By the first summary info and the second summary info are compared, it may be determined that this target firmware file reliable Property.
S150: if the first summary info and the second summary info are consistent is then hard according to record in target firmware file Part equipment identification information, uses target firmware file to upgrade the firmware of corresponding hardware device.
If the first summary info and the second summary info are consistent, then show the probability that this target firmware file is tampered Less, reliability is higher, can use this target firmware according to the hardware device identification information of record in this target firmware file The firmware of corresponding hardware device is upgraded by file.Concrete, this target firmware file can be passed to accordingly by kernel The driving of hardware device, to complete the upgrade job of the firmware of this hardware device.
If the first summary info and the second summary info are inconsistent, then show that this target firmware file may be usurped Changing, reliability is less.If using this target firmware file that the firmware of hardware device is upgraded, may be to department of computer science System produces harm.In such a case, it is possible to be not loaded with this target firmware file.Can also export and with this target firmware file be The information that unreliable upgrade file is relevant, prompting this target firmware file of user may be destroyed.
The method that the application embodiment of the present invention is provided, gets after the target firmware file of firmware updating, according to The summary data of record in target firmware file, it may be determined that the first summary info, according to default digest algorithm, can extract The summary of manufacturer's firmware content of record in this target firmware file, it is thus achieved that the second summary info, by contrast the first summary letter Breath and the second summary info, determine the reliability of target firmware file, if the two is consistent, then uses this target firmware file pair The firmware of corresponding hardware device is upgraded.So can avoid using insecure firmware file to carry out firmware upgrade to interior The potential safety hazard that nucleus band comes, improves the safety of computer system.
In one embodiment of the invention, before step S120, the method can also comprise the following steps:
Determine the current version information of record in target firmware file and rely on whether version information meets default version Dependence, if it is, perform the operation of step S120.
In embodiments of the present invention, target firmware file can record current version information and relied on version information. After kernel gets target firmware file, can first determine the current version information of record in this target firmware file and rely on version Whether this information meets default version dependence.The version dependence preset can be set according to practical situation, Such as, the version number relied in version information needs less than the version number in current version information.
If met, then continue executing with the operation of step S120, if it is not, then this target firmware file may be unreliable, This target firmware file can be not loaded with, or relevant information the most corresponding to version can be exported.
In one embodiment of the invention, the current version information of record and dependence version in determining target firmware file Before whether this information meets default version dependence, the method can also comprise the following steps:
According to the cyclic redundancy check (CRC) mark of record in target firmware file, determine that target firmware file is the most complete, as Fruit is, then perform determine the current version information of record in target firmware file and rely on whether version information meets default version The operation of this dependence.
In embodiments of the present invention, target firmware file can record cyclic redundancy check (CRC) mark.According to this circulation Redundancy check identifies, it may be determined that this target firmware file is the most complete, determines if it is, continue executing with version dependence Operation or executive summary information contrast operation.
In actual applications, the various embodiments described above can be combined, improve the safety of system, wait camouflage to hiding Virus also has preferable preventive effect.
In embodiments of the present invention, target firmware file can have an as shown in table 1 file format preset:
Table 1
Cyclic redundancy check (CRC) mark CRC32: for determining the integrity of target firmware file according to this mark, it is to avoid because adding Carry information dropout that is abnormal and that cause;
Identification of the manufacturer VendorId: for the manufacturer belonging to record object firmware file;
Hardware device mark ProductId: for the hardware device corresponding to record object firmware file;
Current version Current Version: for record object firmware file current version information;
Rely on version Request Version: for the dependence version letter that record object firmware file current version is corresponding Breath;
Summary data Encrypt Digest: use digest algorithm acquisition to pluck manufacturer's firmware content for recording needle Want, and the data after using enciphering and deciphering algorithm and manufacturer's private key that this summary is encrypted;
Digest algorithm Digest Method: generate the digest algorithm that summary data is used for recording;
Enciphering and deciphering algorithm Encrypt Method: the enciphering and deciphering algorithm used for docket data;
Size Size: for recording the size of manufacturer's firmware content;
Manufacturer firmware content Vendor Firmware Content: be used for recording manufacturer's firmware content.
