CN109426523B - Dual-system starting method based on trustzone technology and computer readable storage medium - Google Patents

Dual-system starting method based on trustzone technology and computer readable storage medium Download PDF

Info

Publication number
CN109426523B
CN109426523B CN201710710893.2A CN201710710893A CN109426523B CN 109426523 B CN109426523 B CN 109426523B CN 201710710893 A CN201710710893 A CN 201710710893A CN 109426523 B CN109426523 B CN 109426523B
Authority
CN
China
Prior art keywords
operating system
program
real
starting
running
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710710893.2A
Other languages
Chinese (zh)
Other versions
CN109426523A (en
Inventor
刘炯钟
赵国开
涂岩恺
池炜宾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yaxon Networks Co Ltd
Original Assignee
Xiamen Yaxon Networks Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yaxon Networks Co Ltd filed Critical Xiamen Yaxon Networks Co Ltd
Priority to CN201710710893.2A priority Critical patent/CN109426523B/en
Publication of CN109426523A publication Critical patent/CN109426523A/en
Application granted granted Critical
Publication of CN109426523B publication Critical patent/CN109426523B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Abstract

The invention discloses a dual-system starting method and a computer readable storage medium, wherein the method comprises the following steps: running a ROM program; if the ROM program verifies that the boot program passes, operating the boot program; the boot program is started to load a real-time operating system and a common operating system to a memory area; running the real-time operating system; and loading and running the common operating system through the real-time operating system. The invention uses a boot program to start and load the dual system, the first operating system directly starts the second operating system, and skips the running time of the second boot program, thereby greatly shortening the starting time, simplifying the starting process and ensuring the safety of the system mirror image in the starting process.

