CN108958761A - A kind of processing method and processing device of device program - Google Patents

A kind of processing method and processing device of device program Download PDF

Info

Publication number
CN108958761A
CN108958761A CN201710380167.9A CN201710380167A CN108958761A CN 108958761 A CN108958761 A CN 108958761A CN 201710380167 A CN201710380167 A CN 201710380167A CN 108958761 A CN108958761 A CN 108958761A
Authority
CN
China
Prior art keywords
program
area
program area
decryption
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710380167.9A
Other languages
Chinese (zh)
Inventor
陈琳
杨波涛
张文涯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710380167.9A priority Critical patent/CN108958761A/en
Publication of CN108958761A publication Critical patent/CN108958761A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of processing method of device program, comprising: access the first program area, the program for the encryption that operation decryption program decryption is stored in the second program area in privileged mode;The program of decryption is verified, is such as verified, then runs copy startup program for the program of the decryption and copies third program area to, be switched to the program run in the third program area under nonprivileged mode;If verifying does not pass through, operation upgrade procedure initiates remote upgrade application request.A kind of processing unit of device program.This programme is utilized the level of privilege partition mechanism of single-chip microcontroller, and the hardware resources such as memory protection mechanism and encryption and decryption technology, remote upgrade technology realize correct internet of things equipment end program, reliable and secure operation and abnormal restoring.

