CN108958761A - A kind of processing method and processing device of device program - Google Patents
A kind of processing method and processing device of device program Download PDFInfo
- Publication number
- CN108958761A CN108958761A CN201710380167.9A CN201710380167A CN108958761A CN 108958761 A CN108958761 A CN 108958761A CN 201710380167 A CN201710380167 A CN 201710380167A CN 108958761 A CN108958761 A CN 108958761A
- Authority
- CN
- China
- Prior art keywords
- program
- area
- program area
- decryption
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
A kind of processing method of device program, comprising: access the first program area, the program for the encryption that operation decryption program decryption is stored in the second program area in privileged mode;The program of decryption is verified, is such as verified, then runs copy startup program for the program of the decryption and copies third program area to, be switched to the program run in the third program area under nonprivileged mode;If verifying does not pass through, operation upgrade procedure initiates remote upgrade application request.A kind of processing unit of device program.This programme is utilized the level of privilege partition mechanism of single-chip microcontroller, and the hardware resources such as memory protection mechanism and encryption and decryption technology, remote upgrade technology realize correct internet of things equipment end program, reliable and secure operation and abnormal restoring.
Description
Technical field
This disclosure relates to but be not limited to internet of things equipment security fields more particularly to a kind of device program processing method and
Device.
Background technique
Today in the rapid development of the Internet of Things, the equipment of networking is more and more.Internet of things equipment and traditional embedded device
It compares, accessing disclosed network is its main feature.In a network environment, it is an especially important problem safely, asks safely
Topic is divided into communication security again, and equipment safety and system service safety etc., the disclosure pays close attention to the safety of internet of things equipment itself,
For example, terminal program sends corrupt data to server after being replaced, rogue program executes unauthorized movement, mesh at the terminal
The preceding safety for internet of things equipment not yet proposes that measure is effectively protected.
Summary of the invention
The embodiment of the present invention provides a kind of processing method and processing device of device program, to guarantee the safety of equipment end program
Property.
A kind of processing method of device program, comprising:
The first program area is accessed in privileged mode, the encryption that operation decryption program decryption is stored in the second program area
Program;
The program of decryption is verified, is such as verified, then runs copy startup program and copies the program of the decryption
Shellfish is switched to the program run in the third program area under nonprivileged mode to third program area;If verifying does not pass through, run
Upgrade procedure initiates remote upgrade application request.
Optionally, the program of described pair of decryption is verified, comprising:
Judge the agenda mark and described first that the decruption key stored in first program area verifying decrypts
Whether the agenda mark stored in program area is consistent, such as consistent, then is verified;It is such as inconsistent, then it verifies and does not pass through.
Optionally, first program area is piece inner nonvolatile memory, and second program area is chip external memory, institute
Stating third program area is random access memory in piece inner nonvolatile memory or piece.
Optionally, it is described be switched to the program run in the third program area under nonprivileged mode during, also wrap
It includes:
The request of the first program area, then resetted as described in receiving access.
Optionally, after the initiation remote upgrade application request, further includes:
The program for downloading from a server encryption is stored in second program area.
A kind of processing unit of device program, including memory and processor, wherein
The memory includes at least the first program area, the second program area and third program area, and first program area is deposited
Decryption program, copy startup program and upgrade procedure are contained, it is only read-write under privileged mode;Second program area, which is stored with, to be added
Close program;The third program area is used to store the program of decryption;
The processor runs the decryption program decryption and deposits for accessing first program area in privileged mode
Store up the program of the encryption in second program area;The program of decryption is verified, is such as verified, then is copied described in operation
Shellfish startup program copies the program of the decryption to the third program area, is switched under nonprivileged mode and runs the third
Program in program area;If verifying does not pass through, runs the upgrade procedure and initiate remote upgrade application request.
Optionally, decruption key and agenda mark are stored in first program area;
The processor, carrying out verifying to the program of decryption includes: to judge that the decruption key verifies the program decrypted
Whether sequence mark and the agenda mark stored in first program area are consistent, such as consistent, then are verified;It is such as different
It causes, then verifies and do not pass through.