Description

Dual-system starting method based on trustzone technology and computer readable storage medium
Technical Field
The invention relates to the field of operating systems, in particular to a dual-system starting method based on a trustzone technology and a computer readable storage medium.
Background
Trustzone technology (trusted zone technology) is a security extension of ARM processors, which can divide hardware and software on system devices into two operating environments: trusted environments and untrusted environments. Software running in a trusted environment may access all resources of the processor, while software running in an untrusted environment may only access non-secure resources on the processor. A common operating system with rich applications, such as a linux operating system and an Android operating system, is generally run in an untrusted environment, and a real-time operating system is run in a trusted environment.
The prior guide method based on the trustzone double system comprises the following steps:
after the device is powered on, a boot program (ROM program) solidified on a processor is firstly run, then a first boot program is loaded and verified, and after the verification is passed, the first boot program starts to execute. The first boot bootstrap program loads a real-time operating system and a second boot bootstrap program to a memory area of the processor, verifies the identities of the real-time operating system and the second boot bootstrap program, jumps to the real-time operating system to run after the verification is passed, jumps to the second boot bootstrap program to run after the real-time operating system is initialized, and the second boot bootstrap program loads a common operating system to the memory area again, verifies the identity of the common operating system, and jumps to an entry address of the common operating system to start running the common operating system after the verification is passed.
The disadvantage of this method is that two boot drivers (the two boot drivers have the same main function, but the boot objects are different) need to be run, the engineering measurement of the run time of one boot driver is about 600ms to 700ms, and in the case of needing quick start, such as the vehicle-mounted ECU module needs to be started within 2s, the cost of the time is huge.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: a dual-system starting method based on the trustzone technology and a computer readable storage medium are provided, which simplify the starting process, reduce the starting time and simultaneously have no loss of safety.
In order to solve the technical problems, the invention adopts the technical scheme that: a dual-system starting method based on a trustzone technology comprises the following steps:
running a ROM program;
if the ROM program verifies that the boot bootstrap program passes, running the boot bootstrap program;
the boot program is started to load a real-time operating system and a common operating system to a memory area;
running the real-time operating system;
and loading and running the common operating system through the real-time operating system.
The invention also relates to a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of:
running a ROM program;
if the ROM program verifies that the boot bootstrap program passes, running the boot bootstrap program;
the boot program is started to load a real-time operating system and a common operating system to a memory area;
running the real-time operating system;
and loading and running the common operating system through the real-time operating system.
The invention has the beneficial effects that: the dual system is started and loaded by only using one starting bootstrap program, the second starting bootstrap program is cancelled, the first operating system directly starts the second operating system, the running time of the second starting bootstrap program is skipped, the starting time is greatly shortened, the starting process is simplified, the safety of the system mirror image in the starting process can be ensured, and the dual system has good engineering utilization value in the occasion needing quick starting.
Drawings
FIG. 1 is a flow chart of a dual system starting method based on trustzone technology of the present invention;
FIG. 2 is a flowchart of a method according to a first embodiment of the present invention.
Detailed Description
In order to explain technical contents, objects and effects of the present invention in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
The most key concept of the invention is as follows: the dual system is loaded by using only one boot loader, and the second operating system is directly started by the first operating system.
Referring to fig. 1, a dual system booting method based on trustzone technology includes:
running a ROM program;
if the ROM program verifies that the boot program passes, operating the boot program;
the boot program is started to load a real-time operating system and a common operating system to a memory area;
running the real-time operating system;
and loading and running the common operating system through the real-time operating system.
From the above description, the beneficial effects of the present invention are: the starting process is simplified, the starting time is reduced, and meanwhile, the safety is not lost.
Further, the "running the boot loader if the ROM program verifies that the boot loader passes" specifically includes:
the ROM program verifies the boot bootstrap program through a root key solidified on the equipment;
and if the verification is passed, running a starting bootstrap program.
Further, the "running the real-time operating system" specifically includes:
the boot program is started to verify the real-time operating system through a root key solidified on the equipment;
and if the verification is passed, operating the real-time operating system.
As can be seen from the above description, security is ensured by using the root key to authenticate the boot loader and the real-time operating system.
Further, the "loading and running the common operating system through the real-time operating system" specifically includes:
the real-time operating system verifies the common operating system through a root key solidified on equipment;
if the verification is passed, running a monitoring mode program of the real-time operating system;
the monitoring mode program saves the context environment of the security state of the current processor, wherein the context environment of the security state comprises the value of an ARM general register and the value of a state register;
the monitoring mode program sets and loads a context environment in an unsafe state, wherein the context environment in the unsafe state comprises an entry address of a common operating system and starting parameters required by starting the common operating system;
and starting to run from the entry address, and starting a common operating system according to the starting parameters.
As can be seen from the above description, the security is ensured by using the root key to verify the common operating system; by saving the context environment of the safe state of the processor, the current key register value in the safe state is prevented from being replaced by the value in the unsafe state after the processor is switched to the unsafe state; the processor is switched from a secure state to a non-secure state to launch the normal operating system.
Further, the "the monitoring mode program sets and loads a context environment in an unsecure state, where the context environment in the unsecure state includes an entry address of a common operating system and start parameters required for starting the common operating system" specifically includes:
the monitoring mode program sets a first instruction address which runs after the switching processor is in a non-safe state as an entry address of the common operating system, and sets starting parameters required by starting the common operating system, wherein the starting parameters comprise an equipment number and an equipment tree address;
the supervisor mode program loads the entry address and startup parameters into the corresponding registers of the processor and sets the NS bit in the SCR register of coprocessor CP15 to 1.
As can be seen from the above description, a context in an unsecure state is prepared and then the processor is allowed to switch from the secure state to the unsecure state, thereby booting the normal operating system.
The invention also relates to a computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
running a ROM program;
if the ROM program verifies that the boot bootstrap program passes, running the boot bootstrap program;
the boot program is started to load a real-time operating system and a common operating system to a memory area;
running the real-time operating system;
and loading and running the common operating system through the real-time operating system.
Further, the "running the boot loader if the ROM program verifies that the boot loader passes" specifically includes:
the ROM program verifies the boot bootstrap program through a root key solidified on the equipment;
and if the verification is passed, running a starting bootstrap program.
Further, the "running the real-time operating system" specifically includes:
the boot program is started to verify the real-time operating system through a root key solidified on the equipment;
and if the verification is passed, operating the real-time operating system.
Further, the "loading and running the common operating system through the real-time operating system" specifically includes:
the real-time operating system verifies the common operating system through a root key solidified on equipment;
if the verification is passed, running a monitoring mode program of the real-time operating system;
the monitoring mode program saves the context environment of the security state of the current processor, wherein the context environment of the security state comprises the value of an ARM general register and the value of a state register;
the monitoring mode program sets and loads a context environment in an unsafe state, wherein the context environment in the unsafe state comprises an entry address of a common operating system and starting parameters required by starting the common operating system;
and starting to run from the entry address, and starting a common operating system according to the starting parameters.
Further, the "the monitoring mode program sets and loads a context environment in an unsecure state, where the context environment in the unsecure state includes an entry address of a common operating system and start parameters required for starting the common operating system" specifically includes:
the monitoring mode program sets a first instruction address which runs after the switching processor is in a non-safe state as an entry address of the common operating system, and sets starting parameters required by starting the common operating system, wherein the starting parameters comprise an equipment number and an equipment tree address;
the supervisor mode program loads the entry address and startup parameters into the corresponding registers of the processor and sets the NS bit to 1 in the SCR register of coprocessor CP 15.
Example one
Referring to fig. 2, a first embodiment of the present invention is: a dual-system starting method based on trustzone technology comprises the following steps:
s1: the device is powered on, and the device is in a safe state at the moment.
S2: the device runs a ROM program that is solidified on the device.
S3: and the ROM program verifies the boot program through the root key solidified on the equipment, judges whether the boot program passes the verification, and if so, executes the step S4.
S4: the equipment runs a starting bootstrap program; the boot program is started to initialize the basic operating environment of the device, and then step S5 is executed.
S5: the boot program is started to load a real-time operating system and a common operating system to a memory area; i.e. the boot program is started to load the real-time operating system and the normal operating system from the flash memory of the device into the memory area of the device.
S6: and the boot starting program verifies the real-time operating system through the root key solidified on the equipment, judges whether the verification is passed, and if so, executes the step S7. The root key in this step is the root key in step S3.
S7: the equipment runs the real-time operating system; the real-time operating system completes its initialization and then executes step S8.
S8: and the real-time operating system verifies the common operating system through the root key solidified on the equipment, judges whether the verification is passed, and if so, executes the step S9. The root key in this step is also the root key in step S3.
S9: the equipment runs a monitoring mode program of a real-time operating system; after the common operating system passes the verification, the real-time operating system executes an SMC instruction, the instruction enables the equipment to enter a monitoring mode, and after the equipment enters the monitoring mode, the equipment starts to run a monitoring mode program of the real-time operating system.