Description

A kind of processing method and processing device of device program
Technical field
This disclosure relates to but be not limited to internet of things equipment security fields more particularly to a kind of device program processing method and Device.
Background technique
Today in the rapid development of the Internet of Things, the equipment of networking is more and more.Internet of things equipment and traditional embedded device It compares, accessing disclosed network is its main feature.In a network environment, it is an especially important problem safely, asks safely Topic is divided into communication security again, and equipment safety and system service safety etc., the disclosure pays close attention to the safety of internet of things equipment itself, For example, terminal program sends corrupt data to server after being replaced, rogue program executes unauthorized movement, mesh at the terminal The preceding safety for internet of things equipment not yet proposes that measure is effectively protected.
Summary of the invention
The embodiment of the present invention provides a kind of processing method and processing device of device program, to guarantee the safety of equipment end program Property.
A kind of processing method of device program, comprising:
The first program area is accessed in privileged mode, the encryption that operation decryption program decryption is stored in the second program area Program;
The program of decryption is verified, is such as verified, then runs copy startup program and copies the program of the decryption Shellfish is switched to the program run in the third program area under nonprivileged mode to third program area;If verifying does not pass through, run Upgrade procedure initiates remote upgrade application request.
Optionally, the program of described pair of decryption is verified, comprising:
Judge the agenda mark and described first that the decruption key stored in first program area verifying decrypts Whether the agenda mark stored in program area is consistent, such as consistent, then is verified;It is such as inconsistent, then it verifies and does not pass through.
Optionally, first program area is piece inner nonvolatile memory, and second program area is chip external memory, institute Stating third program area is random access memory in piece inner nonvolatile memory or piece.
Optionally, it is described be switched to the program run in the third program area under nonprivileged mode during, also wrap It includes:
The request of the first program area, then resetted as described in receiving access.
Optionally, after the initiation remote upgrade application request, further includes:
The program for downloading from a server encryption is stored in second program area.
A kind of processing unit of device program, including memory and processor, wherein
The memory includes at least the first program area, the second program area and third program area, and first program area is deposited Decryption program, copy startup program and upgrade procedure are contained, it is only read-write under privileged mode;Second program area, which is stored with, to be added Close program;The third program area is used to store the program of decryption;
The processor runs the decryption program decryption and deposits for accessing first program area in privileged mode Store up the program of the encryption in second program area;The program of decryption is verified, is such as verified, then is copied described in operation Shellfish startup program copies the program of the decryption to the third program area, is switched under nonprivileged mode and runs the third Program in program area;If verifying does not pass through, runs the upgrade procedure and initiate remote upgrade application request.
Optionally, decruption key and agenda mark are stored in first program area;
The processor, carrying out verifying to the program of decryption includes: to judge that the decruption key verifies the program decrypted Whether sequence mark and the agenda mark stored in first program area are consistent, such as consistent, then are verified;It is such as different It causes, then verifies and do not pass through.
Optionally, first program area is piece inner nonvolatile memory, and second program area is chip external memory, institute Stating third program area is random access memory in piece inner nonvolatile memory or piece.
Optionally, the processor is switched to the process that the program in the third program area is run under nonprivileged mode In, further includes: the request of the first program area as described in receiving access is then resetted.
Optionally, the processor, after initiating remote upgrade application request, further includes: download from a server encryption Program is stored in second program area.
To sum up, the embodiment of the present invention provides a kind of processing method and processing device of device program, and single-chip microcontroller is utilized (such as Cortex M series) level of privilege partition mechanism, the hardware resources such as memory protection mechanism and encryption and decryption technology, remote upgrade technology Realize correct internet of things equipment end program, reliable and secure operation and abnormal restoring.
Detailed description of the invention
Fig. 1 is the processing unit of the device program of the embodiment of the present disclosure;
Fig. 2 is disclosure MCU storage the general frame;
Fig. 3 is a kind of flow chart of the processing method of device program of the embodiment of the present disclosure;
Fig. 4 is the division of disclosure device memory and remote upgrade functional block diagram;
Fig. 5 is the flow chart of the processing method of the exemplary device program of the application of the disclosure one.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application Feature can mutual any combination.
In order to solve the problems, such as that current internet of things equipment safeguard protection deficiency, the disclosure utilize protection mechanism and encrypted remote liter Grade realizes the safe operation of device program.
Fig. 1 is the processing unit of the device program of the embodiment of the present disclosure, as shown in Figure 1, the processing unit of the disclosure includes Memory and processor, the memory include at least: the first program area, the second program area and third program area, and described first Program area is stored with decryption program, copy startup program and upgrade procedure, only read-write under privileged mode;Second program area It is stored with the program of encryption;The third program area is used to store the program of decryption;
The processor runs the decryption program decryption and deposits for accessing first program area in privileged mode Store up the program of the encryption in second program area;The program of decryption is verified, is such as verified, then is copied described in operation Shellfish startup program copies the program of the decryption to the third program area, is switched under nonprivileged mode and runs the third Program in program area;If verifying does not pass through, runs the upgrade procedure and initiate remote upgrade application request.
Wherein, the first program area can only access in privileged mode, guarantee that gently meaning is not cracked for the first program area, guarantees to set The standby safety for holding entire program.
In one embodiment, decruption key and agenda mark are stored in first program area;
The processor, carrying out verifying to the program of decryption includes: to judge that the decruption key verifies the program decrypted Whether sequence mark and the agenda mark stored in first program area are consistent, such as consistent, then are verified;It is such as different It causes, then verifies and do not pass through.
In one embodiment, the processor is switched to the program run in the third program area under nonprivileged mode During, further includes: the request of the first program area as described in receiving access is then resetted.
In one embodiment, the processor, after initiating remote upgrade application request, further includes: download from a server The program of encryption is stored in second program area.
The processing unit of the device program of the disclosure can be internet of things equipment, mainly limited soft using equipment end single-chip microcontroller Hardware resource and encrypted remote upgrade mechanism realize the safe operation of device program, anti-to crack.
The realization of the processing unit of the device program of the embodiment of the present disclosure mainly includes: level of privilege mode and storage zoning Point, by taking cortex series monolithic as an example, as shown in Fig. 2, storing this as the 4G real address space of linear flat, and carry out The address on basis provides that another address starts as RAM (Random-, it is specified that program is program storage area since zero-address Access Memory, random access memory) area and other peripheral access area or DMA (Direct Memory Access, direct memory access) region.
The embodiment of the present disclosure mainly divides program storage area, has been divided into bootstrap area and (has been equivalent to above First program area), operation program area (being equivalent to third program area above) and operation program encryption memory block (be equivalent to above The second program area).
