CN110609536A - Method and device for controlling module in household appliance to be powered on and household appliance - Google Patents

Method and device for controlling module in household appliance to be powered on and household appliance Download PDF

Info

Publication number
CN110609536A
CN110609536A CN201910808800.9A CN201910808800A CN110609536A CN 110609536 A CN110609536 A CN 110609536A CN 201910808800 A CN201910808800 A CN 201910808800A CN 110609536 A CN110609536 A CN 110609536A
Authority
CN
China
Prior art keywords
module
component
program
tpm
integrity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910808800.9A
Other languages
Chinese (zh)
Other versions
CN110609536B (en
Inventor
赵越
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN201910808800.9A priority Critical patent/CN110609536B/en
Publication of CN110609536A publication Critical patent/CN110609536A/en
Application granted granted Critical
Publication of CN110609536B publication Critical patent/CN110609536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0208Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the configuration of the monitoring system
    • G05B23/0213Modular or universal configuration of the monitoring system, e.g. monitoring system having modules that may be combined to build monitoring program; monitoring system that can be applied to legacy systems; adaptable monitoring system; using different communication protocols
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/24Pc safety
    • G05B2219/24065Real time diagnostics

Abstract

The application relates to the technical field of intelligent household appliances, and discloses a method for controlling the electrification of a module in a household appliance, which comprises the following steps: and carrying out integrity measurement on a component program module in a circuit module of the household appliance, and powering up the component program module when the component program module is credible. The safety of electrifying the circuit module in the household appliance is improved, and the loss of the household appliance caused by the invasion of malicious codes to a user is reduced. The application also discloses a device and a household appliance for controlling the module in the household appliance to be electrified.