Optionally, first program area is piece inner nonvolatile memory, and second program area is chip external memory, institute
Stating third program area is random access memory in piece inner nonvolatile memory or piece.
Optionally, the processor is switched to the process that the program in the third program area is run under nonprivileged mode
In, further includes: the request of the first program area as described in receiving access is then resetted.
Optionally, the processor, after initiating remote upgrade application request, further includes: download from a server encryption
Program is stored in second program area.
To sum up, the embodiment of the present invention provides a kind of processing method and processing device of device program, and single-chip microcontroller is utilized (such as
Cortex M series) level of privilege partition mechanism, the hardware resources such as memory protection mechanism and encryption and decryption technology, remote upgrade technology
Realize correct internet of things equipment end program, reliable and secure operation and abnormal restoring.
Detailed description of the invention
Fig. 1 is the processing unit of the device program of the embodiment of the present disclosure;
Fig. 2 is disclosure MCU storage the general frame;
Fig. 3 is a kind of flow chart of the processing method of device program of the embodiment of the present disclosure;
Fig. 4 is the division of disclosure device memory and remote upgrade functional block diagram;
Fig. 5 is the flow chart of the processing method of the exemplary device program of the application of the disclosure one.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention
Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application
Feature can mutual any combination.
In order to solve the problems, such as that current internet of things equipment safeguard protection deficiency, the disclosure utilize protection mechanism and encrypted remote liter
Grade realizes the safe operation of device program.
Fig. 1 is the processing unit of the device program of the embodiment of the present disclosure, as shown in Figure 1, the processing unit of the disclosure includes
Memory and processor, the memory include at least: the first program area, the second program area and third program area, and described first
Program area is stored with decryption program, copy startup program and upgrade procedure, only read-write under privileged mode;Second program area
It is stored with the program of encryption;The third program area is used to store the program of decryption;
The processor runs the decryption program decryption and deposits for accessing first program area in privileged mode
Store up the program of the encryption in second program area;The program of decryption is verified, is such as verified, then is copied described in operation
Shellfish startup program copies the program of the decryption to the third program area, is switched under nonprivileged mode and runs the third
Program in program area;If verifying does not pass through, runs the upgrade procedure and initiate remote upgrade application request.
Wherein, the first program area can only access in privileged mode, guarantee that gently meaning is not cracked for the first program area, guarantees to set
The standby safety for holding entire program.
In one embodiment, decruption key and agenda mark are stored in first program area;
The processor, carrying out verifying to the program of decryption includes: to judge that the decruption key verifies the program decrypted
Whether sequence mark and the agenda mark stored in first program area are consistent, such as consistent, then are verified;It is such as different
It causes, then verifies and do not pass through.
In one embodiment, the processor is switched to the program run in the third program area under nonprivileged mode
During, further includes: the request of the first program area as described in receiving access is then resetted.
In one embodiment, the processor, after initiating remote upgrade application request, further includes: download from a server
The program of encryption is stored in second program area.
The processing unit of the device program of the disclosure can be internet of things equipment, mainly limited soft using equipment end single-chip microcontroller
Hardware resource and encrypted remote upgrade mechanism realize the safe operation of device program, anti-to crack.
The realization of the processing unit of the device program of the embodiment of the present disclosure mainly includes: level of privilege mode and storage zoning
Point, by taking cortex series monolithic as an example, as shown in Fig. 2, storing this as the 4G real address space of linear flat, and carry out
The address on basis provides that another address starts as RAM (Random-, it is specified that program is program storage area since zero-address
Access Memory, random access memory) area and other peripheral access area or DMA (Direct Memory
Access, direct memory access) region.
The embodiment of the present disclosure mainly divides program storage area, has been divided into bootstrap area and (has been equivalent to above
First program area), operation program area (being equivalent to third program area above) and operation program encryption memory block (be equivalent to above
The second program area).