S10: the monitoring mode program saves the context environment of the security state of the current processor, wherein the context environment of the security state comprises the value of an ARM general register and the value of a state register; i.e. the relevant register values are stored in a contiguous block of memory.
S11: the monitoring mode program sets and loads a context environment in an unsafe state, wherein the context environment in the unsafe state comprises an entry address of a common operating system and starting parameters required by starting the common operating system.
Specifically, a first instruction address running after the switching processor is in an unsafe state is set as an entry address of the ordinary operating system, and starting parameters required by the ordinary operating system, such as a device number and a device tree address, are set; the context of the non-secure state is then loaded into the corresponding register of the processor, i.e. the register value stored in the memory area is assigned to the corresponding register of the processor, and the NS bit in the SCR register of the coprocessor CP15 is set to 1 (the coprocessor CP15 of the ARM processor supporting trustzone has a secure configuration register SCR with an NS bit indicating the current system state, and if NS =0, the system is in the secure state, NS =1, and the system is in the non-secure state). At this point, the device is in an unsecured state.
S12: and starting running from the entry address, and starting a common operating system according to the starting parameters. Namely, the device starts to run from the entry address of the ordinary operating system, runs the ordinary operating system, and then the ordinary operating system finishes starting according to the transmitted starting parameters.
Since the processor needs to switch between the secure state and the non-secure state, and both the secure state and the non-secure state use the same set of registers, in order to prevent the current critical register value in the secure state from being replaced by the value in the non-secure state after the processor switches to the non-secure state, in step S10, the values of some critical registers in the secure state of the processor need to be saved.
The embodiment provides a new boot method of the dual system, improves the trustzone classic boot mode, only uses one boot bootstrap program to start and load the dual system, cancels the second boot bootstrap program, directly starts the second operating system by the first operating system, skips the running time of the second boot bootstrap program, greatly shortens the boot time, simplifies the boot process, ensures the safety of the system mirror image in the boot process, and has good engineering utilization value in the occasion needing quick boot.
Example two
The present embodiment is a computer-readable storage medium corresponding to the above-mentioned embodiments, on which a computer program is stored, which when executed by a processor, performs the steps of:
running a ROM program;
if the ROM program verifies that the boot program passes, operating the boot program;
the boot program is started to load a real-time operating system and a common operating system to a memory area;
running the real-time operating system;
and loading and running the common operating system through the real-time operating system.
Further, the "running the boot loader if the ROM program verifies that the boot loader passes" specifically includes:
the ROM program verifies the boot program through a root key solidified on the equipment;
and if the verification is passed, running a starting bootstrap program.
Further, the "running the real-time operating system" specifically includes:
the boot program is started to verify the real-time operating system through a root key solidified on the equipment;
and if the verification is passed, operating the real-time operating system.
Further, the "loading and running the common operating system through the real-time operating system" specifically includes:
the real-time operating system verifies the common operating system through a root key solidified on equipment;
if the verification is passed, running a monitoring mode program of the real-time operating system;
the monitoring mode program saves the context environment of the security state of the current processor, wherein the context environment of the security state comprises the value of an ARM general register and the value of a state register;
the monitoring mode program sets and loads a context environment in an unsafe state, wherein the context environment in the unsafe state comprises an entry address of a common operating system and starting parameters required by starting the common operating system;
and starting running from the entry address, and starting a common operating system according to the starting parameters.
Further, the "setting and loading a context environment in an unsecure state by the monitoring mode program, where the context environment in the unsecure state includes an entry address of a common operating system and start parameters required for starting the common operating system" specifically includes:
the monitoring mode program sets a first instruction address which runs after the switching processor is in a non-safe state as an entry address of the common operating system, and sets starting parameters required by starting the common operating system, wherein the starting parameters comprise an equipment number and an equipment tree address;
the supervisor mode program loads the entry address and startup parameters into the corresponding registers of the processor and sets the NS bit to 1 in the SCR register of coprocessor CP 15.
In summary, the dual-system boot method and the computer readable storage medium based on trustzone technology provided by the present invention only use one boot program to boot and load the dual system, and cancel the second boot program, but the first operating system directly boots the second operating system, and the running time of the second boot program is skipped, so that the boot time is greatly shortened, the boot process is simplified, the security of the system image during the boot process can be ensured, and the method and the computer readable storage medium have good engineering utilization value in the occasions where quick boot is required.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (8)