Bootstrap area medium is non-volatile flash (flash memory) in piece, and it is level of privilege code when operation that factory programming, which is completed, Area and MPU (Micro Processor Uint, microprocessor unit) read-write protection region, can only be read-write under level of privilege.
Running program area is non-volatile flash or ram in slice in piece, is non-privileged code area when operation, MPU is according to reality Selective protection is needed to read and write.
Running program encryption memory block is the outer flash of piece, and program file memory action cannot directly be run.
Wherein, only bootstrap area is not cracked, and just can guarantee the safety of the entire program of equipment end.
Protect outside piece: program factory in bootstrap area is solidificated in ROM (Read-Only Memory, read-only memory), And it is provided with the outer read protection of single chip microcomputer.
Code contains decryption program in bootstrap area, and upgrade procedure copies startup program.Number in bootstrap area According to decruption key and program fixed sequence program data is contained, this two item data is all that manufacturer maintains secrecy, and is provided with and reads in single-chip microcontroller It is unreadable outside piece after protection.
Protection in piece: after program starting, since operation program area operates in non-privileged grade, bootstrap area operates in privilege Grade guarantees that bootstrap area can run program area with read and write access that is, from hardware, and running program area is that cannot access guidance Program area, so bootstrap area is unreadable in piece in addition to itself.
Considered based on cost etc., operation program encryption memory block is generally spi (serial peripheral Interface, Serial Peripheral Interface) the pieces external expansion storage such as Flash, it can individually read and write, so the embodiment of the present invention Guarantee code correctness using the method being stored in flash after program encryption, finally only correct code could transported The operation of line program area.
The purpose of program encryption is to prevent pseudo-terminal from obtaining code operation, if not encrypting, is likely to occur one upgrading of forgery The program that distal end has been downloaded in request can be run.
After carrying out program encryption, the code for being ultimately stored on operation program encryption memory block is whole encrypted code, It cannot directly run, need to run after decrypting.The embodiment of the present disclosure uses symmetric cryptosystem, and key is stored in service respectively Device and guidance memory block.
Program correctness judgement is by comparing mark agenda mark after decrypting and be stored in boot section after decryption Show whether unanimously judged, agenda mark using program fixation producer secrecy mark or check code.
Upgrade procedure is interacted for controlling equipment end with the upgrading of server end, completes upgrade request, file reception, file The movement such as storage and upgrading completion.
SCM program upgrades to full dose upgrading, and single-chip microcontroller bootstrap is independent bin (binary system) file, and Running program generally is finally another whole bin file or hex (program file format) file, and bootstrap is not after factory Change again, remote upgrade can integrally replace the file of operation program encryption memory block, and then whole replace runs program area file.
Copy startup program: the code for running program area is obtained from piece external storage, so needing the program after decryption File copy to operation program area.
Program executes context and is switched to operation program area from bootstrap area, reruns, needs level of privilege and storehouse Switching, and reset interrupt vector table, jump to the operation of operation program area.Copy startup program completes these works Make.
Describe SCM system storage in Fig. 2 and be divided into program storage area, the area RAM, the specified registers such as peripheral hardware access region and Piece external storage.Embodiment of the present disclosure subregion and protection are carried out mainly for program storage area and the area Pian Wai FLASH.
Fig. 3 is a kind of flow chart of the processing method of device program of the embodiment of the present invention, as shown in figure 3, the present embodiment Processing method include:
Step 301, the first program area is accessed in privileged mode, and operation decryption program decryption is stored in the second program area Encryption program;
Step 302, the program of decryption is verified, is such as verified, then go to step 303;If verifying does not pass through, then turn Step 304;
Step 303, operation copy startup program copies the program of the decryption to third program area, is switched to non-privileged The program in the third program area is run under mode;
Step 304, operation upgrade procedure initiates remote upgrade application request.
The first program area in the present embodiment can only access in privileged mode, guarantee that the first program area is not anticipated gently and broken Solution, and then guarantee the safety of the entire program of equipment end.
Fig. 4 is the schematic diagram of the processing method of the device program of the embodiment of the present disclosure, as shown in figure 4, implementing with the disclosure Example is relevant single-chip microcontroller itself, the outer flash of piece, remote upgrade server, wherein
Single-chip microcontroller itself is primarily upon storage layout relevant to the embodiment of the present disclosure and divides and two portions of level of privilege division Point, bootstrap area contains the decryption program operated under level of privilege, upgrade procedure and copy startup program;Run program Area contains the operation program operated under non-privileged grade;Operation program encryption memory block contains encrypted operation program.
Wherein, decryption program acts on encryption memory block into the decrypting process of operation program area by label 1, upgrades journey Sequence is acted between remote upgrade server and encryption memory block by label 2, and copy startup program acts on fortune by label 3 In line program start-up course.
Fig. 5 is the flow chart of the processing method of the exemplary device program of the application of the disclosure one, as shown in figure 5, including following Step:
Step 301, single-chip microcontroller powers on.
Step 302, it resets.
Reset interrupt handles function, into privileged mode.
Step 303, memory setting, accessible arbitrary register and setting MPU, are arranged in this mould in privileged mode The bootstrap area of equipment is privilege access under formula, and operation program area is nonprivileged access.
Step 304, the program file in decryption operation program encryption memory block, the program file carry agenda mark Show.
Step 305, whether proving program sequence mark is correct, if correctly, going to step 307;If incorrect after verifying, Go to step 306.
Step 306, remote upgrade application is issued, encrypted program file is downloaded from a server, goes to step 304.
Step 307, program of file copy to operation program area.
Step 308, it is switched under nonprivileged mode and runs.
Step 309, judge whether the movement for access bootstrap area occur, such as occur, then go to step 302.If do not occurred, Go to step 310.
Because being provided with MPU to protect, after being switched to nonprivileged mode from step 308, access privileges region can trigger different Normal and reset, jumps to step 302.
Step 310, end is continued to run until.
The processing method of the device program of the embodiment of the present disclosure can guarantee the fortune of program on Internet of Things constrained devices itself Capable correct and safety guarantees to operate in program correctness and safety on constrained devices under the conditions of limited software and hardware Property, and can restore in abnormal cases, and then equipment program itself correctly and safety on the basis of realizes other portions such as communicate The safety divided.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored with computer executable instructions, The computer executable instructions are performed the processing method for realizing the device program.
Those of ordinary skill in the art will appreciate that all or part of the steps in the above method can be instructed by program Related hardware is completed, and described program can store in computer readable storage medium, such as read-only memory, disk or CD Deng.Optionally, one or more integrated circuits can be used also to realize in all or part of the steps of above-described embodiment.Accordingly Ground, each module/unit in above-described embodiment can take the form of hardware realization, can also use the shape of software function module Formula is realized.The present invention is not limited to the combinations of the hardware and software of any particular form.
The above is only a preferred embodiment of the present invention, and certainly, the invention may also have other embodiments, without departing substantially from this In the case where spirit and its essence, those skilled in the art make various corresponding changes in accordance with the present invention And deformation, but these corresponding changes and modifications all should fall within the scope of protection of the appended claims of the present invention.

Claims (10)

1. a kind of processing method of device program, comprising:
The first program area, the journey for the encryption that operation decryption program decryption is stored in the second program area are accessed in privileged mode Sequence;
The program of decryption is verified, is such as verified, then runs copy startup program and copies the program of the decryption to Third program area is switched to the program run in the third program area under nonprivileged mode;If verifying does not pass through, operation upgrading Program initiates remote upgrade application request.
2. processing method as described in claim 1, it is characterised in that: the program of described pair of decryption is verified, comprising:
Judge the agenda mark and first program that the decruption key stored in first program area verifying decrypts Whether the agenda mark stored in area is consistent, such as consistent, then is verified;It is such as inconsistent, then it verifies and does not pass through.
3. processing method as described in claim 1, it is characterised in that:
First program area is piece inner nonvolatile memory, and second program area is chip external memory, the third program Area is random access memory in piece inner nonvolatile memory or piece.
4. processing method as described in any one of claims 1-3, it is characterised in that: described be switched under nonprivileged mode runs During program in the third program area, further includes:
The request of the first program area, then resetted as described in receiving access.
5. processing method as described in any one of claims 1-3, it is characterised in that: the initiation remote upgrade application request Afterwards, further includes:
The program for downloading from a server encryption is stored in second program area.
6. a kind of processing unit of device program, including memory and processor, which is characterized in that
The memory includes at least the first program area, the second program area and third program area, and first program area is stored with Decryption program, copy startup program and upgrade procedure, it is only read-write under privileged mode;Second program area is stored with encryption Program;The third program area is used to store the program of decryption;
The processor runs the decryption program decryption and is stored in for accessing first program area in privileged mode The program of encryption in second program area;The program of decryption is verified, is such as verified, then runs the copy and opens Dynamic program copies the program of the decryption to the third program area, is switched under nonprivileged mode and runs the third program Program in area;If verifying does not pass through, runs the upgrade procedure and initiate remote upgrade application request.
7. processing unit as claimed in claim 6, it is characterised in that:
Decruption key and agenda mark are stored in first program area;
The processor, carrying out verifying to the program of decryption includes: to judge that the decruption key verifies the agenda decrypted Whether mark and the agenda mark stored in first program area are consistent, such as consistent, then are verified;As inconsistent, It then verifies and does not pass through.
8. processing unit as claimed in claim 6, it is characterised in that:
First program area is piece inner nonvolatile memory, and second program area is chip external memory, the third program Area is random access memory in piece inner nonvolatile memory or piece.
9. such as the described in any item processing units of claim 6-8, it is characterised in that:
The processor, during being switched to the program run in the third program area under nonprivileged mode, further includes: such as The request for accessing first program area is received, then is resetted.
10. such as the described in any item processing units of claim 6-8, it is characterised in that:
The processor, after initiating remote upgrade application request, further includes: the program for downloading from a server encryption is stored in Second program area.
CN201710380167.9A 2017-05-25 2017-05-25 A kind of processing method and processing device of device program Pending CN108958761A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710380167.9A CN108958761A (en) 2017-05-25 2017-05-25 A kind of processing method and processing device of device program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710380167.9A CN108958761A (en) 2017-05-25 2017-05-25 A kind of processing method and processing device of device program

Publications (1)

Publication Number Publication Date
CN108958761A true CN108958761A (en) 2018-12-07

Family

ID=64494412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710380167.9A Pending CN108958761A (en) 2017-05-25 2017-05-25 A kind of processing method and processing device of device program

Country Status (1)

Country Link
CN (1) CN108958761A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909318A (en) * 2019-11-22 2020-03-24 展讯通信(上海)有限公司 Operating system anti-theft method and device for user equipment and terminal
CN111309360A (en) * 2020-02-07 2020-06-19 腾讯科技(深圳)有限公司 Firmware updating method and device of quick charging equipment, computer equipment and storage medium
CN112306535A (en) * 2020-11-10 2021-02-02 明峰医疗系统股份有限公司 High-reliability MCU remote upgrading system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008071836A1 (en) * 2006-12-14 2008-06-19 Nokia Corporation Method for the secure storing of program state data in an electronic device
CN101639887A (en) * 2009-08-19 2010-02-03 浪潮电子信息产业股份有限公司 Program encryption method of embedded system
CN103546576A (en) * 2013-10-31 2014-01-29 中安消技术有限公司 Remote automatic updating method and system of embedded equipment
CN103679062A (en) * 2013-12-23 2014-03-26 上海贝岭股份有限公司 Intelligent electric meter main control chip and security encryption method
CN104794393A (en) * 2015-04-24 2015-07-22 杭州字节信息技术有限公司 Embedded type partition image security certification and kernel trusted boot method and equipment thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008071836A1 (en) * 2006-12-14 2008-06-19 Nokia Corporation Method for the secure storing of program state data in an electronic device
CN101639887A (en) * 2009-08-19 2010-02-03 浪潮电子信息产业股份有限公司 Program encryption method of embedded system
CN103546576A (en) * 2013-10-31 2014-01-29 中安消技术有限公司 Remote automatic updating method and system of embedded equipment
CN103679062A (en) * 2013-12-23 2014-03-26 上海贝岭股份有限公司 Intelligent electric meter main control chip and security encryption method
CN104794393A (en) * 2015-04-24 2015-07-22 杭州字节信息技术有限公司 Embedded type partition image security certification and kernel trusted boot method and equipment thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909318A (en) * 2019-11-22 2020-03-24 展讯通信(上海)有限公司 Operating system anti-theft method and device for user equipment and terminal
CN111309360A (en) * 2020-02-07 2020-06-19 腾讯科技(深圳)有限公司 Firmware updating method and device of quick charging equipment, computer equipment and storage medium
CN111309360B (en) * 2020-02-07 2022-06-28 腾讯科技(深圳)有限公司 Firmware updating method and device of quick charging equipment, computer equipment and storage medium
CN112306535A (en) * 2020-11-10 2021-02-02 明峰医疗系统股份有限公司 High-reliability MCU remote upgrading system and method

Similar Documents

Publication Publication Date Title
US8839236B2 (en) Virtual machine support for metered computer usage
US8769295B2 (en) Computing system feature activation mechanism
CN103748594B (en) For ARM*TRUSTZONETMThe credible platform module based on firmware realized
RU2385483C2 (en) System and method for hypervisor use to control access to computed given for rent
US20130254906A1 (en) Hardware and Software Association and Authentication
KR101643072B1 (en) Providing an immutable antivirus payload for internet ready compute nodes
US20090193211A1 (en) Software authentication for computer systems
US20110040960A1 (en) Method and System for Securely Updating Field Upgradeable Units
EP2727040B1 (en) A secure hosted execution architecture
CN117349819A (en) Remote authentication for multi-core processors
WO2013159041A1 (en) System and method for secure booting and debugging of a peripheral subsystem in a system on chip device
US8745735B2 (en) Monitoring system, program-executing device, monitoring program, recording medium and integrated circuit
TW200941278A (en) Secure update of boot image without knowledge of secure key
CN111201553B (en) Safety element and related equipment
US9104841B2 (en) Methods and systems for executing protected content
US20030135744A1 (en) Method and system for programming a non-volatile device in a data processing system
CN107567629A (en) Dynamic firmware module loader in credible performing environment container
CN108958761A (en) A kind of processing method and processing device of device program
CN101888627B (en) Mobile terminal and system data protection method thereof
JP5986897B2 (en) Terminal device, integrity verification system, and program
EP1465038B1 (en) Memory security device for flexible software environment
US11755741B2 (en) Trusted boot-loader authentication
CN112115477B (en) Kernel repairing method and device, electronic equipment and storage medium
WO2016184180A1 (en) Method and apparatus for safe startup of system
US20090187898A1 (en) Method for securely updating an autorun program and portable electronic entity executing it

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181207