Bootstrap area medium is non-volatile flash (flash memory) in piece, and it is level of privilege code when operation that factory programming, which is completed,
Area and MPU (Micro Processor Uint, microprocessor unit) read-write protection region, can only be read-write under level of privilege.
Running program area is non-volatile flash or ram in slice in piece, is non-privileged code area when operation, MPU is according to reality
Selective protection is needed to read and write.
Running program encryption memory block is the outer flash of piece, and program file memory action cannot directly be run.
Wherein, only bootstrap area is not cracked, and just can guarantee the safety of the entire program of equipment end.
Protect outside piece: program factory in bootstrap area is solidificated in ROM (Read-Only Memory, read-only memory),
And it is provided with the outer read protection of single chip microcomputer.
Code contains decryption program in bootstrap area, and upgrade procedure copies startup program.Number in bootstrap area
According to decruption key and program fixed sequence program data is contained, this two item data is all that manufacturer maintains secrecy, and is provided with and reads in single-chip microcontroller
It is unreadable outside piece after protection.
Protection in piece: after program starting, since operation program area operates in non-privileged grade, bootstrap area operates in privilege
Grade guarantees that bootstrap area can run program area with read and write access that is, from hardware, and running program area is that cannot access guidance
Program area, so bootstrap area is unreadable in piece in addition to itself.
Considered based on cost etc., operation program encryption memory block is generally spi (serial peripheral
Interface, Serial Peripheral Interface) the pieces external expansion storage such as Flash, it can individually read and write, so the embodiment of the present invention
Guarantee code correctness using the method being stored in flash after program encryption, finally only correct code could transported
The operation of line program area.
The purpose of program encryption is to prevent pseudo-terminal from obtaining code operation, if not encrypting, is likely to occur one upgrading of forgery
The program that distal end has been downloaded in request can be run.
After carrying out program encryption, the code for being ultimately stored on operation program encryption memory block is whole encrypted code,
It cannot directly run, need to run after decrypting.The embodiment of the present disclosure uses symmetric cryptosystem, and key is stored in service respectively
Device and guidance memory block.
Program correctness judgement is by comparing mark agenda mark after decrypting and be stored in boot section after decryption
Show whether unanimously judged, agenda mark using program fixation producer secrecy mark or check code.
Upgrade procedure is interacted for controlling equipment end with the upgrading of server end, completes upgrade request, file reception, file
The movement such as storage and upgrading completion.
SCM program upgrades to full dose upgrading, and single-chip microcontroller bootstrap is independent bin (binary system) file, and
Running program generally is finally another whole bin file or hex (program file format) file, and bootstrap is not after factory
Change again, remote upgrade can integrally replace the file of operation program encryption memory block, and then whole replace runs program area file.
Copy startup program: the code for running program area is obtained from piece external storage, so needing the program after decryption
File copy to operation program area.
Program executes context and is switched to operation program area from bootstrap area, reruns, needs level of privilege and storehouse
Switching, and reset interrupt vector table, jump to the operation of operation program area.Copy startup program completes these works
Make.
Describe SCM system storage in Fig. 2 and be divided into program storage area, the area RAM, the specified registers such as peripheral hardware access region and
Piece external storage.Embodiment of the present disclosure subregion and protection are carried out mainly for program storage area and the area Pian Wai FLASH.
Fig. 3 is a kind of flow chart of the processing method of device program of the embodiment of the present invention, as shown in figure 3, the present embodiment
Processing method include:
Step 301, the first program area is accessed in privileged mode, and operation decryption program decryption is stored in the second program area
Encryption program;
Step 302, the program of decryption is verified, is such as verified, then go to step 303;If verifying does not pass through, then turn
Step 304;
Step 303, operation copy startup program copies the program of the decryption to third program area, is switched to non-privileged
The program in the third program area is run under mode;
Step 304, operation upgrade procedure initiates remote upgrade application request.
The first program area in the present embodiment can only access in privileged mode, guarantee that the first program area is not anticipated gently and broken
Solution, and then guarantee the safety of the entire program of equipment end.
Fig. 4 is the schematic diagram of the processing method of the device program of the embodiment of the present disclosure, as shown in figure 4, implementing with the disclosure
Example is relevant single-chip microcontroller itself, the outer flash of piece, remote upgrade server, wherein
Single-chip microcontroller itself is primarily upon storage layout relevant to the embodiment of the present disclosure and divides and two portions of level of privilege division
Point, bootstrap area contains the decryption program operated under level of privilege, upgrade procedure and copy startup program;Run program
Area contains the operation program operated under non-privileged grade;Operation program encryption memory block contains encrypted operation program.
Wherein, decryption program acts on encryption memory block into the decrypting process of operation program area by label 1, upgrades journey
Sequence is acted between remote upgrade server and encryption memory block by label 2, and copy startup program acts on fortune by label 3
In line program start-up course.
Fig. 5 is the flow chart of the processing method of the exemplary device program of the application of the disclosure one, as shown in figure 5, including following
Step:
Step 301, single-chip microcontroller powers on.
Step 302, it resets.
Reset interrupt handles function, into privileged mode.
Step 303, memory setting, accessible arbitrary register and setting MPU, are arranged in this mould in privileged mode
The bootstrap area of equipment is privilege access under formula, and operation program area is nonprivileged access.
Step 304, the program file in decryption operation program encryption memory block, the program file carry agenda mark
Show.
Step 305, whether proving program sequence mark is correct, if correctly, going to step 307;If incorrect after verifying,
Go to step 306.
Step 306, remote upgrade application is issued, encrypted program file is downloaded from a server, goes to step 304.
Step 307, program of file copy to operation program area.
Step 308, it is switched under nonprivileged mode and runs.
Step 309, judge whether the movement for access bootstrap area occur, such as occur, then go to step 302.If do not occurred,
Go to step 310.
Because being provided with MPU to protect, after being switched to nonprivileged mode from step 308, access privileges region can trigger different
Normal and reset, jumps to step 302.
Step 310, end is continued to run until.
The processing method of the device program of the embodiment of the present disclosure can guarantee the fortune of program on Internet of Things constrained devices itself
Capable correct and safety guarantees to operate in program correctness and safety on constrained devices under the conditions of limited software and hardware
Property, and can restore in abnormal cases, and then equipment program itself correctly and safety on the basis of realizes other portions such as communicate
The safety divided.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored with computer executable instructions,
The computer executable instructions are performed the processing method for realizing the device program.
Those of ordinary skill in the art will appreciate that all or part of the steps in the above method can be instructed by program
Related hardware is completed, and described program can store in computer readable storage medium, such as read-only memory, disk or CD
Deng.Optionally, one or more integrated circuits can be used also to realize in all or part of the steps of above-described embodiment.Accordingly
Ground, each module/unit in above-described embodiment can take the form of hardware realization, can also use the shape of software function module
Formula is realized.The present invention is not limited to the combinations of the hardware and software of any particular form.
The above is only a preferred embodiment of the present invention, and certainly, the invention may also have other embodiments, without departing substantially from this
In the case where spirit and its essence, those skilled in the art make various corresponding changes in accordance with the present invention
And deformation, but these corresponding changes and modifications all should fall within the scope of protection of the appended claims of the present invention.
Claims (10)
1. a kind of processing method of device program, comprising:
The first program area, the journey for the encryption that operation decryption program decryption is stored in the second program area are accessed in privileged mode
Sequence;
The program of decryption is verified, is such as verified, then runs copy startup program and copies the program of the decryption to
Third program area is switched to the program run in the third program area under nonprivileged mode;If verifying does not pass through, operation upgrading
Program initiates remote upgrade application request.
2. processing method as described in claim 1, it is characterised in that: the program of described pair of decryption is verified, comprising:
Judge the agenda mark and first program that the decruption key stored in first program area verifying decrypts
Whether the agenda mark stored in area is consistent, such as consistent, then is verified;It is such as inconsistent, then it verifies and does not pass through.
3. processing method as described in claim 1, it is characterised in that:
First program area is piece inner nonvolatile memory, and second program area is chip external memory, the third program
Area is random access memory in piece inner nonvolatile memory or piece.
4. processing method as described in any one of claims 1-3, it is characterised in that: described be switched under nonprivileged mode runs
During program in the third program area, further includes:
The request of the first program area, then resetted as described in receiving access.
5. processing method as described in any one of claims 1-3, it is characterised in that: the initiation remote upgrade application request
Afterwards, further includes:
The program for downloading from a server encryption is stored in second program area.
6. a kind of processing unit of device program, including memory and processor, which is characterized in that
The memory includes at least the first program area, the second program area and third program area, and first program area is stored with
Decryption program, copy startup program and upgrade procedure, it is only read-write under privileged mode;Second program area is stored with encryption
Program;The third program area is used to store the program of decryption;
The processor runs the decryption program decryption and is stored in for accessing first program area in privileged mode
The program of encryption in second program area;The program of decryption is verified, is such as verified, then runs the copy and opens
Dynamic program copies the program of the decryption to the third program area, is switched under nonprivileged mode and runs the third program
Program in area;If verifying does not pass through, runs the upgrade procedure and initiate remote upgrade application request.
7. processing unit as claimed in claim 6, it is characterised in that:
Decruption key and agenda mark are stored in first program area;
The processor, carrying out verifying to the program of decryption includes: to judge that the decruption key verifies the agenda decrypted
Whether mark and the agenda mark stored in first program area are consistent, such as consistent, then are verified;As inconsistent,
It then verifies and does not pass through.
8. processing unit as claimed in claim 6, it is characterised in that:
First program area is piece inner nonvolatile memory, and second program area is chip external memory, the third program
Area is random access memory in piece inner nonvolatile memory or piece.
9. such as the described in any item processing units of claim 6-8, it is characterised in that:
The processor, during being switched to the program run in the third program area under nonprivileged mode, further includes: such as
The request for accessing first program area is received, then is resetted.
10. such as the described in any item processing units of claim 6-8, it is characterised in that:
The processor, after initiating remote upgrade application request, further includes: the program for downloading from a server encryption is stored in
Second program area.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710380167.9A CN108958761A (en) | 2017-05-25 | 2017-05-25 | A kind of processing method and processing device of device program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710380167.9A CN108958761A (en) | 2017-05-25 | 2017-05-25 | A kind of processing method and processing device of device program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108958761A true CN108958761A (en) | 2018-12-07 |
Family
ID=64494412
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710380167.9A Pending CN108958761A (en) | 2017-05-25 | 2017-05-25 | A kind of processing method and processing device of device program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108958761A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110909318A (en) * | 2019-11-22 | 2020-03-24 | 展讯通信(上海)有限公司 | Operating system anti-theft method and device for user equipment and terminal |
CN111309360A (en) * | 2020-02-07 | 2020-06-19 | 腾讯科技(深圳)有限公司 | Firmware updating method and device of quick charging equipment, computer equipment and storage medium |
CN112306535A (en) * | 2020-11-10 | 2021-02-02 | 明峰医疗系统股份有限公司 | High-reliability MCU remote upgrading system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008071836A1 (en) * | 2006-12-14 | 2008-06-19 | Nokia Corporation | Method for the secure storing of program state data in an electronic device |
CN101639887A (en) * | 2009-08-19 | 2010-02-03 | 浪潮电子信息产业股份有限公司 | Program encryption method of embedded system |
CN103546576A (en) * | 2013-10-31 | 2014-01-29 | 中安消技术有限公司 | Remote automatic updating method and system of embedded equipment |
CN103679062A (en) * | 2013-12-23 | 2014-03-26 | 上海贝岭股份有限公司 | Intelligent electric meter main control chip and security encryption method |
CN104794393A (en) * | 2015-04-24 | 2015-07-22 | 杭州字节信息技术有限公司 | Embedded type partition image security certification and kernel trusted boot method and equipment thereof |
-
2017
- 2017-05-25 CN CN201710380167.9A patent/CN108958761A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008071836A1 (en) * | 2006-12-14 | 2008-06-19 | Nokia Corporation | Method for the secure storing of program state data in an electronic device |
CN101639887A (en) * | 2009-08-19 | 2010-02-03 | 浪潮电子信息产业股份有限公司 | Program encryption method of embedded system |
CN103546576A (en) * | 2013-10-31 | 2014-01-29 | 中安消技术有限公司 | Remote automatic updating method and system of embedded equipment |
CN103679062A (en) * | 2013-12-23 | 2014-03-26 | 上海贝岭股份有限公司 | Intelligent electric meter main control chip and security encryption method |
CN104794393A (en) * | 2015-04-24 | 2015-07-22 | 杭州字节信息技术有限公司 | Embedded type partition image security certification and kernel trusted boot method and equipment thereof |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110909318A (en) * | 2019-11-22 | 2020-03-24 | 展讯通信(上海)有限公司 | Operating system anti-theft method and device for user equipment and terminal |
CN111309360A (en) * | 2020-02-07 | 2020-06-19 | 腾讯科技(深圳)有限公司 | Firmware updating method and device of quick charging equipment, computer equipment and storage medium |
CN111309360B (en) * | 2020-02-07 | 2022-06-28 | 腾讯科技(深圳)有限公司 | Firmware updating method and device of quick charging equipment, computer equipment and storage medium |
CN112306535A (en) * | 2020-11-10 | 2021-02-02 | 明峰医疗系统股份有限公司 | High-reliability MCU remote upgrading system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8839236B2 (en) | Virtual machine support for metered computer usage | |
US8769295B2 (en) | Computing system feature activation mechanism | |
CN103748594B (en) | For ARM*TRUSTZONETMThe credible platform module based on firmware realized | |
RU2385483C2 (en) | System and method for hypervisor use to control access to computed given for rent | |
US20130254906A1 (en) | Hardware and Software Association and Authentication | |
KR101643072B1 (en) | Providing an immutable antivirus payload for internet ready compute nodes | |
US20090193211A1 (en) | Software authentication for computer systems | |
US20110040960A1 (en) | Method and System for Securely Updating Field Upgradeable Units | |
EP2727040B1 (en) | A secure hosted execution architecture | |
CN117349819A (en) | Remote authentication for multi-core processors | |
WO2013159041A1 (en) | System and method for secure booting and debugging of a peripheral subsystem in a system on chip device | |
US8745735B2 (en) | Monitoring system, program-executing device, monitoring program, recording medium and integrated circuit | |
TW200941278A (en) | Secure update of boot image without knowledge of secure key | |
CN111201553B (en) | Safety element and related equipment | |
US9104841B2 (en) | Methods and systems for executing protected content | |
US20030135744A1 (en) | Method and system for programming a non-volatile device in a data processing system | |
CN107567629A (en) | Dynamic firmware module loader in credible performing environment container | |
CN108958761A (en) | A kind of processing method and processing device of device program | |
CN101888627B (en) | Mobile terminal and system data protection method thereof | |
JP5986897B2 (en) | Terminal device, integrity verification system, and program | |
EP1465038B1 (en) | Memory security device for flexible software environment | |
US11755741B2 (en) | Trusted boot-loader authentication | |
CN112115477B (en) | Kernel repairing method and device, electronic equipment and storage medium | |
WO2016184180A1 (en) | Method and apparatus for safe startup of system | |
US20090187898A1 (en) | Method for securely updating an autorun program and portable electronic entity executing it |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181207 |