Each manufacturer, when issuing firmware file, can generate according to above-mentioned file format and have unified file format Firmware file.After kernel gets firmware file, this firmware file can be entered according to these information of record in firmware file Row is complete and security screening, to avoid insecure firmware file to work the mischief security of system.
Corresponding to above method embodiment, the embodiment of the present invention additionally provides a kind of device for upgrading firmware.See Fig. 2 institute Showing, this device can include with lower module:
Target firmware file acquisition module 210, for obtaining the target firmware file for firmware updating;
First summary info determines module 220, for according to the summary data of record in target firmware file, determining first Summary info;
Second summary info obtains module 230, for according to the digest algorithm preset, extracts record in target firmware file The summary of manufacturer's firmware content, it is thus achieved that the second summary info;
Summary info contrast module 240, for contrast the first summary info and the second summary info;
Firmware upgrade module 250, for when the first summary info and the second summary info are consistent, according to target firmware literary composition The hardware device identification information of record in part, uses target firmware file to upgrade the firmware of corresponding hardware device.
The device that the application embodiment of the present invention is provided, gets after the target firmware file of firmware updating, according to The summary data of record in target firmware file, it may be determined that the first summary info, according to default digest algorithm, can extract The summary of manufacturer's firmware content of record in this target firmware file, it is thus achieved that the second summary info, by contrast the first summary letter Breath and the second summary info, determine the reliability of target firmware file, if the two is consistent, then uses this target firmware file pair The firmware of corresponding hardware device is upgraded.So can avoid using insecure firmware file to carry out firmware upgrade to interior The potential safety hazard that nucleus band comes, improves the safety of computer system.
In one embodiment of the invention, this device can also include with lower module:
Version dependence determines module, for determining the current version information of record in target firmware file and relying on version Whether this information meets default version dependence, if it is, trigger the first summary info to determine module 220.
In one embodiment of the invention, this device can also include with lower module:
Integrity determines module, for according to the cyclic redundancy check (CRC) mark of record in target firmware file, determining target Firmware file is the most complete, if it is, trigger version dependence to determine module.
In a kind of detailed description of the invention of the present invention, summary data is that manufacturer uses default digest algorithm in advance, carries Take in target firmware file the summary of manufacturer's firmware content of record, and the data after this summary is encrypted, first Summary info determines module 220, specifically for:
The identification of the manufacturer information that target firmware file is corresponding is extracted in target firmware file;
The trusted public keys corresponding with identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use trusted public keys that the summary data of record in target firmware file is decrypted, it is thus achieved that the first summary info.
In one embodiment of the invention, this device can also include with lower module:
Information output module, for when the first summary info and the second summary info are inconsistent, exports and target Firmware file is the information that unreliable upgrade file is relevant.
In this specification, each embodiment uses the mode gone forward one by one to describe, and what each embodiment stressed is and other The difference of embodiment, between each embodiment, same or similar part sees mutually.For filling disclosed in embodiment For putting, owing to it corresponds to the method disclosed in Example, so describe is fairly simple, relevant part sees method part Illustrate.
Professional further appreciates that, in conjunction with the unit of each example that the embodiments described herein describes And algorithm steps, it is possible to electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware and The interchangeability of software, the most generally describes composition and the step of each example according to function.These Function performs with hardware or software mode actually, depends on application-specific and the design constraint of technical scheme.Specialty Technical staff specifically should can be used for using different methods to realize described function to each, but this realization should not Think beyond the scope of this invention.
The method described in conjunction with the embodiments described herein or the step of algorithm can direct hardware, processor be held The software module of row, or the combination of the two implements.Software module can be placed in random access memory (RAM), internal memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, depositor, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Above a kind of firmware upgrade method provided by the present invention and device are described in detail.Used herein Principle and the embodiment of the present invention are set forth by specific case, and the explanation of above example is only intended to help to understand this The method of invention and core concept thereof.It should be pointed out that, for those skilled in the art, without departing from this On the premise of bright principle, it is also possible to the present invention is carried out some improvement and modification, these improve and modification also falls into present invention power In the protection domain that profit requires.