Description

Method and device for controlling module in household appliance to be powered on and household appliance
Technical Field
The present application relates to the technical field of intelligent home appliances, and for example, to a method and an apparatus for controlling power-on of a module in a home appliance, and a home appliance.
Background
At present, along with the popularization of intelligent household appliances, more and more intelligent household appliances can interact with a mobile terminal through a network, the Internet of things is realized, people can realize the control of the intelligent household appliances through the setting and the operation of the mobile terminal, great convenience is provided for the life of people, and the life quality of people is improved. However, the safety problem of the intelligent household electrical appliance is increasingly highlighted while convenience is brought to people.
In the process of implementing the embodiments of the present disclosure, it is found that at least the following problems exist in the related art:
the existing internet-of-things household appliances adopt a completely trusted state on circuit modules of the household appliances, and when malicious codes are implanted into an internet-of-things system, the household appliances are difficult to judge in a dangerous state, so that great hidden dangers are brought to the safety of the household appliances.
Disclosure of Invention
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview nor is intended to identify key/critical elements or to delineate the scope of such embodiments but rather as a prelude to the more detailed description that is presented later.
The embodiment of the disclosure provides a method and a device for controlling module electrification in household electrical appliances and the household electrical appliances, and aims to solve the technical problem of potential safety hazards caused by invasion of malicious codes to the household electrical appliances in the Internet of things.
In some embodiments, the method comprises: and carrying out integrity measurement on a component program module in a circuit module of the household appliance, and powering up the component program module when the component program module is credible.
In some embodiments, the apparatus comprises: a component program module measuring unit configured to measure the integrity of the component program modules in the circuit module of the home appliance; a component program module power-on unit configured to power on the component program module when the component program module is authentic.
In some embodiments, the apparatus comprises a processor and a memory storing program instructions, the processor being configured to perform the foregoing method when executing the program instructions.
In some embodiments, the home device comprises the foregoing apparatus.
The method for controlling the electrification of the module in the household appliance provided by the embodiment of the disclosure can realize the following technical effects:
by carrying out integrity measurement on the component program module of the household appliance, when the measurement result of the component program module is credible, the component program module is powered on, so that the power-on safety of the circuit module in the household appliance is improved, and the loss of the household appliance caused by the damage of malicious codes to a user is reduced.
The foregoing general description and the following description are exemplary and explanatory only and are not restrictive of the application.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the accompanying drawings and not in limitation thereof, in which elements having the same reference numeral designations are shown as like elements and not in limitation thereof, and wherein:
fig. 1 is a schematic flowchart of a method for controlling power-on of a module in a home appliance according to an embodiment of the present disclosure;
fig. 2 is another schematic flow chart of a method for controlling power up of a module in a home appliance according to an embodiment of the present disclosure;
fig. 3 is another schematic flow chart of a method for controlling power up of a module in a home appliance according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of an apparatus for controlling power-on of a module in a home appliance according to an embodiment of the present disclosure.
Reference numerals:
100: a processor; 101: a memory; 102: a communication interface; 103: a bus.
Detailed Description
So that the manner in which the features and elements of the disclosed embodiments can be understood in detail, a more particular description of the disclosed embodiments, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may be practiced without these details. In other instances, well-known structures and devices may be shown in simplified form in order to simplify the drawing.
As shown in fig. 1, the method for controlling power-on of a module in a home appliance according to an embodiment of the present disclosure includes:
step S1, the integrity of the component program module in the circuit module of the household electrical appliance is measured,
it will be appreciated that the component program modules are program modules related to the control, sensing, etc. of components within the appliance. Different household appliances have different components and different component program modules. For example, the air conditioner includes a compressor, a fan, a motor, a solenoid valve, a temperature sensor, a humidity sensor, a filter screen, and the like, and the component program module of the air conditioner may include a compressor control program, a fan control program, a motor control program, a solenoid valve control program, a temperature sensor detection program, a humidity sensor detection program, a filter screen control program, and the like.
It should be noted that the method provided by the embodiment of the present disclosure does not excessively limit the types of the home appliances. For example, the cleaning machine can also be a refrigerator, a washing machine, a sweeping robot, a range hood, an electric cooker, a television, an air purifier and the like.
In step S2, when the component program module is authentic, the component program module is powered on.
The integrity of a component program module in a circuit module of the household appliance is suspected, the integrity of the component program module of the household appliance is measured, and when the measurement result of the component program module is credible, the component program module is powered on, so that the power-on safety of the circuit module in the household appliance is improved, and the loss of the household appliance caused by the damage of malicious codes to a user is reduced. The home appliance may also be referred to as an intelligent home appliance or an intelligent home appliance.