1. A dual-system starting method based on trustzone technology is characterized by comprising the following steps:
running a ROM program;
if the ROM program verifies that the boot program passes, operating the boot program;
the boot program is started to load a real-time operating system and a common operating system to a memory area;
running the real-time operating system;
loading and running the common operating system through the real-time operating system;
the step of loading and running the common operating system through the real-time operating system specifically comprises the following steps:
the real-time operating system verifies the common operating system through a root key solidified on equipment;
if the verification is passed, running a monitoring mode program of the real-time operating system;
the monitoring mode program saves the context environment of the security state of the current processor, wherein the context environment of the security state comprises the value of an ARM general register and the value of a state register;
the monitoring mode program sets and loads a context environment in an unsafe state, wherein the context environment in the unsafe state comprises an entry address of a common operating system and starting parameters required by starting the common operating system;
and starting to run from the entry address, and starting a common operating system according to the starting parameters.
2. The dual-system booting method based on trustzone technology according to claim 1, wherein the "running the boot loader if the ROM program verifies that the boot loader passes" is specifically:
the ROM program verifies the boot program through a root key solidified on the equipment;
and if the verification is passed, running a starting bootstrap program.
3. The dual-system booting method based on trustzone technology according to claim 1, wherein the "running the real-time operating system" specifically includes:
the boot program is started to verify the real-time operating system through a root key solidified on the equipment;
and if the verification is passed, operating the real-time operating system.
4. The trustzone-technology-based dual-system booting method as claimed in claim 1, wherein the "the monitor mode program sets and loads a non-secure context, and the non-secure context includes an entry address of a general operating system and booting parameters required for booting the general operating system" specifically includes:
the monitoring mode program sets a first instruction address which runs after the switching processor is in an unsafe state as an entry address of the common operating system, and sets starting parameters required by starting the common operating system, wherein the starting parameters comprise an equipment number and an equipment tree address;
the supervisor mode program loads the entry address and startup parameters into the corresponding registers of the processor and sets the NS bit in the SCR register of coprocessor CP15 to 1.
5. A computer-readable storage medium on which a computer program is stored, which program, when executed by a processor, performs the steps of:
running a ROM program;
if the ROM program verifies that the boot program passes, operating the boot program;
the boot program is started to load a real-time operating system and a common operating system to a memory area;
running the real-time operating system;
loading and running the common operating system through the real-time operating system;
the step of loading and running the common operating system through the real-time operating system specifically comprises the following steps:
the real-time operating system verifies the common operating system through a root key solidified on equipment;
if the verification is passed, running a monitoring mode program of the real-time operating system;
the monitoring mode program saves the context environment of the security state of the current processor, wherein the context environment of the security state comprises the value of an ARM general register and the value of a state register;
the monitoring mode program sets and loads a context environment in an unsafe state, wherein the context environment in the unsafe state comprises an entry address of a common operating system and starting parameters required by starting the common operating system;
and starting to run from the entry address, and starting a common operating system according to the starting parameters.
6. The computer-readable storage medium according to claim 5, wherein the "running the boot loader if the ROM program verifies that the boot loader passes" is specifically:
the ROM program verifies the boot bootstrap program through a root key solidified on the equipment;
and if the verification is passed, running a starting bootstrap program.
7. The computer-readable storage medium according to claim 5, wherein said "running the real-time operating system" is specifically:
the boot program is started to verify the real-time operating system through a root key solidified on the equipment;
and if the verification is passed, operating the real-time operating system.
8. The computer-readable storage medium according to claim 5, wherein the "the monitor mode program sets and loads a context environment in an unsecure state, where the context environment in the unsecure state includes an entry address of a general operating system and a start parameter required for starting the general operating system" specifically includes:
the monitoring mode program sets a first instruction address which runs after the switching processor is in a non-safe state as an entry address of the common operating system, and sets starting parameters required by starting the common operating system, wherein the starting parameters comprise an equipment number and an equipment tree address;
the supervisor mode program loads the entry address and startup parameters into the corresponding registers of the processor and sets the NS bit to 1 in the SCR register of coprocessor CP 15.
CN201710710893.2A 2017-08-18 2017-08-18 Dual-system starting method based on trustzone technology and computer readable storage medium Active CN109426523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710710893.2A CN109426523B (en) 2017-08-18 2017-08-18 Dual-system starting method based on trustzone technology and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710710893.2A CN109426523B (en) 2017-08-18 2017-08-18 Dual-system starting method based on trustzone technology and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109426523A CN109426523A (en) 2019-03-05
CN109426523B true CN109426523B (en) 2022-12-06

Family

ID=65497333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710710893.2A Active CN109426523B (en) 2017-08-18 2017-08-18 Dual-system starting method based on trustzone technology and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109426523B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069506B (en) * 2020-09-16 2024-02-23 地平线(上海)人工智能技术有限公司 Safe starting method and device
CN115237480A (en) * 2021-11-05 2022-10-25 科东(广州)软件科技有限公司 Starting method and device of embedded equipment, embedded equipment and storage medium
CN115309463A (en) * 2022-09-29 2022-11-08 成都菁蓉联创科技有限公司 Method for guiding and configuring AMP system
CN115357310A (en) * 2022-10-24 2022-11-18 北京智芯微电子科技有限公司 System starting method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156659A (en) * 2014-08-14 2014-11-19 电子科技大学 Embedded system secure start method
CN104318182A (en) * 2014-10-29 2015-01-28 中国科学院信息工程研究所 Intelligent terminal isolation system and intelligent terminal isolation method both based on processor safety extension
CN104598841A (en) * 2014-12-29 2015-05-06 东软集团股份有限公司 Double-system guide method and device facing terminal security
CN104992122A (en) * 2015-07-20 2015-10-21 武汉大学 Cell phone private information safe box based on ARM Trust Zone
WO2016055358A1 (en) * 2014-10-10 2016-04-14 Bundesdruckerei Gmbh Method for loading executable program instructions into a chip card during active operation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156659A (en) * 2014-08-14 2014-11-19 电子科技大学 Embedded system secure start method
WO2016055358A1 (en) * 2014-10-10 2016-04-14 Bundesdruckerei Gmbh Method for loading executable program instructions into a chip card during active operation
CN104318182A (en) * 2014-10-29 2015-01-28 中国科学院信息工程研究所 Intelligent terminal isolation system and intelligent terminal isolation method both based on processor safety extension
CN104598841A (en) * 2014-12-29 2015-05-06 东软集团股份有限公司 Double-system guide method and device facing terminal security
CN104992122A (en) * 2015-07-20 2015-10-21 武汉大学 Cell phone private information safe box based on ARM Trust Zone

Also Published As

Publication number Publication date
CN109426523A (en) 2019-03-05

Similar Documents

Publication Publication Date Title
CN109426523B (en) Dual-system starting method based on trustzone technology and computer readable storage medium
US9189247B2 (en) Method for switching between virtualized and non-virtualized system operation
US10902112B2 (en) System including a hypervisor
CN109669734B (en) Method and apparatus for starting a device
US9111097B2 (en) Secure execution architecture
US8726364B2 (en) Authentication and access protection of computer boot modules in run-time environments
US6925557B2 (en) Method and system for a clean system booting process
US20090064274A1 (en) Dual non-volatile memories for a trusted hypervisor
CN109522099B (en) Method and system for improving instantaneity of non-instantaneity operating system
US20100082955A1 (en) Verification of chipset firmware updates
KR20060130200A (en) Autonomous memory checkers and their methods for ensuring runtime safety
CN108549812A (en) Security isolation method, safety insulating device based on Trustzone and car-mounted terminal
US20060069904A1 (en) Information processing apparatus and startup control method
CN108090376B (en) CAN bus data protection method and system based on TrustZone
US20210073397A1 (en) Computing device and method for operating same
CN113348110A (en) Electronic control device and safety verification method for electronic control device
CN111443950A (en) Vehicle-mounted system safety starting method and vehicle-mounted system
WO2016184180A1 (en) Method and apparatus for safe startup of system
CN111079194A (en) Computing device and operating method for the same
CN110955493A (en) Method, system and related equipment for realizing switching of safe operation environment
EP1535124B1 (en) Computer architecture for executing a program in a secure of insecure mode
CN107437021B (en) Intelligent system operation method and device and terminal equipment
CN113239347B (en) Starting method and device suitable for TEE security application example
CN113448682B (en) Virtual machine monitor loading method and device and electronic equipment
CN109753788B (en) Integrity checking method and computer readable storage medium during kernel operation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant