CN108347332A - Verify the method and device of firmware signature - Google Patents

Verify the method and device of firmware signature Download PDF

Info

Publication number
CN108347332A
CN108347332A CN201710418279.9A CN201710418279A CN108347332A CN 108347332 A CN108347332 A CN 108347332A CN 201710418279 A CN201710418279 A CN 201710418279A CN 108347332 A CN108347332 A CN 108347332A
Authority
CN
China
Prior art keywords
public key
firmware
public
signature
programming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710418279.9A
Other languages
Chinese (zh)
Inventor
刘雷波
朱敏
尹首
尹首一
魏少军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201710418279.9A priority Critical patent/CN108347332A/en
Publication of CN108347332A publication Critical patent/CN108347332A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The embodiment of the present invention provides a kind of method and device of verification firmware signature.The method includes:The public private key pair that trust authority CA is generated is obtained, signature is authenticated to firmware using the private key in the public private key pair;In trusted context, by the cryptographic Hash programming of public key or the public key in the public private key pair to One Time Programmable OTP region, and by guidance code BOOTLOADER programmings to read only memory ROM;The guidance code BOOTLOADER reads the cryptographic Hash of the public key or the public key from the One Time Programmable OTP region, verifies the authentication signature of the firmware.OTP, ROM, CA by being combined as the credible core root of credible calculating platform by the present invention, ensure that public key, public key cryptographic Hash and firmware program will not be tampered, and pass through a series of certification and Trust transitivity, it is ensured that the firmware of whole system be by certification, completely it is believable.

Description

Verify the method and device of firmware signature
Technical field
The present invention relates to field of computer technology more particularly to a kind of method and devices of verification firmware signature.
Background technology
If trust computing refer to the behavior of a current entity always in a desired manner, sent out towards target Exhibition, then it is believable.If from an initial trusted root being trusted, platform computing environment each time When conversion, this trust state can be kept by way of transmission not to be destroyed, then the computing environment on platform begins It is believable eventually, the various operations under trusted context will not destroy the credible of platform, and the integrality of platform itself is protected Card, here it is the pass through mechanism of trust chain.
The core of entire trust computing be exactly the design of trusted root how to ensure it is secure and trusted, and the design of trusted root whether The secure and trusted firmware for directly affecting whole system whether be by certification, completely it is believable.
Invention content
In order to solve the trusted root safety problem of trust computing, that is, ensure that the safety for verifying the public key of firmware signature is asked Topic, the embodiment of the present invention provide a kind of method and device of verification firmware signature.
In order to achieve the above object, the embodiment of the present invention provides a kind of method of verification firmware signature, including:It obtains credible The public private key pair that mechanism CA is generated, signature is authenticated using the private key in the public private key pair to firmware;In trusted context, By the cryptographic Hash programming of public key or the public key in the public private key pair to One Time Programmable OTP region, and generation will be guided Code BOOTLOADER programmings are to read only memory ROM;The guidance code BOOTLOADER is from the areas the One Time Programmable OTP The cryptographic Hash of the public key or the public key is read in domain, verifies the authentication signature of the firmware.
In order to achieve the above object, the embodiment of the present invention also provides a kind of device of verification firmware signature, including:Signature mould Block, the public private key pair generated for obtaining trust authority CA, label are authenticated using the private key in the public private key pair to firmware Name;Programming module is used in trusted context, by the cryptographic Hash programming of public key or the public key in the public private key pair to one Secondary property may be programmed OTP region, and by guidance code BOOTLOADER programmings to read only memory ROM, wherein being tested when carrying out firmware When card, the guidance code BOOTLOADER is used to read the public key or the public affairs from the One Time Programmable OTP region The cryptographic Hash of key verifies the authentication signature of the firmware.
The method and apparatus of the revealed verification firmware of the embodiment of the present invention, by by One Time Programmable (One Time Programable, OTP), read-only memory (Read-only Memory, ROM), certificate authority (Certificate Authority, CA) it is combined as the credible core root of credible calculating platform, it is ensured that public key, public key cryptographic Hash and firmware program It will not be tampered, and pass through a series of certification and Trust transitivity, it is ensured that the firmware of whole system is by certification, completely It is believable.
Description of the drawings
Included attached drawing is used for providing being further understood from the embodiment of the present invention, and which constitute one of specification Point, for illustrating embodiments of the present invention, and come together with verbal description to illustrate the principle of the present invention.Under it should be evident that Attached drawing in the description of face is only some embodiments of the present invention, for those of ordinary skill in the art, is not paying wound Under the premise of the property made is laborious, other drawings may also be obtained based on these drawings.In the accompanying drawings:
Fig. 1 is the process chart of the method for the verification firmware signature of the embodiment of the present invention;
Fig. 2 is the method schematic diagram of the verification firmware signature of one embodiment of the invention;
Fig. 3 is the method schematic diagram of the verification firmware signature of another embodiment of the present invention;
Fig. 4 is the method schematic diagram of the verification firmware signature of further embodiment of this invention;
Fig. 5 is the structural schematic diagram of the device of the verification firmware signature of the embodiment of the present invention.
Specific implementation mode
With reference to attached drawing, by following specification, aforementioned and other feature of the invention will be apparent.In specification In attached drawing, only certain exemplary embodiments of this invention is specifically disclosed, which show the portions for the principle that the present invention wherein may be used Divide embodiment, it will thus be appreciated that the present invention is not limited to described embodiments, on the contrary, the present invention includes falling into appended power Whole modifications, modification and equivalent in the range of profit requirement.
The feature for describing and/or showing for a kind of embodiment can be in a manner of same or similar one or more It is used in a other embodiment, it is combined with the feature in other embodiment, or substitute the feature in other embodiment.
It should be emphasized that term "comprises/comprising" refers to the presence of feature, one integral piece, step or component when being used herein, but simultaneously It is not excluded for the presence or additional of one or more other features, one integral piece, step or component.
The present invention proposes a kind of method and device of verification firmware signature, and innovative point is to propose a kind of completely new credible The realization method of root ensures the secure and trusted of firmware validation.Technological means is used by the realization of trusted root:It will be disposable In programmable (One Time Programable, OTP), read-only memory (Read-only Memory, ROM), certificate granting The heart (Certificate Authority, CA) is combined as the credible core root of credible calculating platform, and CA is as authenticating party to solid It signs after part certification, it is ensured that program is not tampered;Simultaneously in the burned OTP of cryptographic Hash of the CA public keys for verifying signature, it is ensured that Public key is not tampered, and the hardware feature of OTP one time programmings ensure that the safety of cryptographic Hash.By this series of certification and Trust transitivity, it is ensured that the firmware of whole system be by certification, completely it is believable.
Fig. 1 is the process chart of the method for the verification firmware signature of the embodiment of the present invention.As shown in Figure 1, the method Including:
Step S101 obtains the public private key pair that trust authority CA is generated, using the private key in the public private key pair to firmware It is authenticated signature;
Step S102, in trusted context, extremely by the cryptographic Hash programming of public key or the public key in the public private key pair One Time Programmable OTP region, and by guidance code BOOTLOADER programmings to read only memory ROM;
Step S103, the guidance code BOOTLOADER read the public key from the One Time Programmable OTP region Or the cryptographic Hash of the public key, verify the authentication signature of the firmware.
In the step S101 of one embodiment, trust authority CA generates a pair of public and private key using asymmetric arithmetic, passes through After analyzing the integrality that code confirms firmware, signed to firmware using private key.
Also, before being authenticated signature to firmware using the private key in the public and private key, further include:It analyzes described solid The code of part determines whether the firmware is complete, when determining that the firmware is complete, using the private key in the public and private key to institute It states firmware and is authenticated signature.Trust authority CA is authoritative institution, goes to examine whether confirmation firmware is complete using the method for oneself Whole, trust authority CA can sign to firmware after confirmation, and such trust authority CA is just recognized the complete of the firmware Whole property.
In the step S102 of one embodiment, in trusted context, by the cryptographic Hash programming of public key or public key to OTP, Ensure that the data in OTP are believable.It, can be in manufacture luck after BOOTLOADER programmings to ROM simultaneously for simple flow The safety of row test b OOTLOADER.Read only memory ROM is written into BOOTLOADER, is to ensure BOOTLOADER Safety, once write-in cannot be changed, after operation confirms its safety when dispatching from the factory in this way, when can ensure BOOTLOADER operations Public key or its cryptographic Hash can be read according to being pre-designed from OTP.
In addition, can be by the firmware programming after signature to device non-volatile memory FLASH, programming operation need not be can It is carried out in letter environment.
In the step S103 of one embodiment, after upper electricity operation, guidance code BOOTLOADER disposably may be used from described Programming OTP region reads the cryptographic Hash of the public key or the public key, verifies the authentication signature of the firmware.If guidance code BOOTLOADER reads the public key from the One Time Programmable OTP region, and then be used directly read public key verifications The signature of firmware, if guidance code BOOTLOADER read from the One Time Programmable OTP region be public key Hash Value then calculates its cryptographic Hash, with institute according to the public key read from ROM or device non-volatile memory FLASH first The cryptographic Hash for stating the public key read in One Time Programmable OTP is compared, and unanimously then thinks that public key comes from trust authority CA.Really Public key is recognized after trust authority CA, using the signature of read public key verifications firmware, and then verifies the integrality of firmware.
Finally, if firmware validation passes through, guidance code BOOTLOADER moves believable firmware to be transported into RAM Row, completes the transmission of trust chain.
Embodiment one:
In this embodiment, referring to shown in Fig. 2, a pair of of public private key pair is generated using asymmetric arithmetic in trust authority CA Afterwards, signature is authenticated to firmware using the private key in public private key pair, the firmware after signature is stored in equipment is non-volatile to deposit In reservoir FLASH.Meanwhile the storage of public keys in OTP, BOOTLOADER is stored in ROM without carrying public key.Upper electricity operation Afterwards, BOOTLOADER takes public key from OTP, and the firmware after reading signature in device non-volatile memory FLASH uses institute The signature of the public key verifications firmware of reading, and then verify the integrality of firmware.If having passed through signature verification, confirm that firmware is complete Whole property is not destroyed.
Embodiment two:
In this embodiment, shown in referring to Fig. 3, a pair of of public private key pair is generated using asymmetric arithmetic in trust authority CA Afterwards, signature is authenticated to firmware using the private key in public private key pair, the firmware after signature is stored in equipment is non-volatile to deposit In reservoir FLASH.Meanwhile in OTP storage of public keys cryptographic Hash, BOOTLOADER is stored in ROM, it is non-volatile in equipment In memory FLASH simultaneously storage of public keys.After upper electricity operation, BOOTLOADER reads the cryptographic Hash of public key from OTP, non-from equipment Volatile memory FLASH reads public key, confirms public key source, i.e.,:Cryptographic Hash is calculated after reading public key, with the public key in OTP Cryptographic Hash make comparisons, unanimously then think public key come from trust authority CA.Public key is being confirmed after trust authority CA, from equipment The firmware after signature is read in nonvolatile memory FLASH, using the signature of read public key verifications firmware, and then is verified The integrality of firmware.Since OTP costs are relatively high, in the present embodiment only in OTP storage of public keys cryptographic Hash, therefore can drop Low cost.
Embodiment three:
In this embodiment, referring to shown in Fig. 4, a pair of of public private key pair is generated using asymmetric arithmetic in trust authority CA Afterwards, signature is authenticated to firmware using the private key in public private key pair, the firmware after signature is stored in equipment is non-volatile to deposit In reservoir FLASH.Meanwhile in OTP storage of public keys cryptographic Hash, BOOTLOADER and public key are stored in ROM.Power on fortune After row, BOOTLOADER reads the cryptographic Hash of public key from OTP, verifies the source of public key in ROM.I.e.:Kazakhstan is calculated after reading public key Uncommon value, makes comparisons with the cryptographic Hash in OTP, unanimously then thinks that public key comes from trust authority CA.Confirm that public key comes from trust authority After CA, the firmware after reading signature in device non-volatile memory FLASH uses the label of read public key verifications firmware Name, and then verify the integrality of firmware.In the present embodiment, on the one hand in OTP storage of public keys cryptographic Hash, reduce into This, the stability of system can be ensure that with defensive attack by being on the other hand stored in the ROM public key.
Can be obtained from above example, the embodiment of the present invention by One Time Programmable (One Time Programable, OTP), read-only memory (Read-only Memory, ROM), certificate authority (Certificate Authority, CA) Be combined as the credible core root of credible calculating platform, CA as authenticating party to guidance code BOOTLOADER and firmware authentication after Signature, it is ensured that program is not tampered;Simultaneously for verify sign CA public keys the burned OTP of cryptographic Hash in, it is ensured that public key not by It distorts, and the hardware feature of OTP one time programmings ensure that the safety of cryptographic Hash.By this series of certification and trust biography Pass, it is ensured that the firmware of whole system be by certification, completely it is believable.
Based on same design, the embodiment of the present invention also provides a kind of device of verification firmware signature, as shown in figure 5, described Device includes:Signature blocks 501, the public private key pair generated for obtaining trust authority CA, use the private in the public private key pair Key is authenticated signature to firmware;Programming module 502, in trusted context, by the public private key pair public key or institute The cryptographic Hash programming of public key is stated to One Time Programmable OTP region, and by guidance code BOOTLOADER programmings to read-only storage Device ROM, wherein when carrying out firmware validation, the guidance code BOOTLOADER is used for from the areas the One Time Programmable OTP The cryptographic Hash of the public key or the public key is read in domain, verifies the authentication signature of the firmware.
In one embodiment, the programming module 502 is specifically used for:By the public key programming to the One Time Programmable OTP region, by the guidance code BOOTLOADER programmings to the read only memory ROM, wherein when carrying out firmware validation, The guidance code BOOTLOADER is used to read the public key from the One Time Programmable OTP region, uses the public key Verify the authentication signature of the firmware.
In one embodiment, the programming module 502 is specifically used for:By the cryptographic Hash programming of the public key to described primary Property programmable OTP region the public key is burnt in the guidance code BOOTLOADER programmings to the read only memory ROM Be written to device non-volatile memory FLASH, wherein when carrying out firmware validation, the guidance code BOOTLOADER be used for from The One Time Programmable OTP region reads the cryptographic Hash of the public key, is read from the device non-volatile memory FLASH The public key is taken, behind the source that the public key is determined according to the cryptographic Hash of the public key, uses firmware described in the public key verifications Authentication signature.
In one embodiment, the programming module 502 is specifically used for:By the cryptographic Hash programming of the public key to described primary Property programmable OTP region, by the guidance code BOOTLOADER and the public key programming to the read only memory ROM, In when carrying out firmware validation, the guidance code BOOTLOADER be used for from the One Time Programmable OTP region read institute The cryptographic Hash for stating public key reads the public key from the read only memory ROM, according to the determination of the cryptographic Hash of the public key Behind the source of public key, the authentication signature of firmware described in the public key verifications is used.
In one embodiment, the programming module 502 is additionally operable in the private key using in the public private key pair to solid Part is authenticated after signature, by the firmware programming after authentication signature to device non-volatile memory FLASH.The present invention is implemented The method and apparatus of the revealed verification firmware signature of example can be applied in embedded system, PC machine, server, mobile phone, encryption Chip etc. all safety and credibility are required in relatively high system.Also, if by One Time Programmable (One Time Programable, OTP), read-only memory (Read-only Memory, ROM), certificate authority (Certificate Authority, CA) individually takes out, and can be packaged into credible platform module (trusted Platform Module, TPM) chip, realize more flexible security strategy configuration.
Credible platform module is one kind and plants the chip for providing trusted root for computer in computer-internal.It is according to the present invention The method for realizing trusted root, by One Time Programmable (One Time Programable, OTP), read-only memory (Read- Only Memory, ROM), certificate authority (Certificate Authority, CA) be combined as credible platform module The trusted root is placed in TPM chips and installs the TPM chips in a computer, can be effectively protected meter by trusted root Calculation machine, prevents unauthorized users to access.
The device and method more than present invention can be by hardware realization, can also be by combination of hardware software realization.The present invention It is related to such computer-readable program, when the program is performed by logical block, the logical block can be made to realize above The device or component parts, or the logical block is made to realize various method or steps described above.The invention further relates to Storage medium for storing procedure above, such as hard disk, disk, CD, DVD, flash memory.
Above in association with specific embodiment, invention has been described, it will be appreciated by those skilled in the art that this A little descriptions are all exemplary, and are not limiting the scope of the invention.Those skilled in the art can be according to the present invention Spirit and principle various variants and modifications are made to the present invention, these variants and modifications are also within the scope of the invention.

Claims (11)

1. a kind of method of verification firmware signature, which is characterized in that the method includes:
The public private key pair that trust authority CA is generated is obtained, signature is authenticated to firmware using the private key in the public private key pair;
In trusted context, by the cryptographic Hash programming of public key or the public key in the public private key pair to One Time Programmable OTP region, and by guidance code BOOTLOADER programmings to read only memory ROM;
The guidance code BOOTLOADER reads the Kazakhstan of the public key or the public key from the One Time Programmable OTP region Uncommon value, verifies the authentication signature of the firmware.
2. it is according to claim 1 verification firmware signature method, which is characterized in that it is described will be in the public private key pair The cryptographic Hash programming of public key or the public key is to One Time Programmable OTP region, and extremely by guidance code BOOTLOADER programmings Read only memory ROM, including:
By the public key programming to the One Time Programmable OTP region, by the guidance code BOOTLOADER programmings to institute State read only memory ROM;
The guidance code BOOTLOADER reads the Kazakhstan of the public key or the public key from the One Time Programmable OTP region Uncommon value, verifies the authentication signature of the firmware, including:
The guidance code BOOTLOADER reads the public key from the One Time Programmable OTP region, uses the public key Verify the authentication signature of the firmware.
3. it is according to claim 1 verification firmware signature method, which is characterized in that it is described will be in the public private key pair The cryptographic Hash programming of public key or the public key is to One Time Programmable OTP region, and extremely by guidance code BOOTLOADER programmings Read only memory ROM, including:
By the cryptographic Hash programming of the public key to the One Time Programmable OTP region, by the guidance code BOOTLOADER Programming is to the read only memory ROM, by the public key programming to device non-volatile memory FLASH;
The guidance code BOOTLOADER reads the Kazakhstan of the public key or the public key from the One Time Programmable OTP region Uncommon value, verifies the authentication signature of the firmware, including:
The guidance code BOOTLOADER reads the cryptographic Hash of the public key from the One Time Programmable OTP region, from institute State and read the public key in device non-volatile memory FLASH, according to the cryptographic Hash of the public key determine the public key come Behind source, the authentication signature of firmware described in the public key verifications is used.
4. it is according to claim 1 verification firmware signature method, which is characterized in that it is described will be in the public private key pair The cryptographic Hash programming of public key or the public key is to One Time Programmable OTP region, and extremely by guidance code BOOTLOADER programmings Read only memory ROM, including:
By the cryptographic Hash programming of the public key to the One Time Programmable OTP region, by the guidance code BOOTLOADER And the public key programming is to the read only memory ROM;
The guidance code BOOTLOADER reads the Kazakhstan of the public key or the public key from the One Time Programmable OTP region Uncommon value, verifies the authentication signature of the firmware, including:
The guidance code BOOTLOADER reads the cryptographic Hash of the public key from the One Time Programmable OTP region, from institute It states and reads the public key in read only memory ROM, behind the source that the public key is determined according to the cryptographic Hash of the public key, use institute State the authentication signature of firmware described in public key verifications.
5. the method for verification firmware signature according to any one of claims 1 to 4, which is characterized in that use institute described It states after the private key in public private key pair is authenticated signature to firmware, further includes:By the firmware programming after authentication signature to equipment Nonvolatile memory FLASH.
6. the method for verification firmware signature according to any one of claim 1 to 4, which is characterized in that in the use Before private key in the public and private key is authenticated signature to firmware, further include:
The code for analyzing the firmware determines whether the firmware is complete;
The private key using in the public and private key is authenticated signature to firmware, including:
When determining that the firmware is complete, signature is authenticated to the firmware using the private key in the public and private key.
7. a kind of device of verification firmware signature, which is characterized in that described device includes:
Signature blocks, the public private key pair generated for obtaining trust authority CA, using the private key in the public private key pair to firmware It is authenticated signature;
Programming module is used in trusted context, extremely by the cryptographic Hash programming of public key or the public key in the public private key pair One Time Programmable OTP region, and by guidance code BOOTLOADER programmings to read only memory ROM, wherein when carrying out firmware When verification, the guidance code BOOTLOADER is used to read the public key or described from the One Time Programmable OTP region The cryptographic Hash of public key verifies the authentication signature of the firmware.
8. the device of verification firmware signature according to claim 7, which is characterized in that the programming module is specifically used for: By the public key programming to the One Time Programmable OTP region, by the guidance code BOOTLOADER programmings to described Memory ROM is read, wherein when carrying out firmware validation, the guidance code BOOTLOADER is used for from the One Time Programmable OTP region reads the public key, uses the authentication signature of firmware described in the public key verifications.
9. the device of verification firmware signature according to claim 7, which is characterized in that the programming module is specifically used for: By the cryptographic Hash programming of the public key to the One Time Programmable OTP region, by the guidance code BOOTLOADER programmings To the read only memory ROM, by the public key programming to device non-volatile memory FLASH, wherein being tested when carrying out firmware When card, the guidance code BOOTLOADER is used to read the cryptographic Hash of the public key from the One Time Programmable OTP region, The public key is read from the device non-volatile memory FLASH, the public key is determined according to the cryptographic Hash of the public key Source after, use the authentication signature of firmware described in the public key verifications.
10. the device of verification firmware signature according to claim 7, which is characterized in that the programming module is specifically used for: By the cryptographic Hash programming of the public key to the One Time Programmable OTP region, by the guidance code BOOTLOADER and institute Public key programming is stated to the read only memory ROM, wherein when carrying out firmware validation, the guidance code BOOTLOADER is used for The cryptographic Hash that the public key is read from the One Time Programmable OTP region, reads the public affairs from the read only memory ROM Key behind the source for determining the public key according to the cryptographic Hash of the public key, uses the certification label of firmware described in the public key verifications Name.
11. verifying the device of firmware signature according to claim 7 to 10 any one of them, which is characterized in that the programming mould Block is additionally operable to after the private key using in the public private key pair is authenticated signature to firmware, by consolidating after authentication signature Part programming is to device non-volatile memory FLASH.
CN201710418279.9A 2017-06-06 2017-06-06 Verify the method and device of firmware signature Pending CN108347332A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710418279.9A CN108347332A (en) 2017-06-06 2017-06-06 Verify the method and device of firmware signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710418279.9A CN108347332A (en) 2017-06-06 2017-06-06 Verify the method and device of firmware signature

Publications (1)

Publication Number Publication Date
CN108347332A true CN108347332A (en) 2018-07-31

Family

ID=62962431

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710418279.9A Pending CN108347332A (en) 2017-06-06 2017-06-06 Verify the method and device of firmware signature

Country Status (1)

Country Link
CN (1) CN108347332A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109445705A (en) * 2018-10-29 2019-03-08 湖南国科微电子股份有限公司 Firmware authentication method and solid state hard disk
CN110086623A (en) * 2019-03-13 2019-08-02 捷德(中国)信息科技有限公司 A kind of firmware method for anti-counterfeit and safety element based on safety element
CN111095213A (en) * 2018-08-23 2020-05-01 深圳市汇顶科技股份有限公司 Safe booting method, device, equipment and storage medium of embedded program
CN111160879A (en) * 2018-11-07 2020-05-15 新明华区块链技术(深圳)有限公司 Hardware wallet and security improving method and device thereof
CN111177693A (en) * 2019-12-11 2020-05-19 福建魔方电子科技有限公司 Method, device, equipment and medium for verifying terminal root certificate
CN111241522A (en) * 2020-01-07 2020-06-05 杭州涂鸦信息技术有限公司 Firmware signature method and device and storage medium
CN112099855A (en) * 2020-08-05 2020-12-18 联想(北京)有限公司 Information processing method, electronic equipment and computer storage medium
CN112511306A (en) * 2020-11-03 2021-03-16 中国航空工业集团公司西安航空计算技术研究所 Safe operation environment construction method based on mixed trust model
CN112612486A (en) * 2020-12-28 2021-04-06 湖北芯擎科技有限公司 Memory burning method and device and chip to be burned
CN112632562A (en) * 2020-12-28 2021-04-09 四川虹微技术有限公司 Equipment starting method, equipment management method and embedded equipment
CN112955889A (en) * 2018-11-07 2021-06-11 微安科技有限公司 Safe starting device and method
CN113032786A (en) * 2019-12-25 2021-06-25 成都鼎桥通信技术有限公司 Authentication certificate transfer method, chip and equipment
CN113468559A (en) * 2021-06-18 2021-10-01 中国电子产品可靠性与环境试验研究所((工业和信息化部电子第五研究所)(中国赛宝实验室)) Firmware verification method and system
CN113486360A (en) * 2021-07-14 2021-10-08 上海瓶钵信息科技有限公司 RISC-V based safe starting method and system
CN114065218A (en) * 2021-11-19 2022-02-18 山东方寸微电子科技有限公司 SoC system chip safe starting method
US20220067166A1 (en) * 2020-08-25 2022-03-03 Samsung Electronics Co., Ltd. Storage device
CN114385248A (en) * 2020-10-22 2022-04-22 四零四科技股份有限公司 Computing system and device for processing trust chain
CN114640461A (en) * 2022-02-16 2022-06-17 深圳市优博讯科技股份有限公司 Firmware tamper-proofing method and system based on security chip
CN114065218B (en) * 2021-11-19 2024-04-12 山东方寸微电子科技有限公司 SoC system chip safe starting method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120210115A1 (en) * 2011-02-11 2012-08-16 Park Dong-Jin Secure Boot Method and Method for Generating a Secure Boot Image
CN103974122A (en) * 2013-02-04 2014-08-06 澜起科技(上海)有限公司 Set top box chip and digital signature implementation method applied to same
CN105224875A (en) * 2015-11-13 2016-01-06 上海斐讯数据通信技术有限公司 A kind of secure startup system of terminal and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120210115A1 (en) * 2011-02-11 2012-08-16 Park Dong-Jin Secure Boot Method and Method for Generating a Secure Boot Image
CN103974122A (en) * 2013-02-04 2014-08-06 澜起科技(上海)有限公司 Set top box chip and digital signature implementation method applied to same
CN105224875A (en) * 2015-11-13 2016-01-06 上海斐讯数据通信技术有限公司 A kind of secure startup system of terminal and method

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111095213A (en) * 2018-08-23 2020-05-01 深圳市汇顶科技股份有限公司 Safe booting method, device, equipment and storage medium of embedded program
CN109445705B (en) * 2018-10-29 2022-03-22 湖南国科微电子股份有限公司 Firmware authentication method and solid state disk
CN109445705A (en) * 2018-10-29 2019-03-08 湖南国科微电子股份有限公司 Firmware authentication method and solid state hard disk
CN111160879B (en) * 2018-11-07 2023-11-03 新明华区块链技术(深圳)有限公司 Hardware wallet and security improving method and device thereof
CN111160879A (en) * 2018-11-07 2020-05-15 新明华区块链技术(深圳)有限公司 Hardware wallet and security improving method and device thereof
CN112955889A (en) * 2018-11-07 2021-06-11 微安科技有限公司 Safe starting device and method
CN110086623A (en) * 2019-03-13 2019-08-02 捷德(中国)信息科技有限公司 A kind of firmware method for anti-counterfeit and safety element based on safety element
CN111177693B (en) * 2019-12-11 2022-08-16 福建魔方电子科技有限公司 Method, device, equipment and medium for verifying terminal root certificate
CN111177693A (en) * 2019-12-11 2020-05-19 福建魔方电子科技有限公司 Method, device, equipment and medium for verifying terminal root certificate
CN113032786A (en) * 2019-12-25 2021-06-25 成都鼎桥通信技术有限公司 Authentication certificate transfer method, chip and equipment
CN111241522B (en) * 2020-01-07 2022-10-04 杭州涂鸦信息技术有限公司 Firmware signature method and device and storage medium
CN111241522A (en) * 2020-01-07 2020-06-05 杭州涂鸦信息技术有限公司 Firmware signature method and device and storage medium
CN112099855A (en) * 2020-08-05 2020-12-18 联想(北京)有限公司 Information processing method, electronic equipment and computer storage medium
CN112099855B (en) * 2020-08-05 2022-01-14 联想(北京)有限公司 Information processing method, electronic equipment and computer storage medium
US11520896B2 (en) * 2020-08-25 2022-12-06 Samsung Electronics Co., Ltd. Storage device
US20220067166A1 (en) * 2020-08-25 2022-03-03 Samsung Electronics Co., Ltd. Storage device
CN114385248A (en) * 2020-10-22 2022-04-22 四零四科技股份有限公司 Computing system and device for processing trust chain
CN112511306A (en) * 2020-11-03 2021-03-16 中国航空工业集团公司西安航空计算技术研究所 Safe operation environment construction method based on mixed trust model
CN112632562A (en) * 2020-12-28 2021-04-09 四川虹微技术有限公司 Equipment starting method, equipment management method and embedded equipment
CN112612486A (en) * 2020-12-28 2021-04-06 湖北芯擎科技有限公司 Memory burning method and device and chip to be burned
CN112632562B (en) * 2020-12-28 2024-01-26 四川虹微技术有限公司 Device starting method, device management method and embedded device
CN113468559A (en) * 2021-06-18 2021-10-01 中国电子产品可靠性与环境试验研究所((工业和信息化部电子第五研究所)(中国赛宝实验室)) Firmware verification method and system
CN113468559B (en) * 2021-06-18 2024-01-05 中国电子产品可靠性与环境试验研究所((工业和信息化部电子第五研究所)(中国赛宝实验室)) Firmware verification method and system
CN113486360A (en) * 2021-07-14 2021-10-08 上海瓶钵信息科技有限公司 RISC-V based safe starting method and system
CN114065218A (en) * 2021-11-19 2022-02-18 山东方寸微电子科技有限公司 SoC system chip safe starting method
CN114065218B (en) * 2021-11-19 2024-04-12 山东方寸微电子科技有限公司 SoC system chip safe starting method
CN114640461A (en) * 2022-02-16 2022-06-17 深圳市优博讯科技股份有限公司 Firmware tamper-proofing method and system based on security chip

Similar Documents

Publication Publication Date Title
CN108347332A (en) Verify the method and device of firmware signature
CN109313690B (en) Self-contained encrypted boot policy verification
EP3295352B1 (en) Client software attestation
US11714633B2 (en) Method for providing a firmware update of a device
EP3061027B1 (en) Verifying the security of a remote server
EP1922730B1 (en) Information carrier authentication with a physical one-way function
EP2081353A2 (en) System and method for digital signatures and authentication
CN110795126A (en) Firmware safety upgrading system
CN106452783A (en) Computer system and safe execution method
US11374961B2 (en) Methods for verification of software object authenticity and integrity
JP2004265026A (en) Application authentication system and device
CN104283860A (en) ELF file identification method and device based on code signature
TW201403376A (en) Systems, methods and apparatuses for securing root certificates
JP2016520265A (en) Generation of working security keys based on security parameters
KR101740956B1 (en) Method of secure public auditing using self-certified signature in cloud storage and system of the same
CN103269271A (en) Method and system for back-upping private key in electronic signature token
US11303459B2 (en) Smart television terminal and method for establishing a trust chain therefor
JP2015232810A (en) Storage device, information processor and information processing method
CN104680061A (en) Method and system for verifying code signing during startup of application in Android environment
CN109814934A (en) Data processing method, device, readable medium and system
CN111147259B (en) Authentication method and device
CN116896463A (en) Trusted environment authentication method and device based on blockchain
CN115934194A (en) Controller starting method and device, electronic equipment and storage medium
CN114448794B (en) Method and device for safely upgrading firmware based on chip trusted root
CN113868628A (en) Signature verification method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180731