Optionally, the method for controlling powering on of the module in the household appliance provided by the embodiment of the present disclosure further includes:
and when the integrity measurement result of the component program module is not credible, generating an integrity warning log and uploading the integrity warning log to the cloud server.
The producer or seller of the household appliance can obtain the integrity warning log and learn the safety condition of the household appliance according to the integrity warning log, so that the producer or seller of the household appliance can know the integrity of the circuit module of the household appliance in time, and the untrusted circuit module can be maintained in a targeted manner.
Optionally, when the integrity measurement result of one of the component program modules is not trusted, after the integrity warning log is generated, the integrity measurement is continuously performed on the remaining circuit modules to be measured of the household appliance until the measurement is complete, that is, the power-on measurement of the circuit module is completed once. And generating integrity warning logs for all the untrusted results obtained in the current power-on measurement, and uploading the integrity warning logs to the cloud server. The circuit modules of the household appliance are possibly invaded by malicious codes, so that potential safety hazards exist in the circuit modules of the household appliance. The method provided by the embodiment of the disclosure performs integrity measurement on all circuit modules needing measurement, and a producer or a seller of the household appliance can perform comprehensive maintenance on the household appliance according to one or more warning logs.
Internet of things household appliances become a trend of development of household appliances at present, safety of the household appliances gradually enters a built-up process from scratch, but there are few cases in application of trusted computing of intelligent household appliances at present, and there is no trusted computing designed particularly for characteristics of the household appliances, a manufacturer or a seller of the household appliances cannot timely obtain conditions such as operation safety and hardware faults of the household appliances, and a user cannot judge safety of the household appliances based on a professional perspective.
The embodiment of the disclosure obtains a method for judging whether the household appliance is credible by credible calculation and combining the characteristics of the intelligent household appliance, and uploads the integrity warning log to the cloud server to establish a safe channel between a producer or a seller of the household appliance and the user household appliance, so that the producer or the seller of the household appliance can establish an intelligent household appliance safety maintenance and protection system, a safety information threat system, a Business Intelligence (BI) system and the like for the user according to the data such as the integrity warning log, and the like, thereby providing a basis for the safe and timely driving protection of the household appliance of the user, and simultaneously, providing a basis for the producer or the seller of the household appliance to discover the commercial value.
Optionally, the aforementioned component program module includes a component detection program, a component sensing program, and a component control program.
Alternatively, the component program module is a program module of a component in the home appliance, for example, the component detection program is a detection program of a component in the home appliance, the component sensing program is a sensing program of a component in the home appliance, and the component control program is a control program of a component in the home appliance. When the household appliance is an air conditioner, the component detection program may be a detection program of one or more components of the air conditioner, and may be a key hardware detection program of the air conditioner, such as a compressor detection program, a fan detection program, a motor detection program, and the like. Optionally, the component detection program may be configured to detect whether a fault exists in a component such as a compressor, a fan, a motor, or the like, and optionally, the component detection program may further include a filter screen cleanliness detection program, or the like.
Alternatively, when the household electrical appliance is an air conditioner, the component sensing program may be a sensing program of one or more components of the air conditioner, and may be a key hardware sensing program of the air conditioner, such as an indoor environment temperature sensor detection program, an indoor coil temperature sensor detection program, an outdoor environment temperature sensor detection program, an outdoor coil temperature sensor detection program, an indoor environment humidity sensor detection program, an outdoor environment humidity sensor detection program, and the like.
Alternatively, when the household electrical appliance is an air conditioner, the component control program may be a control program of one or more components of the air conditioner, and may be a key hardware control program of the air conditioner, such as a compressor control program, a fan control program, a motor control program, a temperature sensor control program, a humidity sensor control program, a solenoid valve control program, and the like.
The integrity of a component detection program, a component sensing program and a component control program of the air conditioner is measured, so that the economic loss of a user caused by hardware failure due to the fact that hardware of the intelligent household appliance is damaged by malicious codes is fully reduced.
Optionally, the circuit module further includes a trusted platform module TPM for performing integrity measurement on component program modules in the circuit module of the home appliance, including:
integrity measurements are made by the TPM on the component program module.
Currently, when performing Trusted computing, a Trusted Platform Module (TPM) is Trusted, and a TPM is used as a Trusted root to establish a Trusted chain. The method for controlling the power-on of the module in the household appliance provided by the embodiment of the disclosure suspects the integrity of the TPM implanted in the circuit module of the household appliance, measures the integrity of the TPM, and powers on the TPM when the measurement result is that the TPM is trusted.
Optionally, the circuit module further includes a SoC, and the performing integrity measurement on the component program module by the TPM includes: powering up the SoC; the integrity of the TPM is measured through the SoC, and when the TPM is trusted, the TPM is powered on; integrity measurements are made by the TPM on the component program module.