Claims (10)

1. a firmware upgrade method, it is characterised in that including:
Obtain the target firmware file for firmware updating;
According to the summary data of record in described target firmware file, determine the first summary info;
According to default digest algorithm, extract the summary of manufacturer's firmware content of record in described target firmware file, it is thus achieved that the Two summary infos;
Contrast described first summary info and described second summary info;
If described first summary info is consistent with described second summary info, then according to record in described target firmware file Hardware device identification information, uses described target firmware file to upgrade the firmware of corresponding hardware device.
Method the most according to claim 1, it is characterised in that described according to plucking of recording in described target firmware file Wanting data, before determining the first summary info, described method also includes:
Determine the current version information of record in described target firmware file and rely on whether version information meets default version Dependence, if it is, perform described according to the summary data of record in described target firmware file, determines the first summary letter The operation of breath.
Method the most according to claim 2, it is characterised in that determine that record in described target firmware file works as described Before whether front version information and dependence version information meet default version dependence, described method also includes:
According to the cyclic redundancy check (CRC) mark of record in described target firmware file, determine that described target firmware file is the completeest Whole, if it is, perform the described current version information determining in described target firmware file record and rely on version information and be The no operation meeting default version dependence.
4. according to the method described in any one of claims 1 to 3, it is characterised in that described summary data is that manufacturer uses in advance The described digest algorithm preset, extracts the summary of manufacturer's firmware content of record in described target firmware file, and to this summary Data after being encrypted, described according to the summary data of record in described target firmware file, determine the first summary letter Breath, including:
The identification of the manufacturer information that described target firmware file is corresponding is extracted in described target firmware file;
The trusted public keys corresponding with described identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use described trusted public keys that the summary data of record in described target firmware file is decrypted, it is thus achieved that the first summary letter Breath.
Method the most according to claim 4, it is characterised in that described method also includes:
If described first summary info and described second summary info are inconsistent, then output and described target firmware file are not The information that reliable upgrade file is relevant.
6. a device for upgrading firmware, it is characterised in that including:
Target firmware file acquisition module, for obtaining the target firmware file for firmware updating;
First summary info determines module, for according to the summary data of record in described target firmware file, determining that first plucks Want information;
Second summary info obtains module, for according to the digest algorithm preset, extracts record in described target firmware file The summary of manufacturer's firmware content, it is thus achieved that the second summary info;
Summary info contrast module, is used for contrasting described first summary info and described second summary info;
Firmware upgrade module, for when described first summary info is consistent with described second summary info, according to described target In firmware file, the hardware device identification information of record, uses described target firmware file to enter the firmware of corresponding hardware device Row upgrading.
Device the most according to claim 6, it is characterised in that described device also includes:
Version dependence determines module, for determining the current version information of record in described target firmware file and relying on version Whether this information meets default version dependence, if it is, trigger described first summary info to determine module.
Device the most according to claim 7, it is characterised in that described device also includes:
Integrity determines module, for according to the cyclic redundancy check (CRC) mark of record in described target firmware file, determining described Target firmware file is the most complete, if it is, trigger described version dependence to determine module.
9. according to the device described in any one of claim 6 to 8, it is characterised in that described summary data is that manufacturer uses in advance The described digest algorithm preset, extracts the summary of manufacturer's firmware content of record in described target firmware file, and to this summary Data after being encrypted, described first summary info determines module, specifically for:
The identification of the manufacturer information that described target firmware file is corresponding is extracted in described target firmware file;
The trusted public keys corresponding with described identification of the manufacturer information is searched from the trusted public keys storehouse being obtained ahead of time;
Use described trusted public keys that the summary data of record in described target firmware file is decrypted, it is thus achieved that the first summary letter Breath.
Device the most according to claim 9, it is characterised in that described device also includes:
Information output module, for when described first summary info and described second summary info are inconsistent, output with Described target firmware file is the information that unreliable upgrade file is relevant.
CN201610509472.9A 2016-06-30 2016-06-30 A kind of firmware upgrade method and device Pending CN106203071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610509472.9A CN106203071A (en) 2016-06-30 2016-06-30 A kind of firmware upgrade method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610509472.9A CN106203071A (en) 2016-06-30 2016-06-30 A kind of firmware upgrade method and device

Publications (1)

Publication Number Publication Date
CN106203071A true CN106203071A (en) 2016-12-07

Family

ID=57464446

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610509472.9A Pending CN106203071A (en) 2016-06-30 2016-06-30 A kind of firmware upgrade method and device

Country Status (1)

Country Link
CN (1) CN106203071A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106685653A (en) * 2016-12-29 2017-05-17 同济大学 Vehicle remote firmware updating method and device based on information security technology
CN106815050A (en) * 2016-12-30 2017-06-09 深圳怡化电脑股份有限公司 A kind of firmware management method and device of embedded device
CN107491328A (en) * 2017-08-02 2017-12-19 广东美的暖通设备有限公司 Updating firmware program method, system and electric equipment
CN108446133A (en) * 2018-03-29 2018-08-24 广东美的暖通设备有限公司 Firmware upgrade control method, firmware upgrade control system and electric appliance
CN108848094A (en) * 2018-06-22 2018-11-20 平安科技(深圳)有限公司 Data security validation method, device, system, computer equipment and storage medium
CN109117168A (en) * 2018-08-29 2019-01-01 拓攻(南京)机器人有限公司 Unmanned plane firmware update, device, unmanned plane and storage medium
CN109214168A (en) * 2018-08-27 2019-01-15 阿里巴巴集团控股有限公司 Firmware upgrade method and device
CN109240721A (en) * 2018-08-24 2019-01-18 江苏恒宝智能系统技术有限公司 A kind of method of MCU online upgrading
CN109977674A (en) * 2017-12-28 2019-07-05 航天信息股份有限公司 The method for upgrading software and device of embedded device
CN110764811A (en) * 2019-09-05 2020-02-07 深圳优地科技有限公司 Firmware upgrading method and device
CN112699345A (en) * 2020-12-30 2021-04-23 合肥市芯海电子科技有限公司 Method, system, equipment and storage medium for safe operation of firmware

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing
CN102141940A (en) * 2010-12-29 2011-08-03 Tcl集团股份有限公司 Device, method and system for recovering firmware update
CN102981881A (en) * 2012-12-10 2013-03-20 中兴通讯股份有限公司 Method and system for preventing mobile terminal from being updated to illegal firmware version
CN104166565A (en) * 2014-08-11 2014-11-26 成都瑞博慧窗信息技术有限公司 Intelligent display terminal firmware updating method
US20150199518A1 (en) * 2014-01-10 2015-07-16 Canon Kabushiki Kaisha Image forming apparatus that performs update of firmware, and control method therefor

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing
CN102141940A (en) * 2010-12-29 2011-08-03 Tcl集团股份有限公司 Device, method and system for recovering firmware update
CN102981881A (en) * 2012-12-10 2013-03-20 中兴通讯股份有限公司 Method and system for preventing mobile terminal from being updated to illegal firmware version
US20150199518A1 (en) * 2014-01-10 2015-07-16 Canon Kabushiki Kaisha Image forming apparatus that performs update of firmware, and control method therefor
CN104166565A (en) * 2014-08-11 2014-11-26 成都瑞博慧窗信息技术有限公司 Intelligent display terminal firmware updating method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
中国信息安全产品测评认证中心编著: "《信息安全理论与技术》", 30 September 2003 *
廖滨华: "《网络知识与应用》", 31 March 2014 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106685653A (en) * 2016-12-29 2017-05-17 同济大学 Vehicle remote firmware updating method and device based on information security technology
CN106685653B (en) * 2016-12-29 2020-07-07 同济大学 Vehicle remote firmware updating method and device based on information security technology
CN106815050B (en) * 2016-12-30 2020-06-09 深圳怡化电脑股份有限公司 Firmware management method and device of embedded equipment
CN106815050A (en) * 2016-12-30 2017-06-09 深圳怡化电脑股份有限公司 A kind of firmware management method and device of embedded device
CN107491328A (en) * 2017-08-02 2017-12-19 广东美的暖通设备有限公司 Updating firmware program method, system and electric equipment
CN109977674A (en) * 2017-12-28 2019-07-05 航天信息股份有限公司 The method for upgrading software and device of embedded device
CN108446133A (en) * 2018-03-29 2018-08-24 广东美的暖通设备有限公司 Firmware upgrade control method, firmware upgrade control system and electric appliance
CN108848094A (en) * 2018-06-22 2018-11-20 平安科技(深圳)有限公司 Data security validation method, device, system, computer equipment and storage medium
CN108848094B (en) * 2018-06-22 2021-04-16 平安科技(深圳)有限公司 Data security verification method, device, system, computer equipment and storage medium
CN109240721A (en) * 2018-08-24 2019-01-18 江苏恒宝智能系统技术有限公司 A kind of method of MCU online upgrading
CN109214168A (en) * 2018-08-27 2019-01-15 阿里巴巴集团控股有限公司 Firmware upgrade method and device
CN109117168A (en) * 2018-08-29 2019-01-01 拓攻(南京)机器人有限公司 Unmanned plane firmware update, device, unmanned plane and storage medium
CN110764811A (en) * 2019-09-05 2020-02-07 深圳优地科技有限公司 Firmware upgrading method and device
CN112699345A (en) * 2020-12-30 2021-04-23 合肥市芯海电子科技有限公司 Method, system, equipment and storage medium for safe operation of firmware
CN112699345B (en) * 2020-12-30 2022-12-09 合肥市芯海电子科技有限公司 Method, system, equipment and storage medium for safe operation of firmware

Similar Documents

Publication Publication Date Title
CN106203071A (en) A kind of firmware upgrade method and device
WO2020192406A1 (en) Method and apparatus for data storage and verification
CN105765897B (en) A kind of security information preparation method, safe verification method and related chip
CN108255505A (en) A kind of firmware update, device, equipment and computer readable storage medium
CN107430658B (en) Security software certification and verifying
US20090019275A1 (en) Secure Boot Method and Semiconductor Memory System Using the Method
CN113014539B (en) Internet of things equipment safety protection system and method
CN104794388B (en) application program access protection method and application program access protection device
CN108108631A (en) A kind of root key processing method and relevant apparatus
JP2007034875A (en) Use management method for peripheral, electronic system and constituent device therefor
US20100185873A1 (en) System and method for file processing and file processing program
CN109144552A (en) A kind of boot firmware method for refreshing and device
CN105247833B (en) Self-certified apparatus and method for
CN104123488A (en) Method and device for verifying application program
CN104715208A (en) Platform integrity checking method based on TPM chip
US10387653B2 (en) Secure provisioning of semiconductor chips in untrusted manufacturing factories
CN103370718B (en) Use the data guard method of distributed security key, equipment and system
KR101425456B1 (en) Information generation system and method therefor
CN105303093A (en) Token verification method for cryptographic smart token
US8499357B1 (en) Signing a library file to verify a callback function
CN106203142A (en) A kind of method and device of the Primary Hard Drive data protecting computer
CN106095468B (en) A kind of computer starting method and device
CN112825093B (en) Security baseline checking method, host, server, electronic device and storage medium
CN107743306B (en) Intelligent POS machine WIFI setting method based on multi-password control and intelligent POS machine
CN111723379A (en) Trusted protection method, system, equipment and storage medium for trusted platform zone intelligent terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161207

RJ01 Rejection of invention patent application after publication