CN108154025A - Method, the method and device of application program mirror image processing of embedded device startup - Google Patents
Method, the method and device of application program mirror image processing of embedded device startup Download PDFInfo
- Publication number
- CN108154025A CN108154025A CN201711406066.0A CN201711406066A CN108154025A CN 108154025 A CN108154025 A CN 108154025A CN 201711406066 A CN201711406066 A CN 201711406066A CN 108154025 A CN108154025 A CN 108154025A
- Authority
- CN
- China
- Prior art keywords
- mirror image
- application program
- key
- program mirror
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present application discloses method, method, embedded device starter and the program image processing unit of program image processing that a kind of embedded device starts, close and verification is decrypted during for starting in embedded device to program image, improves the safety in program image start-up course.The embodiment of the present application method includes:Run BOOT program images;The key of symmetric encipherment algorithm is read, the key is for the corresponding decruption key of the encrypted key of application program mirror image;It is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;The application program mirror image after decryption is verified;If being verified successfully to the application program mirror image after decryption, start the corresponding application program of the application program mirror image.
Description
Technical field
The invention relates to the method for embedded device field more particularly to a kind of startup of embedded device, applications
Method, embedded device starter and the application program mirror image processing device of program image processing.
Background technology
With the development of electronic technology, embedded device is widely used in all trades and professions, embedded device mainly by
Embeded processor, associated support hardware and embedded system composition, embedded system have the convenient flexible, ratio of performance to price
High, the features such as embeddability is strong.
It is the necessary hardware environment of initialization first, including right in the startup program of the embedded device of the prior art
Embeded processor, memory, the initialization process of nonvolatile memory, secondly by being stored on nonvolatile memory
Program image is loaded into memory, is then exactly run the program being already loaded on memory and is redirected operation.
But in the prior art, user is the operation function for paying close attention to embedded device startup program so that embedded
Formula equipment normally initialization apparatus and loading procedure and can correctly be run, when embedded device institute's loading procedure is illegally used
When family is distorted or the program of the loading is illegal program, embedded device is caused to can not work normally.
Invention content
The embodiment of the present application discloses a kind of method that embedded device the starts, method of application program mirror image processing, embedding
Enter formula equipment starter and application program mirror image processing device, for starting in embedded device during to applying journey
Sequence mirror image is decrypted and verifies, and improves the safety during application program image starting.
The embodiment of the present application first aspect provides a kind of method that embedded device starts, including:
Run BOOT program images;
The key of symmetric encipherment algorithm is read, the key is close for the corresponding decryption of the encrypted key of application program mirror image
Key;
It is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
The application program mirror image after decryption is verified;
If being verified successfully to the application program mirror image after decryption, start the corresponding application of the application program mirror image
Program.
It is described based on the embodiment of the present application in a first aspect, in the first realization method of the embodiment of the present application first aspect
Verification is carried out to the application program mirror image after decryption to include:
Read RSA Algorithm public key, and using the RSA Algorithm public key to the application program mirror image after decryption into
Row verification;
Alternatively,
The application program mirror image after decryption is verified using hash check method or HMAC methods of calibration.
It is described based on the embodiment of the present application in a first aspect, in second of realization method of the embodiment of the present application first aspect
Using before application program mirror image is decrypted described in the key pair of the symmetric encipherment algorithm, the method further includes:
The upgrading mark of data partition is read, the data partition is the data partition of the nonvolatile memory;
Judge whether the application program mirror image is upgraded according to the upgrading mark;
If the application program mirror image is upgraded, the application program mirror image is upgraded;
Accordingly, it is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm, after decryption
The application program mirror image carry out verification include:
It is decrypted using upgrade procedure mirror image described in the key pair of the symmetric encipherment algorithm;
The upgrade procedure mirror image after decryption is verified;
If being verified successfully to the upgrade procedure mirror image after decryption, the corresponding application of the upgrade procedure mirror image is run
Program;
If verifying failure to the upgrade procedure mirror image after decryption, it is corresponding embedding to restart the upgrade procedure mirror
Enter formula equipment.
It is described based on the embodiment of the present application in a first aspect, in the third realization method of the embodiment of the present application first aspect
After being verified to the application program mirror image after decryption, the method further includes:
If verifying failure to the application program mirror image after decryption, upgrading mark is set to the application program mirror image
And rerun the corresponding embedded device of the application program mirror image.
The embodiment of the present application second aspect provides a kind of method of application program mirror image processing, including:
Key resource is generated, the key resource includes the key of symmetric encipherment algorithm, and the key is used for applying journey
Sequence mirror image is encrypted and decrypts;
It is encrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
The key of the symmetric encipherment algorithm and the encrypted application program mirror image programming are deposited to non-volatile
In reservoir.
It is described in the first realization method of the embodiment of the present application second aspect based on the embodiment of the present application second aspect
Using before application program mirror image is encrypted described in the key pair of the symmetric encipherment algorithm, the method further includes:
It is signed using the private key of RSA Algorithm to the application program mirror image;
Accordingly, by the key of the symmetric encipherment algorithm and the encrypted application program mirror image programming to it is non-easily
The property lost memory includes:
By the public key of the RSA Algorithm, the key of the symmetric encipherment algorithm, the encrypted application program mirror image with
And in signature programming to nonvolatile memory, the public key of the RSA Algorithm is used for the application program mirror image after signature
It is verified.
The embodiment of the present application third aspect provides a kind of embedded device starter, embedded device starter tool
There is the function of realizing embedded device starter behavior in above-mentioned first aspect.The function can also may be used by hardware realization
It is realized with performing corresponding software by hardware.The hardware or software include the one or more and corresponding mould of above-mentioned function
Block.
The embodiment of the present application fourth aspect provides a kind of application program mirror image processing device, application program mirror image processing device
Have the function of to realize application program mirror image processing device behavior in above-mentioned second aspect.The function can by hardware realization,
Corresponding software can also be performed by hardware to realize.The hardware or software include one or more corresponding with above-mentioned function
Module
The 5th aspect of the embodiment of the present application provides a kind of computer storage media, which is used to store
For the computer software instructions used in the embedded device starter of above-mentioned first aspect, performed including being used for as first party
Program designed by the embedded device starter in face.
The 6th aspect of the embodiment of the present application provides a kind of computer storage media, which is used to store
It is second including being used to perform for the computer software instructions used in the application program mirror image processing device of above-mentioned second aspect
Program designed by the application program mirror image processing device of aspect.
The 7th aspect of the embodiment of the present application provides a kind of computer program product, which includes calculating
Machine software instruction, the computer software instructions can be loaded to realize above-mentioned first aspect and second aspect by processor
Method flow.
As can be seen from the above technical solutions, the embodiment of the present application has the following advantages:
In the present embodiment, during loading application programs mirror image, the key pair application journey of symmetric encipherment algorithm is used
Sequence mirror image is decrypted, and promotes the confidentiality of application program mirror image, carries out signature verification to the application program mirror image after decryption, carries
The high safety of the application program mirror image in start-up course, therefore, in the present embodiment to encrypted application program mirror image into
Row decryption and verification improve the reliability of the application program mirror image of startup and cause the corresponding application of application program mirror image
Normal program operation.
Description of the drawings
Fig. 1 is that embedded device starts block schematic illustration in the embodiment of the present application;
Fig. 2 is one embodiment schematic diagram of the method that embedded device starts in the embodiment of the present application;
Fig. 3 is one embodiment schematic diagram of the method for application program mirror image processing in the embodiment of the present application;
Fig. 4 is another embodiment schematic diagram of the method that embedded device starts in the embodiment of the present application;
Fig. 5 is another embodiment schematic diagram of the method for application program mirror image processing in the embodiment of the present application;
Fig. 6 is one embodiment schematic diagram of embedded device starter in the embodiment of the present application;
Fig. 7 is one embodiment schematic diagram of application program mirror image processing device in the embodiment of the present application;
Fig. 8 is another embodiment schematic diagram of embedded device starter in the embodiment of the present application;
Fig. 9 is another embodiment schematic diagram of application program mirror image processing device in the embodiment of the present application.
Specific embodiment
The embodiment of the present application discloses a kind of method that embedded device the starts, method of application program mirror image processing, embedding
Enter formula equipment starter and application program mirror image processing device, for starting in embedded device during to applying journey
Sequence mirror image is decrypted and verifies, and improves the safety during application program image starting.
The embodiment of the present application can start frame diagram in embedded device as shown in Figure 1, which starts frame
Mainly include BOOTROM operation phase, BOOT operation phase, application program operation phase in figure.
The BOOTROM operation phase are mainly integrated in cured one section of code in chip, according to different embedded chips
The crucial of chip is carried out to start code and create most basic hardware environment, and jump to the fortune of the BOOT codes in memory
Row.
The BOOT operation phase mainly initialize soft hardware equipment, and loading system application program mirror image jumps to corresponding
Application program.
The application program operation phase is mainly the application program for running embedded device, which can be for use
Family is customized the primary application program of exploitation or application program is iterated the upgrade applications of upgrading.
In the embodiment of the present application, during embedded device starts, embeded processor (central is related generally to
Processing unit, CPU), nonvolatile memory, these three devices of memory, it should be noted that memory can be
Sdram memory or DDR memories, do not limit herein.
Embeded processor is mainly to provide hardware enciphering and deciphering and verifies relevant hardware resource.
Nonvolatile memory, which mainly stores program code and power down, needs data to be saved.
Sdram memory or DDR memories are mainly the storage for running related program code and interim operation data.
Embedded device based on above-mentioned Fig. 1 starts the BOOT operation phase of frame diagram, please refers to Fig.2, and the application is implemented
Method one embodiment that embedded device starts in example includes:
201st, BOOT program images are run.
In the embedded device BOOTROM operation phase, the BOOT of the CPU reading non-volatile storages of embedded device
On program image to DDR memories, then start BOOT program images, and a pair software and hardware corresponding with embedded device carries out initially
Change is handled.
It should be noted that in this implementation, memory can also be sdram memory or other kinds of memory, herein not
It limits, the present embodiment and subsequent embodiment are only illustrated as an example with DDR memories.
202nd, the key of symmetric encipherment algorithm is read.
After BOOT program images are run, CPU loading application programs mirror images, since the application program mirror image is by adding
Close program is needed to being decrypted using program image, and therefore, CPU reads symmetric cryptography calculation from nonvolatile memory
On the key of method to DDR memories, in addition, CPU can also read the key of symmetric encipherment algorithm to DDR from BOOT program images
On memory, it should be noted that it is identical that application program image, which is encrypted with the key decrypted, using symmetric encipherment algorithm
, i.e., encryption key is identical with decruption key in a symmetric encryption algorithm.
203rd, it is decrypted using the key pair application program mirror image of symmetric encipherment algorithm.
After CPU reads the key of symmetric encipherment algorithm, CPU uses the key pair application program mirror image of symmetric encipherment algorithm
It is decrypted, obtains the application program mirror image of plaintext.Specifically, CPU uses symmetrically add with encrypted to the application program mirror image
The application program mirror image of ciphertext is decrypted in the algorithm for inversion of close algorithm, and the application program mirror image is made to become the application program of plaintext
Mirror image.
204th, the application program mirror image after decryption is verified;If verifying successfully, step 205 is performed, if verification is lost
It loses, then performs step 206.
In order to enable the safe source for the application program mirror image that CPU is read is reliable, CPU carries out school to the application program mirror image
It tests, specifically, CPU can verify the application program mirror image using RSA Algorithm, it should be noted that in the present embodiment
Hash check method can also be used, and either HMAC methods of calibration verify the application program mirror image or other verification sides
Method is not limited herein being verified to the greatest extent using program image.
In the present embodiment, it should be noted that step 203 and step 204 can be first carried out without specifically performing sequence
Step 203 performs step 204 again, can also first carry out step 204 and perform step 203 again, not limit herein.
205th, start application program.
If CPU, which examines the application program mirror image after decryption, successfully, illustrates that the safe source of the application program mirror image can
It leans on, then CPU can perform corresponding code and start the corresponding application program of application program mirror image so that the application program is just
Normal operation function.
206th, other.
If CPU to after decryption application program mirror image examine failure, illustrate the application program mirror image source it is insincere or
The program code of person's application program mirror image is distorted by Chu, then CPU does not start the corresponding application program of the application program, is performed
Others operation, for example, reruning the corresponding embedded device of application program mirror image or being risen to application program image setting
Grade label etc..
In the present embodiment, during CPU loading application programs mirror images, the key pair application journey of symmetric encipherment algorithm is used
Sequence mirror image is decrypted, and CPU verifies the application program mirror image after decryption, verifies and successfully illustrates the application program mirror image
Source is credible, therefore, in the present embodiment only encrypted application program mirror image is decrypted and verified could perform it is next
Step operation, improves the security performance of the application program mirror image of CPU loadings, and causes the application program mirror image is corresponding to apply journey
Sequence normal operation.
The method started above to the embedded device in the embodiment of the present application is described, and the application is implemented below
The method of application program mirror image processing is described in example, please refers to Fig.3, application program mirror image processing in the embodiment of the present application
One embodiment of method includes:
301st, key resource is generated.
Before loading application programs mirror image, the generation of application program mirror image processing device using program image to being encrypted
And the key resource of decryption, the key resource include the key of symmetric encipherment algorithm, which is used for applying program image
It is encrypted and decrypts, it should be noted that be identical key to being encrypted using program image with the key decrypted.
302nd, it is encrypted using the key pair application program mirror image of symmetric encipherment algorithm.
Application program mirror image processing device generation key resource after, using symmetric encipherment algorithm to application program image into
Row encryption, specifically, is encrypted so that the application program mirror image using the key pair application program mirror image of symmetric encipherment algorithm
It is stored in memory in the form of ciphertext, improves the confidentiality of the application program mirrored content.
303rd, by the key of symmetric encipherment algorithm and encrypted application program mirror image programming to nonvolatile memory
In.
After to being encrypted using program image, application program mirror image processing device is by fever writes by symmetric cryptography
In the key of algorithm and encrypted application program mirror image programming to nonvolatile memory, specifically, application program mirror image
After the key of symmetric encipherment algorithm and encrypted application program mirror image are converted into its corresponding form by processing unit,
By the key of the symmetric encipherment algorithm after format transformation and encrypted application program mirror image programming to nonvolatile memory
In.
It should be noted that in the present embodiment, the key storage BOOT program images of symmetric encipherment algorithm can also be worked as
In, then by the BOOT program image programmings to nonvolatile memory for storing key, reading symmetric cryptography calculation in this way
During the key of method, the key of symmetric encipherment algorithm can be read in BOOT program images.
It should be noted that being only illustrated in this implementation with the encryption of application program mirror image, the present embodiment may be used also
Upgrade procedure mirror image to be encrypted or other image programs are encrypted, it is not specifically limited herein.
In the present embodiment, by generating key resource, being answered using the key pair of the symmetric encipherment algorithm in key resource
It is encrypted with program image, by the key of symmetric encipherment algorithm and encrypted application program mirror image programming to non-volatile
In memory, the application program mirror image is encrypted in the present embodiment so that encrypted application program mirror image is non-volatile
Property memory or other processing procedure in ensure that the confidentiality of application program mirrored content, improve the application program mirror
The integrality of picture and safety.
Nonvolatile memory can be FLASH memory, or other kinds of memory, such as magnetic random
Memory (magnetic random access memory, MRAM), in the present embodiment and subsequent embodiment, only with FLASH
Memory is illustrated as the example of nonvolatile memory, in practice, can with when other kinds of business, it is specific this
Place does not limit.
Above the method for the application program mirror image processing in the embodiment of the present application is described, below in practice
The method that example starts embedded device in the embodiment of the present application is described, and please refers to Fig.4, embedded in the embodiment of the present application
Another embodiment for the method that formula equipment starts includes:
401st, BOOT program images are run.
402nd, the key of symmetric encipherment algorithm is read.
In the present embodiment, step 401 to step 402 is similar to step 202 with the step 201 in earlier figures 2, herein no longer
It repeats.
403rd, the upgrading mark of data partition is read.
CPU reads upgrading mark, the upgrading mark mark in a subregion of FLASH memory for upgrading mark is stored
Know whether the application program mirror image needs to upgrade.
404th, judge whether application program mirror image is upgraded according to upgrading mark;If it is not, step 405 is then performed,
If so, perform step 409.
After CPU has read the upgrading mark of application program mirror image, CPU judges the application program mirror according to the upgrading mark
Seem it is no need to upgrade, specifically, whether CPU can judge the application program mirror image according to the mark of the carrying of the upgrading mark
It needs to upgrade, does not need to upgrade if the application program mirror image is the application program mirror image of latest edition, otherwise, journey is applied to this
Sequence mirror image is upgraded.
405th, it is decrypted using the key pair application program mirror image of symmetric encipherment algorithm.
If CPU judges that the application program mirror image does not need to be upgraded, CPU uses the key pair of symmetric encipherment algorithm
Application program mirror image is decrypted, and obtains the application program mirror image of plaintext.Specifically, CPU uses with to the application program mirror image
The application program mirror image of ciphertext is decrypted in the algorithm for inversion for encrypting identical symmetric encipherment algorithm, becomes the application program mirror image
The application program mirror image of plaintext.
406th, the application program mirror image after decryption is verified, step 407 is performed if verifying successfully, if verification is lost
It loses, then performs step 408.
For CPU in checking procedure is carried out to the application program mirror image after decryption, CPU reads RSA Algorithm from FLASH memory
Public key, it should be noted that CPU can also read the public key of RSA Algorithm from BOOT program images, not limit herein,
The private key of RSA Algorithm used during due to signing using program image, only the private key of the RSA Algorithm corresponds to
Public key could to application program image decrypt.Read RSA Algorithm public key after, using the public key of RSA Algorithm to decryption after
Application program mirror image carry out signature verification.Specifically, HASH calculating is carried out to application program image, obtains a number of targets
According to, then using public key for signature be decrypted, the data after decryption are compared with target data, if decrypt after number
According to consistent with target data, then success is verified, if the data after decryption and target data are inconsistent, otherwise verification fails.
It should be noted that in the present embodiment, after hash check method or HMAC methods of calibration also can be used to decryption
Application program mirror image verified or other methods of calibration, do not limit herein.
407th, start application program.
Data after decryption are consistent with target data, then the application program mirror image after decryption are verified successfully, CPU is to school
It tests successful application program mirror image and performs enabled instruction, start the corresponding application program of application program mirror image so that using journey
Sequence is normally run.
408th, to application program image setting upgrading mark.
If the data and target data after decryption are inconsistent, failure is verified to the application program mirror image after decryption, then CPU
Upgrading mark is set to the application program mirror image, which, which identifies the application program mirror image, needs to upgrade, and then reruns
The BOOT program images, and perform corresponding upgrading flow.
409th, it is decrypted using the key pair upgrade applications mirror image of symmetric encipherment algorithm.
If CPU judges application program, mirror image is upgraded, which is upgraded, is then made
It is decrypted with the key pair upgrade procedure mirror image of symmetric encipherment algorithm, obtains the upgrade procedure mirror image of plaintext.Specifically, CPU
The upgrade procedure mirror image of ciphertext is carried out using the algorithm for inversion with the symmetric encipherment algorithm identical to the upgrade procedure mirror image encryption
Decryption makes the upgrade procedure mirror image become the upgrade procedure mirror image of plaintext.
410th, the upgrade procedure mirror image after decryption is verified, step 411 is performed if verifying successfully, if verification is lost
It loses, then performs step 412.
For CPU in checking procedure is carried out to the upgrade procedure mirror image after decryption, CPU reads RSA Algorithm from FLASH memory
Public key, it should be noted that CPU can also read the public key of RSA Algorithm from BOOT program images, not limit herein.
The public key is the corresponding public key of private key for upgrade procedure mirror image signature, due to carrying out what signature used to upgrade procedure mirror image
It is the private key of RSA Algorithm, therefore, the corresponding public key of cipher key pair private key of the only RSA Algorithm could be decrypted.RSA is read to calculate
After the public key of method, signature verification is carried out to the upgrade procedure mirror image after decryption using the public key of RSA Algorithm, specifically, to rising
Grade program image carries out HASH calculating, obtains a target data, then signature is decrypted using public key, after decryption
Data compared with target data, if decryption after data it is consistent with target data, verify success, if decrypt after number
According to, otherwise verification failure inconsistent with target data.
It should be noted that in the present embodiment, after hash check method or HMAC methods of calibration also can be used to decryption
Upgrade procedure mirror image verified or other methods of calibration, do not limit herein.
411st, start upgrade procedure.
Data after decryption are consistent with target data, then the upgrade procedure mirror image after decryption are verified successfully, CPU is to school
It tests successful upgrade procedure mirror image and performs enabled instruction, start the corresponding upgrade procedure of upgrade procedure mirror image so that upgrading journey
Sequence is normally run.
412nd, restart BOOT program images.
If to after decryption application program mirror image verify failure, illustrate to signature decrypt after data and target data into
Row is inconsistent, and therefore, CPU performs instruction of restarting, the corresponding embedded device of re-launching applications mirror image.
In the present embodiment, before the application program mirror image of the CPU loadings of embedded device, CPU pairs of application program mirror image
It is decrypted and verifies, since decryption needs the corresponding decruption key of encryption key, only correct key could be right
Application program mirror image is decrypted so that application program mirror image, can not when lacking decruption key or decruption key mistake
Start the corresponding application program of application program mirror image, application program image is carried out in checking procedure, CPU reads RSA Algorithm
Public key carry out signature verification, the corresponding application program of application program mirror image could successfully be run by only verify, therefore, our
In case, CPU pairs of application program mirror image is decrypted and verifies the secrecy of reliability and content for improving application program mirror image
Property.
The example of the method for the embedded device startup in the embodiment of the present application in practice is described above, under
Method example in practice in face of application program mirror image processing is described, and please refers to Fig. 5, is applied in the embodiment of the present application
Another embodiment of the method for program image processing includes:
501st, key resource is generated.
Before loading application programs mirror image, the generation of application program mirror image processing device using program image to being encrypted
And the key resource of decryption, the key resource include the key of symmetric encipherment algorithm and the private key and public key of RSA Algorithm, it should
Key is used for being encrypted and decrypted using program image, and the private key of the RSA Algorithm signs to application program, the RSA
The public key of algorithm carries out signature verification to application program, it should be noted that being encrypted and decryption using program image
Key is identical key, and the private key and public key of RSA Algorithm are different keys.
502nd, using the private key of RSA Algorithm to signing using program image.
After key resource is generated, application program mirror image processing device is using the private key of RSA Algorithm to application program mirror
As signing, specifically, HASH calculating is carried out to application program image, obtains HASH values, application program mirror image processing device
HASH values are encrypted using private key and are signed.
503rd, it is encrypted using the key pair application program mirror image of symmetric encipherment algorithm.
After application program mirror image processing device using program image to signing, using symmetric encipherment algorithm to application
Program image is encrypted, and specifically, is encrypted using the key pair application program mirror image of symmetric encipherment algorithm so that should answer
It is stored in memory in the form of ciphertext with program image, increases the confidentiality of the application program mirror image.
504th, by the public key of RSA Algorithm, the key of symmetric encipherment algorithm and signature and encrypted application program mirror image
In programming to nonvolatile memory.
After to being signed and being encrypted using program image, application program mirror image processing device will by fever writes
The public key of RSA Algorithm, the key of symmetric encipherment algorithm, encrypted application program mirror image and signature programming are deposited to non-volatile
In reservoir, specifically, application program mirror image processing device is by the public key of RSA Algorithm, the key, encrypted of symmetric encipherment algorithm
Application program mirror image and signature are converted into its corresponding form and then by the public keys of the RSA Algorithm after format transformation, symmetrical
In the key of Encryption Algorithm, encrypted application program mirror image and signature programming to nonvolatile memory.
It should be noted that in the present embodiment, it can also be by the public key of RSA Algorithm, the key storage of symmetric encipherment algorithm
In BOOT program images, the BOOT program mirrors of the key of the public key and symmetric encipherment algorithm of RSA Algorithm then will be stored
It, can in this way when reading the key of symmetric encipherment algorithm or reading RSA Algorithm key in picture programming to nonvolatile memory
To read the key of symmetric encipherment algorithm or RSA Algorithm key in BOOT program images.
It should be noted that the encryption and signature in this implementation only with application program mirror image are illustrated, this implementation
Example can also upgrade procedure mirror image is encrypted and be signed or other image programs are encrypted and sign, and does not do herein
It is specific to limit.
In the present embodiment, by generation encryption key resource and signature key resource, using signature key resource
Private key using program image to signing, then using the key pair application program mirror of the symmetric encipherment algorithm in key resource
As being encrypted, the public key of RSA Algorithm, the key of symmetric encipherment algorithm, encrypted application program mirror image and signature are burnt
It writes in nonvolatile memory, the application program mirror image is encrypted and signed in the technical program, it is ensured that is embedded to set
The safe source of the application program mirror image of standby loading.
The method of the application program mirror image processing in the embodiment of the present application is described above, below to the application reality
The embedded device starter applied in example is described:
Please refer to Fig. 6, one embodiment of embedded device starter includes in the embodiment of the present application:
Running unit 601, for running BOOT program images;
First reading unit 602, for reading the key of symmetric encipherment algorithm, key is encrypted for application program mirror image
The corresponding decruption key of key;
Decryption unit 603, for being decrypted using the key pair application program mirror image of symmetric encipherment algorithm;
Verification unit 604, for being verified to the application program mirror image after decryption;
Start unit 605, for when being verified successfully to the application program mirror image after decryption, starting application program mirror image pair
The application program answered.
In the present embodiment, verification unit 604 is specifically used for:
The public key of RSA Algorithm is read, and the application program mirror image after decryption is verified using the public key of RSA Algorithm;
Alternatively,
The application program mirror image after decryption is verified using hash check method or HMAC methods of calibration.
In the present embodiment, embedded device starter further includes:
Second reading unit 606, for reading the upgrading mark of data partition, data partition is nonvolatile memory
Data partition;
Judging unit 607, for judging whether application program mirror image is upgraded according to upgrading mark;
Upgrade unit 608, for when application program mirror image is upgraded, upgrading to application program image;
Accordingly, decryption unit 603 is used to be decrypted using the key pair upgrade procedure mirror image of symmetric encipherment algorithm;
Verification unit 604 is used to verify the upgrade procedure mirror image after decryption;
Start unit 605 is used for when being verified successfully to the upgrade procedure mirror image after decryption, starts the upgrade procedure mirror image
Corresponding upgrade procedure;
Restart unit 609, for verifying failure to the upgrade procedure mirror image after decryption, then restart upgrade procedure mirror pair
The embedded device answered.
In the present embodiment, embedded device starter further includes:
Setting unit 610, for when verifying failure to the application program mirror image after decryption, being set to application program image
Upgrading indicates and restarts application program mirror image.
In the present embodiment, before the application program mirror image that start unit 605 loads, decryption unit 603 is to application program mirror
As being decrypted, verification unit 604 using program image to verifying, since decryption needs the corresponding decryption of encryption key
Key, therefore only correct decruption key could ensure that application program mirrored content to being decrypted using program image
Confidentiality, to application program image carry out checking procedure in, the first reading unit 602 read RSA Algorithm public key carry out school
It tests, the corresponding application program of application program mirror image could successfully be started by only verifying, therefore, in the present solution, running unit 601
Application program mirror image after starting decryption and verifying, improves the reliability of application program mirror image and the confidentiality of content.
The embedded device starter in the embodiment of the present application is described above, below to the embodiment of the present application
In application program mirror image processing device be described:
Please refer to Fig. 7, one embodiment of application program mirroring apparatus includes in the embodiment of the present application:
Generation unit 701, for generating key resource, key resource includes the key of symmetric encipherment algorithm, and key is used for
To being encrypted and decrypting using program image;
Encryption unit 702, for being encrypted using the key pair application program mirror image of symmetric encipherment algorithm;
Programming unit 703, for by the key of symmetric encipherment algorithm and encrypted application program mirror image programming to non-
In volatile memory.
In the present embodiment, application program mirror image processing device further includes:
Signature unit 704, for being signed using the private key of RSA Algorithm to application program image;
Accordingly, 703 programming unit of programming unit be used for by the key of symmetric encipherment algorithm and it is encrypted apply journey
Sequence mirror image programming includes to nonvolatile memory:
Programming unit 703 is used for the public key of RSA Algorithm, the key of symmetric encipherment algorithm, encrypted application program mirror
In picture and signature programming to nonvolatile memory, the public key of RSA Algorithm is used to carry out the application program mirror image after signature
Verification.
In the present embodiment, encryption key resource and signature key resource, signature unit are generated by generation unit 701
704 sign to application program image using private key, and then encryption unit 702 uses the symmetric encipherment algorithm in key resource
Encryption key to being encrypted using program image, programming unit 703 by the public key of RSA Algorithm, symmetric encipherment algorithm it is close
In key, encrypted application program mirror image and signature programming to nonvolatile memory, journey is applied to this in the technical program
Sequence mirror image is encrypted and signs, and improves the safety of the application program mirror image and the confidentiality of content.
Please refer to Fig. 8, another embodiment of embedded device starter includes in the embodiment of the present application:
Fig. 8 is a kind of embedded device starter structure diagram provided in an embodiment of the present invention, the embedded device
Starter 800 can generate bigger difference due to configuration or different performance, can include one or more centres
Device (central processing units, CPU) 801 (for example, one or more processors) and memory 805 is managed,
One or more program or data are stored in the memory 805.
Wherein, memory 805 can be volatile storage or persistent storage.Being stored in the program of memory 805 can wrap
One or more modules are included, each module can include operating the series of instructions in embedded device starter.
Further, central processing unit 801 could be provided as communicating with memory 805, be held in embedded device starter 800
Series of instructions operation in line storage 805.
Embedded device starter 800 can also include one or more power supplys 802, one or more have
Line or radio network interface 803, one or more input/output interfaces 804 and/or, one or more operation system
System, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
It can be shown in Fig. 8 embedded based on this as the step performed by embedded device starter in above-described embodiment
Equipment starter structure.
Embedded device starter in the present embodiment, flow and earlier figures 2 and figure performed by central processing unit 701
The method flow described in embodiment shown in 4 is similar, and details are not described herein again.
Please refer to Fig. 9, another embodiment of application program mirror image processing device includes in the embodiment of the present application:
Fig. 9 is a kind of application program mirror image processing apparatus structure schematic diagram provided in an embodiment of the present invention, the application program
Mirror image processing device 900 can generate bigger difference due to configuration or different performance, can include in one or more
Central processor (central processing units, CPU) 901 (for example, one or more processors) and memory
905, one or more program or data are stored in the memory 905.
Wherein, memory 905 can be volatile storage or persistent storage.Being stored in the program of memory 905 can wrap
One or more modules are included, each module can include grasping the series of instructions in application program image processing unit
Make.Further, central processing unit 901 could be provided as communicating with memory 905, in application program mirror image processing device
The series of instructions operation in memory 905 is performed on 900.
Application program mirror image processing device 900 can also include one or more power supplys 902, one or more
Wired or wireless network interface 903, one or more input/output interfaces 904 and/or, one or more operation
System, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The application shown in Fig. 9 can be based on as the step performed by application program mirror image processing device in above-described embodiment
Program image processing unit structure.
Application program mirror image processing device in the present embodiment, flow performed by central processing unit 901 and earlier figures 3 and
Method flow described in embodiment shown in fig. 5 is similar, and details are not described herein again.
The embodiment of the present application also provides a kind of computer storage media, and the computer storage media is aforementioned embedding for saving as
Enter the computer software instructions used in formula equipment starter, including being designed by embedded device starter for performing
Program.
The embodiment of the present application also provides a kind of computer storage media, which is used to save as aforementioned answer
It is application program mirror image processing device institute including being used to perform with the computer software instructions used in program image processing unit
The program of design.
The embodiment of the present application also provides a kind of computer program product, which refers to including computer software
It enables, which can be loaded to realize the method stream in the embodiment shown in earlier figures 2 to 5 by processor
Journey.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit can refer to the corresponding process in preceding method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of division of logic function can have other dividing mode, such as multiple units or component in actual implementation
It may be combined or can be integrated into another system or some features can be ignored or does not redirect.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit
It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also
That each unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses
When, it can be stored in a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially
The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products
It embodies, which is stored in a storage medium, is used including some instructions so that a computer
Equipment (can be personal computer, server or the network equipment etc.) redirects the complete of each embodiment the method for the application
Portion or part steps.And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, above example are only to illustrate the technical solution of the application, rather than its limitations;Although with reference to before
Embodiment is stated the application is described in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding
The technical solution recorded in each embodiment is stated to modify or carry out equivalent replacement to which part technical characteristic;And these
Modification is replaced, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of method that embedded device starts, which is characterized in that including:
Run BOOT program images;
The key of symmetric encipherment algorithm is read, the key is for the corresponding decruption key of the encrypted key of application program mirror image;
It is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
The application program mirror image after decryption is verified;
If being verified successfully to the application program mirror image after decryption, it is corresponding using journey to start the application program mirror image
Sequence.
2. according to the method described in claim 1, it is characterized in that, the application program mirror image after described pair of decryption carries out school
Test including:
The public key of RSA Algorithm is read, and school is carried out to the application program mirror image after decryption using the public key of the RSA Algorithm
It tests;
Alternatively,
The application program mirror image after decryption is verified using hash check method or HMAC methods of calibration.
3. method according to claim 1 or 2, which is characterized in that the key pair using the symmetric encipherment algorithm
Before the application program mirror image is decrypted, the method further includes:
The upgrading mark of data partition is read, the data partition is the data partition of the nonvolatile memory;
Judge whether the application program mirror image is upgraded according to the upgrading mark;
If the application program mirror image is upgraded, the application program mirror image is upgraded;
Accordingly, it is decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm, to the institute after decryption
It states application program mirror image and verify and include:
It is decrypted using the key pair upgrade procedure mirror image of the symmetric encipherment algorithm;
The upgrade procedure mirror image after decryption is verified;
If being verified successfully to the upgrade procedure mirror image after decryption, the corresponding upgrading journey of the upgrade procedure mirror image is run
Sequence;
If verifying failure to the upgrade procedure mirror image after decryption, it is corresponding embedded to restart the upgrade procedure mirror
Equipment.
4. according to the method described in claim 3, it is characterized in that, the application program mirror image after described pair of decryption carries out school
After testing, the method further includes:
If verifying failure to the application program mirror image after decryption, upgrading mark is set to lay equal stress on to the application program mirror image
Newly run the corresponding embedded device of the application program mirror image.
A kind of 5. method of application program mirror image processing, which is characterized in that including:
Key resource is generated, the key resource includes the key of symmetric encipherment algorithm, and the key is used for application program mirror
As being encrypted and decrypting;
It is encrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
By the key of the symmetric encipherment algorithm and the encrypted application program mirror image programming to nonvolatile memory
In.
6. according to the method described in right 5, which is characterized in that applied described in the key pair using the symmetric encipherment algorithm
Before program image is encrypted, the method further includes:
It is signed using the private key of RSA Algorithm to the application program mirror image;
Accordingly, by the key of the symmetric encipherment algorithm and the encrypted application program mirror image programming to non-volatile
Memory includes:
By the public key of the RSA Algorithm, the key of the symmetric encipherment algorithm, the encrypted application program mirror image and label
In name programming to nonvolatile memory, the public key of the RSA Algorithm is used to carry out the application program mirror image after signature
Verification.
7. a kind of embedded device starter, which is characterized in that including:
Running unit, for running BOOT program images;
First reading unit, for reading the key of symmetric encipherment algorithm, the key is encrypted close for application program mirror image
The corresponding decruption key of key;
Decryption unit, for being decrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
Verification unit, for being verified to the application program mirror image after decryption;
Start unit, for when being verified successfully to the application program mirror image after decryption, starting the application program mirror image
Corresponding application program.
8. a kind of application program mirror image processing device, which is characterized in that including:
Generation unit, for generating key resource, the key resource includes the key of symmetric encipherment algorithm, and the key is used for
To being encrypted and decrypting using program image;
Encryption unit, for being encrypted using application program mirror image described in the key pair of the symmetric encipherment algorithm;
Programming unit, for by the key of the symmetric encipherment algorithm and the encrypted application program mirror image programming to non-
In volatile memory.
9. a kind of embedded device processing unit, which is characterized in that including:Memory, transceiver and at least one processor, institute
It states and instruction is stored in memory;The memory, the transceiver and at least one processor are interconnected by circuit;
At least one processor calls described instruction, redirects in Claims 1-4 any one of them method described embedding
Enter the Message Processing of formula equipment starter side progress or control operation;
Alternatively,
At least one processor calls described instruction, redirects in claim 5 to 6 any one of them method and is answered described
The Message Processing carried out with program image processing unit side or control operation.
10. a kind of computer readable storage medium, which is characterized in that including instructing, when described instruction is run on computers,
So that computer redirects method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711406066.0A CN108154025A (en) | 2017-12-22 | 2017-12-22 | Method, the method and device of application program mirror image processing of embedded device startup |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711406066.0A CN108154025A (en) | 2017-12-22 | 2017-12-22 | Method, the method and device of application program mirror image processing of embedded device startup |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108154025A true CN108154025A (en) | 2018-06-12 |
Family
ID=62464332
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711406066.0A Pending CN108154025A (en) | 2017-12-22 | 2017-12-22 | Method, the method and device of application program mirror image processing of embedded device startup |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108154025A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109308195A (en) * | 2018-08-22 | 2019-02-05 | 青岛海信电器股份有限公司 | Starting method, embedded device and the computer storage medium of embedded device |
CN109683985A (en) * | 2018-12-19 | 2019-04-26 | 中国电子科技集团公司第五十四研究所 | A kind of more image starting methods of DSP based on AIS order |
CN110555309A (en) * | 2019-09-10 | 2019-12-10 | 深圳市英博超算科技有限公司 | Starting method, starting device, terminal and computer readable storage medium |
WO2020037612A1 (en) * | 2018-08-23 | 2020-02-27 | 深圳市汇顶科技股份有限公司 | Embedded program secure boot method, apparatus and device, and storage medium |
CN110990084A (en) * | 2019-12-20 | 2020-04-10 | 紫光展讯通信(惠州)有限公司 | Chip secure starting method and device, storage medium and terminal |
CN111158771A (en) * | 2019-12-30 | 2020-05-15 | 联想(北京)有限公司 | Processing method and device and computer equipment |
CN111177752A (en) * | 2019-12-20 | 2020-05-19 | 全球能源互联网研究院有限公司 | Credible file storage method, device and equipment based on static measurement |
CN111177705A (en) * | 2019-12-20 | 2020-05-19 | 全球能源互联网研究院有限公司 | Credible guarantee method, device and equipment for execution component of embedded operating system |
CN111309512A (en) * | 2020-01-16 | 2020-06-19 | 广东九联科技股份有限公司 | Equipment, high-security encryption method thereof and storage medium |
CN113056726A (en) * | 2020-06-30 | 2021-06-29 | 深圳市大疆创新科技有限公司 | Method for starting and activating camera, camera and holder |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231115A (en) * | 2011-06-07 | 2011-11-02 | 深圳市九洲电器有限公司 | Method and system for safely starting set top box |
CN102693139A (en) * | 2011-03-25 | 2012-09-26 | 比亚迪股份有限公司 | Method and system for wirelessly upgrading mobile phone software |
CN103873440A (en) * | 2012-12-11 | 2014-06-18 | 北京旋极信息技术股份有限公司 | Application program upgrading method and system |
CN103888835A (en) * | 2014-04-17 | 2014-06-25 | 江苏银河电子股份有限公司 | Safety certification method of intelligent set top box |
CN104156659A (en) * | 2014-08-14 | 2014-11-19 | 电子科技大学 | Embedded system secure start method |
US20170293484A1 (en) * | 2016-04-11 | 2017-10-12 | Endress+Hauser Conducta Gmbh+Co. Kg | Method for updating a firmware component and device of measurement and control technology |
-
2017
- 2017-12-22 CN CN201711406066.0A patent/CN108154025A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102693139A (en) * | 2011-03-25 | 2012-09-26 | 比亚迪股份有限公司 | Method and system for wirelessly upgrading mobile phone software |
CN102231115A (en) * | 2011-06-07 | 2011-11-02 | 深圳市九洲电器有限公司 | Method and system for safely starting set top box |
CN103873440A (en) * | 2012-12-11 | 2014-06-18 | 北京旋极信息技术股份有限公司 | Application program upgrading method and system |
CN103888835A (en) * | 2014-04-17 | 2014-06-25 | 江苏银河电子股份有限公司 | Safety certification method of intelligent set top box |
CN104156659A (en) * | 2014-08-14 | 2014-11-19 | 电子科技大学 | Embedded system secure start method |
US20170293484A1 (en) * | 2016-04-11 | 2017-10-12 | Endress+Hauser Conducta Gmbh+Co. Kg | Method for updating a firmware component and device of measurement and control technology |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109308195A (en) * | 2018-08-22 | 2019-02-05 | 青岛海信电器股份有限公司 | Starting method, embedded device and the computer storage medium of embedded device |
WO2020037612A1 (en) * | 2018-08-23 | 2020-02-27 | 深圳市汇顶科技股份有限公司 | Embedded program secure boot method, apparatus and device, and storage medium |
US11562075B2 (en) | 2018-08-23 | 2023-01-24 | Shenzhen GOODIX Technology Co., Ltd. | Secure booting method, apparatus, device for embedded program, and storage medium |
CN109683985A (en) * | 2018-12-19 | 2019-04-26 | 中国电子科技集团公司第五十四研究所 | A kind of more image starting methods of DSP based on AIS order |
CN110555309A (en) * | 2019-09-10 | 2019-12-10 | 深圳市英博超算科技有限公司 | Starting method, starting device, terminal and computer readable storage medium |
CN110990084A (en) * | 2019-12-20 | 2020-04-10 | 紫光展讯通信(惠州)有限公司 | Chip secure starting method and device, storage medium and terminal |
CN111177752A (en) * | 2019-12-20 | 2020-05-19 | 全球能源互联网研究院有限公司 | Credible file storage method, device and equipment based on static measurement |
CN111177705A (en) * | 2019-12-20 | 2020-05-19 | 全球能源互联网研究院有限公司 | Credible guarantee method, device and equipment for execution component of embedded operating system |
CN111158771A (en) * | 2019-12-30 | 2020-05-15 | 联想(北京)有限公司 | Processing method and device and computer equipment |
CN111309512A (en) * | 2020-01-16 | 2020-06-19 | 广东九联科技股份有限公司 | Equipment, high-security encryption method thereof and storage medium |
CN111309512B (en) * | 2020-01-16 | 2024-01-02 | 广东九联科技股份有限公司 | Internet of things equipment, high-security encryption method thereof and storage medium |
CN113056726A (en) * | 2020-06-30 | 2021-06-29 | 深圳市大疆创新科技有限公司 | Method for starting and activating camera, camera and holder |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108154025A (en) | Method, the method and device of application program mirror image processing of embedded device startup | |
CN109313690B (en) | Self-contained encrypted boot policy verification | |
US10474823B2 (en) | Controlled secure code authentication | |
ES2917183T3 (en) | Mobile device that has a secure execution environment | |
CN101951316B (en) | Protected network boot of operating system | |
CN102208000B (en) | Method and system for providing security mechanisms for virtual machine images | |
US8250373B2 (en) | Authenticating and verifying an authenticable and verifiable module | |
RU2542930C2 (en) | Booting and configuring subsystem securely from non-local storage | |
ES2692900T3 (en) | Cryptographic certification of secure hosted execution environments | |
TW202009778A (en) | Firmware upgrade method and device | |
US8560823B1 (en) | Trusted modular firmware update using digital certificate | |
KR101795457B1 (en) | Method of initializing device and method of updating firmware of device having enhanced security function | |
CN110688660B (en) | Method and device for safely starting terminal and storage medium | |
CN104156659A (en) | Embedded system secure start method | |
CN111264044A (en) | Chip, method for generating private key and method for trustable certification | |
CN101983375A (en) | Binding a cryptographic module to a platform | |
KR102013983B1 (en) | Method and server for authenticating an application integrity | |
EP2547135A2 (en) | Apparatus and method for preventing copying of terminal unique information in portable terminal | |
CN109814934B (en) | Data processing method, device, readable medium and system | |
US20230351056A1 (en) | Sram physically unclonable function (puf) memory for generating keys based on device owner | |
CN105893837A (en) | Application program installation method, security encryption chip and terminal | |
CN116070217A (en) | Safe starting system and method for chip module | |
CN114296873A (en) | Virtual machine image protection method, related device, chip and electronic equipment | |
CN113360857A (en) | Code starting method and system for software | |
CN111400771A (en) | Target partition checking method and device, storage medium and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180612 |
|
RJ01 | Rejection of invention patent application after publication |