The safety information of the TPM is prestored in a System on Chip (SoC), and the integrity of the TPM is measured by comparing the actually measured information of the TPM with the safety information, so that the applicability of a trusted chain to household appliances is improved, and the accuracy of a measurement result is improved.
Optionally, the circuit module further comprises a memory module.
The Memory module may include a Random Access Memory (RAM) and a Read Only Memory (ROM). Alternatively, the method for performing integrity measurement and power-up on the RAM and the ROM may be: carrying out integrity measurement on the RAM, and powering up the RAM when the RAM is credible; and then, the ROM is subjected to integrity measurement, and the ROM is powered up when the ROM is trusted, so that the applicability of a trusted chain to household appliances is improved, and the accuracy of a measurement result is improved.
Optionally, the circuit module further comprises an operating system module.
The Operating System modules may include an Operating System Loader (OS Loader for short), an Operating System Kernel module (OS Kernel for short), and an Operating System Login module (OS Login for short). Optionally, the method for performing integrity measurement and power-up on the OS Loader, the OS kernel, and the OS Login may be: after the ROM is powered up, carrying out integrity measurement on the OS Loader, and powering up the OS Loader when the OS Loader is trusted; performing integrity measurement on the OS Kernel, and powering up the OS Kernel when the OS Kernel is credible; and then, carrying out integrity measurement on the OS Login, and powering up the OS Login when the OS Login is credible so as to improve the applicability of a credible chain to household appliances and improve the accuracy of a measurement result.
Optionally, the method for controlling powering on of the module in the household appliance provided by the embodiment of the present disclosure further includes: after powering on the TPM, integrity measurement is performed on a Central Processing Unit (CPU) of the home appliance, and the CPU is powered on when the CPU is trusted. And carrying out integrity measurement on the CPU so as to detect whether the CPU of the household appliance is credible.
Optionally, the integrity of the module to be measured in the circuit module is measured by using a secure hash algorithm.
And a Secure Hash Algorithm (SHA) is adopted to perform integrity measurement on the component program module, the TPM, the memory module and the operation system module waiting measurement module so as to improve the applicability of the trusted chain to the household appliance and improve the accuracy of the measurement result.
Optionally, as shown in fig. 2, the method for controlling powering on of a module in a home appliance according to the embodiment of the present disclosure includes:
step S101, power up is performed on the SoC.
The home appliance device uses the SoC which is powered up first as the origin of trusted computing of the home appliance device.
Step S102, carrying out integrity measurement on the TPM.
Optionally, performing integrity measurement on the TPM includes:
acquiring a first current hash value of the TPM, and comparing the first current hash value with a first secure hash value of the TPM prestored in the SoC; when the first current hash value is matched with the first safe hash value, the TPM is judged to be credible, and the TPM is powered on; and when the first current hash value is not matched with the first safe hash value, judging that the TPM is not credible, and generating an integrity warning log of the TPM.
And step S103, taking the measurement result of the TPM as an initial value, and when the TPM is trusted, performing integrity measurement on the CPU.
Optionally, taking the measurement result of the TPM as an initial value, and performing integrity measurement on the CPU when the TPM is trusted, where the measurement result includes:
acquiring a second current hash value of the CPU, and comparing the second current hash value with a second safe hash value of the CPU pre-stored in the SoC; when the second current hash value is matched with the second safe hash value, the CPU is judged to be credible, and the CPU is powered on; and when the second current hash value is not matched with the second safe hash value, judging that the CPU is not credible, and generating an integrity warning log of the CPU.
And step S104, taking the measurement result of the TPM as an initial value, and carrying out integrity measurement on the RAM when the CPU is trusted.
Optionally, taking the measurement result of the TPM as an initial value, and performing integrity measurement on the RAM when the CPU is trusted, including:
acquiring a third current hash value of the RAM, and comparing the third current hash value with a third safe hash value prestored in the RAM of the TPM; when the third current hash value is matched with the third safe hash value, judging that the RAM is credible, and powering up the RAM; and when the third current hash value is not matched with the third safe hash value, judging that the RAM is not credible, and generating an integrity warning log of the RAM.
And step S105, taking the measurement result of the TPM as an initial value, and carrying out integrity measurement on the ROM when the RAM is credible.
Optionally, taking the measurement result of the TPM as an initial value, and performing integrity measurement on the ROM when the RAM is trusted, including:
acquiring a fourth current hash value of the ROM, and comparing the fourth current hash value with a fourth safe hash value prestored in the ROM of the TPM; when the fourth current hash value is matched with the fourth safe hash value, the ROM is judged to be credible, and the ROM is electrified; and when the fourth current hash value is not matched with the fourth safe hash value, judging that the ROM is not credible, and generating an integrity warning log of the ROM.
And step S106, taking the measurement result of the TPM as an initial value, and carrying out integrity measurement on the OS Loader when the ROM is credible.
Optionally, taking the measurement result of the TPM as an initial value, and performing integrity measurement on the OS Loader when the ROM is trusted, including:
acquiring a fifth current hash value of the OS Loader, and comparing the fifth current hash value with a fifth safe hash value of the OS Loader prestored in the TPM; when the fifth current hash value is matched with the fifth safe hash value, judging that the OSLoader is credible, and powering on the OS Loader; and when the fifth current hash value is not matched with the fifth safe hash value, judging that the OS Loader is not credible, and generating an integrity warning log of the OS Loader.
And step S107, taking the measurement result of the TPM and the OS Loader as a new initial value, and when the OS Loader is trusted, performing integrity measurement on the OS Kernel.
Optionally, taking a measurement result of the TPM and the OS Loader as a new initial value, and performing integrity measurement on the OS Kernel when the OS Loader is trusted, where the measurement result includes:
acquiring a sixth current hash value of the OS Kernel, and comparing the sixth current hash value with a sixth safety hash value of the OS Kernel prestored in the TPM; when the sixth current hash value is matched with the sixth secure hash value, judging that the OS Kernel is credible, and powering on the OS Kernel; and when the sixth current hash value is not matched with the sixth safe hash value, judging that the OS Kernel is not credible, and generating an integrity warning log of the OS Kernel.
And step S108, taking the measurement result of the TPM and the OS Kernel as a new initial value, and carrying out integrity measurement on the OS Login when the OS Kernel is credible.
Optionally, taking the measurement result of the TPM and the OS Kernel as a new initial value, and performing integrity measurement on the OS Login when the OS Kernel is trusted includes:
acquiring a seventh current hash value of the OS Login, and comparing the seventh current hash value with a seventh safe hash value of the OS Login prestored in the TPM; when the seventh current hash value is matched with the seventh safe hash value, judging that the OS Login is credible, and powering up the OS Login; and when the seventh current hash value is not matched with the seventh safe hash value, judging that the OSLogin is not credible, and generating an integrity warning log of the OS Login.
And step S109, taking the measurement result of the TPM and the OS Kernel as a new initial value, and when the OS Login is credible, performing integrity measurement on the component detection program.
Optionally, taking the measurement result of the TPM and the OS Kernel as a new initial value, and performing integrity measurement on the component detection program when the OS Login is trusted, where the method includes:
acquiring an eighth current hash value of the component detection program, and comparing the eighth current hash value with an eighth safe hash value of the component detection program prestored in the TPM; when the eighth current hash value matches the eighth secure hash value, determining that the component detection program is authentic and powering up the component detection program; when the eighth current hash value does not match the eighth secure hash value, the component detection program is determined to be untrusted, and an integrity warning log of the component detection program is generated.
And step S110, taking the measurement result of the TPM and the OS Kernel as a new initial value, and when the component detection program is credible, performing integrity measurement on the component sensor program.
Optionally, taking the measurement result of the TPM and the OS Kernel as a new initial value, and performing integrity measurement on the component sensor program when the component detection program is trusted, where the method includes:
acquiring a ninth current hash value of the component sensing program, and comparing the ninth current hash value with a ninth safe hash value of the component sensing program prestored in the TPM; when the ninth current hash value is matched with the ninth safe hash value, judging that the component sensing program is credible, and powering up the component sensing program; and when the ninth current hash value does not match the ninth secure hash value, determining that the component sensing program is not authentic, and generating an integrity warning log of the component sensing program.
And step S111, taking the measurement result of the TPM and the OS Kernel as a new initial value, and when the component sensor program is credible, performing integrity measurement on the component control program.
Optionally, taking the measurement result of the TPM and the OS Kernel as a new initial value, and performing integrity measurement on the component control program when the component sensor program is trusted, where the method includes:
acquiring a tenth current hash value of the component control program, and comparing the tenth current hash value with a tenth safety hash value of the component control program pre-stored in the TPM; when the tenth current hash value matches the tenth secure hash value, determining that the component control program is authentic, and powering up the component control program; and when the tenth current hash value does not match the tenth secure hash value, determining that the component control program is not trusted, and generating an integrity warning log of the component control program.
Optionally, as shown in fig. 3, the method for controlling power-on of a module in an electrical home appliance according to the foregoing embodiment further includes:
step S201, when the component program module is not trusted, generating an integrity warning log of the component program module, uploading the integrity warning log of the component program module to the cloud server, and determining whether the power supply needs to be cut off.
If the power is required to be cut off, step S211 is executed; if the power supply does not need to be cut off, step S202 is executed.
Step S211, power off and shutdown wait for the assistance of the producer or seller of the household electrical appliance.
And step S202, controlling the warning lamp to flash and judging whether the hardware is in failure.
If the hardware fault is detected, step S212 is executed; if the hardware failure is not detected, step S203 is executed.
Step S212, controlling the intelligent appliance to be in a standby state, and when the standby time-out occurs, the appliance may be automatically turned off.
Step S203, prompts the user whether to ignore the warning.
When receiving a command that the user does not ignore the warning, executing step S213; when a command for the user to ignore the warning is received, step S204 is executed.
Step S213, controlling the home appliance to be in a standby state, and when the standby time-out occurs, the home appliance may be automatically turned off.
Step S204, the household appliance control program is started, and the household appliance starts to work.
According to different influences of faults of different hardware on the operation of the household appliance, different fault levels are set, such as the following steps: low-level faults, medium-level faults, and high-level faults, wherein the low-level faults may be: when the hardware is judged to be in fault, the hardware is still powered on; the medium level fault may be: when the hardware fault is judged, generating an integrity warning log of the hardware fault, and still powering on the hardware; the high-level fault may be: when a hardware failure is determined, the hardware is not powered up and an integrity warning log of the hardware failure is generated.
Before the integrity measurement of all hardware is completed, the trusted chain cannot continuously run and start the household appliance due to the fact that the failure level is high and hardware is not powered on, and needs to wait for recovery after professional identification of a manufacturer or a seller of the household appliance.
The embodiment of the present disclosure simultaneously provides a device for controlling power on of a module in a household electrical appliance, including: a component program module measuring unit configured to measure the integrity of the component program modules in the circuit module of the home appliance; a component program module power-on unit configured to power on the component program module when the component program module is authentic.
Optionally, in the foregoing apparatus, the component program module includes a component detection program, a component sensing program, and a component control program.
Optionally, in the foregoing apparatus, the circuit module further includes a trusted platform module TPM, and the component program module measurement unit is configured to perform integrity measurement on the component program module through the TPM.
Optionally, in the foregoing apparatus, the circuit module further includes a SoC, and the component program module measurement unit includes:
a first subunit configured to power up the SoC;
the second subunit is configured to perform integrity measurement on the TPM through the SoC, and when the TPM is trusted, the TPM is powered on;
a third subunit configured to perform integrity measurement on the component program module by the TPM.
Optionally, in the foregoing apparatus, the circuit module further includes a memory module, and the apparatus further includes a memory module metric unit.
Optionally, in the foregoing apparatus, the circuit module further includes an operating system module, and the apparatus further includes an operating system module measurement unit.
It is understood that the foregoing embodiments related to the method for controlling power up of a module in an electrical home appliance may be applied to the apparatus herein, and are not described herein again.
The embodiment of the present disclosure also provides an apparatus for controlling power on of a module in an electrical home appliance, as shown in fig. 4, including a processor (processor)100 and a memory (memory)101 storing program instructions, where the processor 100 is configured to execute the method as described above when executing the program instructions.
Optionally, the means for controlling the powering on of the module in the home appliance may further include a Communication Interface (Communication Interface)102 and a bus 103. The processor 100, the communication interface 102, and the memory 101 may communicate with each other via a bus 103. The communication interface 102 may be used for information transfer. The processor 100 may call logic instructions in the memory 101 to perform the method for controlling power up of the module in the home appliance according to the above embodiment.
In addition, the logic instructions in the memory 101 may be implemented in the form of software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products.
The memory 101, which is a computer-readable storage medium, may be used for storing software programs, computer-executable programs, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor 100 executes functional applications and data processing by executing program instructions/modules stored in the memory 101, that is, implements the method for controlling power-on of modules in the home appliance in the above method embodiment.
The memory 101 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. In addition, the memory 101 may include a high-speed random access memory, and may also include a nonvolatile memory.
The embodiment of the present disclosure further provides a home appliance, which includes the aforementioned device for controlling the module in the home appliance to be powered on.
The embodiments of the present disclosure do not limit the types of the home appliances, and may include: air conditioner, refrigerator, washing machine, TV set, smoke ventilator, robot of sweeping the floor, air purifier, electric rice cooker etc..
The above description and drawings sufficiently illustrate embodiments of the disclosure to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. The scope of the disclosed embodiments includes the full ambit of the claims, as well as all available equivalents of the claims. As used in this application, although the terms "first," "second," etc. may be used in this application to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, unless the meaning of the description changes, so long as all occurrences of the "first element" are renamed consistently and all occurrences of the "second element" are renamed consistently. The first and second elements are both elements, but may not be the same element. Furthermore, the words used in the specification are words of description only and are not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this application is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, the terms "comprises" and/or "comprising," when used in this application, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising an …" does not exclude the presence of other like elements in a process, method or apparatus that comprises the element. In this document, each embodiment may be described with emphasis on differences from other embodiments, and the same and similar parts between the respective embodiments may be referred to each other. For methods, products, etc. of the embodiment disclosures, reference may be made to the description of the method section for relevance if it corresponds to the method section of the embodiment disclosure.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software may depend upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments. It can be clearly understood by the skilled person that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments disclosed herein, the disclosed methods, products (including but not limited to devices, apparatuses, etc.) may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be merely a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to implement the present embodiment. In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In the description corresponding to the flowcharts and block diagrams in the figures, operations or steps corresponding to different blocks may also occur in different orders than disclosed in the description, and sometimes there is no specific order between the different operations or steps. For example, two sequential operations or steps may in fact be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. Each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Claims (10)

1. A method for controlling power up of a module in a home appliance, comprising:
integrity measurements are made of component program modules in the circuit modules of the home device,
powering up the component program module when the component program module is authentic.
2. The method of claim 1,
the component program module includes a component detection program, a component sensing program, and a component control program.
3. The method of claim 1, wherein the circuit module further comprises a Trusted Platform Module (TPM) and the performing integrity measurements on component program modules in the circuit module of the home device comprises:
performing integrity measurements on the component program module by the TPM.
4. The method of claim 3, wherein the circuit module further comprises a system-on-a-chip (SoC), and wherein the performing, by the TPM, the integrity measurement on the component program module comprises:
powering up the SoC;
performing integrity measurement on the TPM through the SoC, and powering on the TPM when the TPM is trusted;
performing integrity measurements on the component program module by the TPM.
5. The method of claim 1,
the circuit module also includes a memory module.
6. The method of claim 1,
the circuit module also includes an operating system module.
7. The method according to any one of claims 1 to 6,
and carrying out integrity measurement on a module to be measured in the circuit module by using a secure hash algorithm.
8. An apparatus for controlling power up of a module in a home appliance, comprising:
a component program module measuring unit configured to measure the integrity of the component program modules in the circuit module of the home appliance;
a component program module power-on unit configured to power on the component program module when the component program module is authentic.
9. An apparatus for controlling power up of a module in an appliance, comprising a processor and a memory storing program instructions, wherein,
the processor is configured to perform the method of any of claims 1 to 7 when executing the program instructions.
10. An electric household appliance comprising the device according to claim 8 or 9.
CN201910808800.9A 2019-08-29 2019-08-29 Method and device for controlling module in household appliance to be powered on and household appliance Active CN110609536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910808800.9A CN110609536B (en) 2019-08-29 2019-08-29 Method and device for controlling module in household appliance to be powered on and household appliance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910808800.9A CN110609536B (en) 2019-08-29 2019-08-29 Method and device for controlling module in household appliance to be powered on and household appliance

Publications (2)

Publication Number Publication Date
CN110609536A true CN110609536A (en) 2019-12-24
CN110609536B CN110609536B (en) 2020-11-10

Family

ID=68891068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910808800.9A Active CN110609536B (en) 2019-08-29 2019-08-29 Method and device for controlling module in household appliance to be powered on and household appliance

Country Status (1)

Country Link
CN (1) CN110609536B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI827207B (en) * 2022-05-30 2023-12-21 碩天科技股份有限公司 Cloud server and operation method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device
CN106919845A (en) * 2017-03-06 2017-07-04 联想(北京)有限公司 The safe trust chain constructing device of system and construction method
CN110096882A (en) * 2018-01-31 2019-08-06 北京可信华泰信息技术有限公司 A kind of security measure method in equipment running process
CN110096883A (en) * 2018-01-31 2019-08-06 北京可信华泰信息技术有限公司 A kind of credible measure
CN110110526A (en) * 2019-05-08 2019-08-09 郑州信大捷安信息技术股份有限公司 A kind of safety starting device and method based on safety chip
CN110119623A (en) * 2018-02-06 2019-08-13 北京可信华泰信息技术有限公司 A kind of credible main board implementation method for realizing that firmware is actively measured using TPCM

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device
CN106919845A (en) * 2017-03-06 2017-07-04 联想(北京)有限公司 The safe trust chain constructing device of system and construction method
CN110096882A (en) * 2018-01-31 2019-08-06 北京可信华泰信息技术有限公司 A kind of security measure method in equipment running process
CN110096883A (en) * 2018-01-31 2019-08-06 北京可信华泰信息技术有限公司 A kind of credible measure
CN110119623A (en) * 2018-02-06 2019-08-13 北京可信华泰信息技术有限公司 A kind of credible main board implementation method for realizing that firmware is actively measured using TPCM
CN110110526A (en) * 2019-05-08 2019-08-09 郑州信大捷安信息技术股份有限公司 A kind of safety starting device and method based on safety chip

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI827207B (en) * 2022-05-30 2023-12-21 碩天科技股份有限公司 Cloud server and operation method thereof

Also Published As

Publication number Publication date
CN110609536B (en) 2020-11-10

Similar Documents

Publication Publication Date Title
CN105550579A (en) Method for measuring BMC integrity on basis of TPCM
CN102663288B (en) Virus killing method and device thereof
CN104636221A (en) Method and device for processing computer system fault
CN110703096B (en) Motor working state detection method, device, equipment and storage medium
CN110020528A (en) A kind of BMC starting method, apparatus and electronic equipment and storage medium
CN110609536B (en) Method and device for controlling module in household appliance to be powered on and household appliance
CN105892611A (en) CPU power-on time sequence control method, device and system
CN104010077B (en) A kind of information processing method and electronic equipment
CN101989220A (en) Pressure testing method
CN105791250B (en) Application program detection method and device
CN111651769B (en) Method and device for acquiring measurement of security initiation
WO2022188398A1 (en) Method and apparatus for controlling air conditioner, and air conditioner
CN108458443B (en) Air conditioner fault detection method and device, air conditioner and storage medium
CN112783721B (en) Method, device and system for monitoring I2C bus and storage medium
CN110598401A (en) Method and device for controlling module in household appliance to be powered on and household appliance
CN110659497A (en) Trusted boot control method and device and computer readable storage medium
CN108871616B (en) Motor state identification method and device
CN104298924A (en) Method and device for ensuring system safety and terminal
CN105912442A (en) Electronic device with temperature management function
CN105653412A (en) Fingerprint device compatibility detection method and terminal
CN107179911A (en) A kind of method and apparatus for restarting management engine
CN109710339B (en) Information processing method and device
CN111209196B (en) Blue screen strategy testing method and device of system and storage medium
CN110781517B (en) Method for realizing data interaction by BIOS and BMC communication
CN107918580A (en) For opening computer detecting system and start method for detecting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant