CN111159717A - Starting method and device for electronic equipment - Google Patents

Starting method and device for electronic equipment Download PDF

Info

Publication number
CN111159717A
CN111159717A CN201911364233.9A CN201911364233A CN111159717A CN 111159717 A CN111159717 A CN 111159717A CN 201911364233 A CN201911364233 A CN 201911364233A CN 111159717 A CN111159717 A CN 111159717A
Authority
CN
China
Prior art keywords
firmware information
embedded controller
firmware
information
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911364233.9A
Other languages
Chinese (zh)
Inventor
陈志玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Lianbao Information Technology Co Ltd
Original Assignee
Hefei Lianbao Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Lianbao Information Technology Co Ltd filed Critical Hefei Lianbao Information Technology Co Ltd
Priority to CN201911364233.9A priority Critical patent/CN111159717A/en
Publication of CN111159717A publication Critical patent/CN111159717A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a starting method and a starting device for electronic equipment, wherein the method comprises the following steps: verifying the first firmware information stored by the embedded controller by using the embedded controller; when the first firmware information is verified to be correct, starting the electronic equipment based on the first firmware information; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed. According to the invention, the first firmware information is obtained by encrypting the original firmware information, the second firmware information is obtained by backing up the first firmware information, and when the first firmware information is damaged, the electronic equipment can be started by using the second firmware information, so that the normal starting of the electronic equipment is ensured.

Description

Starting method and device for electronic equipment
Technical Field
The present invention relates to the field of electronic devices, and in particular, to a method and an apparatus for starting an electronic device.
Background
In the embedded device, the firmware is a program that serves as the most basic and bottom layer of the system, and when the device is started, the corresponding firmware needs to be started first to complete operations such as starting up the device.
However, in the prior art, the firmware is easily cracked and damaged by hackers, and once the firmware is cracked and damaged by hackers, the firmware cannot be recovered, so that the device cannot be started.
Disclosure of Invention
An embodiment of the present invention provides a starting method and apparatus for an electronic device, which are used to solve the problem that in the prior art, firmware information in the electronic device cannot be started normally when the firmware information is damaged.
In order to solve the technical problem, the embodiment of the application adopts the following technical scheme: a booting method for an electronic device, comprising the steps of:
verifying the first firmware information stored by the embedded controller by using the embedded controller;
when the first firmware information is verified to be correct, starting the electronic equipment based on the first firmware information; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed.
Optionally, before the first firmware information stored in the embedded controller is verified by using the embedded controller, the method further includes:
judging whether the embedded controller stores the first firmware information or not;
and when the embedded controller is judged not to store the first firmware information, acquiring the first firmware information from the preset position, and storing the first firmware information to the embedded controller.
Optionally, before the determining whether the first firmware information is stored in the embedded controller, the method further includes:
calculating the original firmware information by using a server according to a preset encryption algorithm to obtain a signature;
coding and encrypting by using a preset software encryption method based on the original firmware information and the signature to obtain the first firmware information;
copying the first firmware information to obtain second firmware information;
storing the first firmware information, the second firmware information, and the preset encryption algorithm in the predetermined location.
Optionally, the first firmware information includes a signature and original firmware information;
the verifying the first firmware information stored by the embedded controller by using the embedded controller specifically includes:
acquiring the preset secret algorithm by using the embedded controller;
calculating the original firmware information by using the embedded controller according to the preset encryption algorithm to obtain a first check value;
and determining whether the first firmware information is correct according to the first check value and the signature in the first firmware information, and obtaining a verification result.
Optionally, the verifying the second firmware information by using the embedded controller specifically includes:
acquiring the preset encryption algorithm by using the embedded controller;
calculating the original firmware information by using the embedded controller according to the preset encryption algorithm to obtain a second check value;
and determining whether the second firmware information is correct according to the second check value and the signature in the second firmware information, and obtaining a verification result.
Optionally, before verifying the first firmware information, the method further includes:
and decoding the first firmware information by using a preset software encryption method to obtain the decoded first firmware information so as to verify the decoded first firmware information.
Optionally, before verifying the second firmware information, the method further includes:
and decoding the second firmware information by using a preset software encryption method to obtain the decoded second firmware information so as to verify the decoded second firmware information.
Optionally, the determining whether the first firmware information is stored in the embedded controller specifically includes:
and confirming whether the embedded controller stores the first firmware information or not by using a preset boot loader.
Optionally, the storing the first firmware information, the second firmware information, the preset encryption algorithm, and the preset software encryption method in the predetermined location specifically includes:
storing the first firmware information, the second firmware information, the preset encryption algorithm and the preset software encryption method in BIOS firmware.
In order to solve the above problem, the present invention provides a starting apparatus for an electronic device, comprising:
the first verification module is used for verifying the first firmware information stored by the embedded controller;
the starting module is used for starting the electronic equipment based on the first firmware information when the first firmware information is verified to be correct; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed.
The embodiment of the invention has the beneficial effects that: the first firmware information is obtained by encrypting the original firmware information, the first firmware information is backed up to obtain the second firmware information, when the first firmware information is damaged, the electronic equipment can be started by using the second firmware information, and normal starting of the electronic equipment is guaranteed. And the first firmware information or the second firmware information is verified before the electronic equipment is started, so that the safety of the electronic equipment is ensured, and the electronic equipment is prevented from being attacked by hackers.
Drawings
Fig. 1 is a flowchart of a booting method for an electronic device according to a first embodiment of the invention;
FIG. 2 is a flowchart illustrating a booting method for an electronic device according to a second embodiment of the invention;
FIG. 3 is a flowchart illustrating a booting method for an electronic device according to a third embodiment of the invention;
FIG. 4 is an architecture diagram of an electronic device according to an embodiment of the present invention;
fig. 5 is a block diagram of a starting apparatus for an electronic device according to a fourth embodiment of the present invention.
Detailed Description
Various aspects and features of the present application are described herein with reference to the drawings.
It will be understood that various modifications may be made to the embodiments of the present application. Accordingly, the foregoing description should not be construed as limiting, but merely as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the application and, together with a general description of the application given above and the detailed description of the embodiments given below, serve to explain the principles of the application.
These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment, given as non-limiting examples, with reference to the attached drawings.
It should also be understood that, although the present application has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of application, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present application will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present application are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely exemplary of the application, which can be embodied in various forms. Well-known and/or repeated functions and constructions are not described in detail to avoid obscuring the application of unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present application in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the application.
The embodiment of the invention provides a starting method for electronic equipment, which can be particularly applied to various electronic equipment, such as a notebook computer, and comprises the following steps: verifying the first firmware information stored by the embedded controller by using the embedded controller; when the first firmware information is verified to be correct, starting the electronic equipment based on the first firmware information; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed. According to the embodiment of the invention, the first firmware information is obtained by encrypting the original firmware information, the second firmware information is obtained by backing up the first firmware information, and when the first firmware information is damaged, the second firmware information can be utilized to start the computer, so that the normal start of the computer is ensured.
A first embodiment of the present invention provides a starting method for an electronic device, as shown in fig. 1, including the following steps:
step S101, verifying first firmware information stored by an embedded controller by using the embedded controller;
step S102, when the first firmware information is verified to be correct, starting the electronic equipment based on the first firmware information; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed.
The firmware information in this embodiment refers to a program written in EROM (erasable read only memory) or EEPROM (electrically erasable programmable read only memory). Specifically, the device driver stored in the device is used, and the operating system can realize the operation of a specific machine according to the standard device driver through firmware. In this embodiment, the first firmware information is obtained by encrypting the original firmware information, and the second firmware information is obtained by backing up the first firmware information, so that when the first firmware information is damaged, the electronic device can be started by using the second firmware information, thereby ensuring normal starting of the electronic device. And the first firmware information or the second firmware information is verified before the electronic equipment is started, so that the safety of the electronic equipment is ensured, and the electronic equipment is prevented from being attacked by hackers.
A second embodiment of the present invention provides a starting method for an electronic device, as shown in fig. 2, including the following steps:
step S201, judging whether the embedded controller stores the first firmware information;
in the specific implementation process of this step, whether the first firmware information is stored in the embedded controller is confirmed through a predetermined boot loader.
Step S202, when the embedded controller is judged not to store the first firmware information, acquiring the first firmware information from the preset position, and storing the first firmware information to the embedded controller;
the predetermined location described in this embodiment refers to the BIOS firmware. Specifically, before step S201, the first firmware information is stored in the BIOS firmware in advance.
Step S203, verifying the first firmware information stored by the embedded controller by using the embedded controller;
in this step, the first firmware information includes a signature and original firmware information; when verifying the first firmware information, the method specifically includes: acquiring the preset secret algorithm by using the embedded controller; calculating the original firmware information by using the embedded controller according to the preset encryption algorithm to obtain a first check value; and determining whether the first firmware information is correct according to the first check value and the signature in the first firmware information, and obtaining a verification result. The signature in the first firmware information is obtained by the server through calculation according to the original firmware information in the first firmware information by using a preset encryption algorithm.
Step S204, when the first firmware information is verified to be correct, starting the electronic equipment based on the first firmware information; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed.
In this implementation, when the first firmware information is verified to be incorrect, it is indicated that the first firmware information is damaged, so that the backed-up second firmware information is obtained from the BIOS, and then the same verification method is used to verify the second firmware information to determine whether the second firmware information is correct; the specific verification process is as follows: acquiring the preset encryption algorithm by using the embedded controller; calculating the original firmware information by using the embedded controller according to the preset encryption algorithm to obtain a second check value; and determining whether the second firmware information is correct according to the second check value and the signature in the second firmware information, and obtaining a verification result. When the second firmware information is verified, the electronic device can be started based on the second firmware information. In this embodiment, before step S201, when the first firmware information is stored in the BIOS firmware in advance, the second firmware information and the predetermined encryption algorithm are stored in the BIOS firmware at the same time.
In the embodiment, the second firmware information is obtained by backing up the first firmware information, and when the first firmware information is damaged, the electronic equipment can be started by using the second firmware information, so that the normal starting of the electronic equipment is ensured.
A third embodiment of the present invention provides a starting method for an electronic device, including the following steps:
step S301, calculating original firmware information by using a server according to a preset encryption algorithm to obtain a signature;
in this step, the original firmware information is the "driver" that can drive the device without encryption. In this step, the server is used to calculate the original firmware information according to the preset encryption algorithm key, so as to obtain the signature S.
Step S302, based on the original firmware information and the signature, encoding and encrypting are carried out by using a preset software encryption method, and the first firmware information is obtained;
after the signature S is obtained in this step, the first firmware information can be obtained by combining the signature and the original firmware information. In order to prevent the first firmware information from being cracked, the combined firmware information needs to be encrypted by encryption software after combination. Specifically, the combined firmware information is divided to obtain a plurality of information blocks, and then each piece of information is encoded to obtain the first firmware information.
Step S303, copying the first firmware information to obtain second firmware information;
the implementation can perform backup on the first firmware information to obtain the second firmware information after performing encryption twice on the original firmware information to obtain the first firmware information.
Step S304, storing the first firmware information, the second firmware information and the preset encryption algorithm in the predetermined location.
In this step, the predetermined location may be BIOS firmware. Namely, the first firmware information, the second firmware information and the preset encryption algorithm key are stored in the BIOS firmware.
Step S305, judging whether the embedded controller stores the first firmware information;
in this step, when the electronic device is started, whether the embedded controller stores first firmware information or not is judged;
step S306, when it is determined that the first firmware information is not stored in the embedded controller, obtaining the first firmware information from the predetermined location, and storing the first firmware information to the embedded controller.
In the step, specifically, first firmware information is obtained from a BIOS, and a preset encryption algorithm key is obtained at the same time; and then decoding each information block by using encryption software, combining the decoded information blocks according to the position sequence to obtain combined firmware information, and finally storing the combined firmware information to the embedded controller. I.e. the combined firmware information comprises the original firmware information and the signature S.
Step S307, verifying the first firmware information stored by the embedded controller;
in the specific implementation process of this step, after the first firmware information is decoded, the combined firmware information obtained is verified. The specific verification process is as follows: the embedded controller calculates original firmware information in the combined firmware information by using a preset encryption algorithm key acquired from the BIOS to obtain a first check value S ', compares the first check value S' with a signature S in the combined firmware information, verifies that the original firmware information is correct (i.e., verifies that the first firmware information is correct) if the first check value S 'is the same as the signature S, and verifies that the original firmware information is wrong (i.e., verifies that the first firmware information is wrong) if the first check value S' is different from the signature S.
Step S308, when the first firmware information is verified to be correct, starting the electronic equipment based on the first firmware information; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed.
In this step, when the first firmware information is verified to be correct, the electronic device is specifically started based on the original firmware information in the first firmware information. When the first firmware information is verified to be wrong, specifically, the preset encryption algorithm key is obtained from the second firmware information in the BIOS; then, decoding each information block of the second firmware information by using the encryption software, and combining the decoded information blocks according to the position sequence, thereby obtaining the combined firmware information corresponding to the second firmware information, finally storing the combined firmware information to the embedded controller, and then verifying the second firmware information, wherein the specific verification process is the same as that of the first firmware information, namely: the embedded controller calculates original firmware information in the combined firmware information by using a preset encryption algorithm key acquired from the BIOS to obtain a second check value S ', compares the second check value S' with the signature S in the combined firmware information, verifies that the original firmware information is correct (i.e., verifies that the second firmware information is correct) if the two are the same, and verifies that the original firmware information is wrong (i.e., verifies that the second firmware information is wrong) if the two are different.
In this embodiment, after verifying that the second firmware information is correct, the method further includes overwriting the first firmware information in the BIOS firmware with the second firmware information stored in the BIOS firmware. In this embodiment, the BIOS firmware is specifically stored in sprom of the CPU.
In this embodiment, by signing the original firmware information in the first firmware information and the second firmware information, it can be verified whether the original firmware information is correct, so that the security of the device can be ensured, and hacking can be prevented. And the first firmware information is obtained by further carrying out software encryption on the firmware information of the combination of the original firmware and the signature, so that the first firmware information can be further prevented from being cracked and damaged. Further ensuring the normal start of the equipment.
Based on the above embodiments, further description is made with reference to specific application scenarios, as shown in fig. 4, an electronic device such as a computer is provided with a CPU and an embedded controller EC, the BIOS firmware of the CPU stores first firmware information ECFW1, second firmware information ECFW2 and an encryption algorithm key, and the BIOS is stored in the SPI ROM of the CPU. The first firmware information is obtained by signing original firmware information and then encrypting the original firmware information by using software, and the second firmware information is obtained by copying the first firmware information.
When the computer is started, the boot loader is required to confirm whether firmware information is stored in the EC:
if the firmware information ECFW is not stored, acquiring first firmware information ECFW1 and a preset encryption algorithm from the SPI, decoding the first firmware information ECFW1 to obtain original firmware information and a signature, and storing the original firmware information and the signature in the embedded controller; then the embedded control calculates the original firmware information by using a preset encryption algorithm to obtain a first check value, verifies whether the original firmware information is correct or not by comparing the first check value with the signature, and starts the computer if the original firmware information is correct; if the verification is wrong, acquiring second firmware information ECFW2 and a preset encryption algorithm from the SPI, decoding the second firmware information to obtain original firmware information and a signature, then storing the original firmware information and the signature corresponding to the second firmware information in the embedded controller, then calculating the original firmware information by using the preset encryption algorithm by the embedded controller to obtain a second check value, verifying whether the original firmware information is correct by comparing the second check value with the signature, if so, overwriting the first firmware information by using the second firmware information in the SPI, and simultaneously starting the computer based on the original firmware information in the second firmware information.
If the firmware information ECFW is stored, directly verifying the original firmware information in the firmware information, wherein the specific verification process is as described above and is not described herein again; if the original firmware information is verified to be correct, starting the computer based on the original firmware information; if the original firmware information is verified to be wrong, acquiring second firmware information and a preset encryption algorithm from the SPI, decoding the second firmware information to obtain the original firmware information and a signature, storing the original firmware information and the signature corresponding to the second firmware information in the embedded controller, and verifying the newly stored original firmware information, wherein the specific verification process is as described above and is not repeated herein, and if the verification is passed, starting the computer based on the newly stored original firmware information.
A fourth embodiment of the present invention provides a starting apparatus for an electronic device, as shown in fig. 5, including:
the first verification module is used for verifying the first firmware information stored by the embedded controller;
the starting module is used for starting the electronic equipment based on the first firmware information when the first firmware information is verified to be correct; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed.
In the implementation, in the specific implementation process, the device further comprises a confirmation module, wherein the confirmation module is used for judging whether the first firmware information is stored in the embedded controller;
and when the embedded controller is judged not to store the first firmware information, acquiring the first firmware information from the preset position, and storing the first firmware information to the embedded controller. Wherein the predetermined location may be BIOS firmware.
Specifically, the starting device for the electronic equipment further comprises a backup module, wherein the backup module is used for calculating the original firmware information by using a server according to a preset encryption algorithm to obtain a signature; coding and encrypting by using a preset software encryption method based on the original firmware information and the signature to obtain the first firmware information; copying the first firmware information to obtain second firmware information; storing the first firmware information, the second firmware information, and the preset encryption algorithm in the predetermined location. Specifically, the first firmware information, the second firmware information and the preset encryption algorithm are stored in the BIOS firmware.
Specifically, in the implementation process, the first verification module is specifically configured to: acquiring the preset secret algorithm by using the embedded controller; calculating the original firmware information by using the embedded controller according to the preset encryption algorithm to obtain a first check value; and determining whether the first firmware information is correct according to the first check value and the signature in the first firmware information, and obtaining a verification result.
Specifically, in this embodiment, the start module, when configured to verify the second firmware information by using the embedded controller, is specifically configured to: acquiring the preset encryption algorithm by using the embedded controller; calculating the original firmware information by using the embedded controller according to the preset encryption algorithm to obtain a second check value; and determining whether the second firmware information is correct according to the second check value and the signature in the second firmware information, and obtaining a verification result.
Specifically, in this implementation, the starting apparatus for an electronic device further includes a first decoding module, where the first decoding module is configured to: and decoding the first firmware information by using a preset software encryption method to obtain the decoded first firmware information so as to verify the decoded first firmware information.
Specifically, in this implementation, the starting apparatus for an electronic device further includes a second decoding module, where the second decoding module is configured to: and decoding the second firmware information by using a preset software encryption method to obtain the decoded second firmware information so as to verify the decoded second firmware information.
In this embodiment, by signing the original firmware information in the first firmware information and the second firmware information, it can be verified whether the original firmware information is correct, so that the security of the device can be ensured, and hacking can be prevented. And the first firmware information is obtained by further carrying out software encryption on the firmware information of the combination of the original firmware and the signature, so that the first firmware information can be further prevented from being cracked and damaged. Further ensuring the normal start of the equipment.
The above embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and the scope of the present invention is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present invention, and such modifications and equivalents should also be considered as falling within the scope of the present invention.

Claims (10)

1. A method for booting an electronic device, comprising the steps of:
verifying the first firmware information stored by the embedded controller by using the embedded controller;
when the first firmware information is verified to be correct, starting the electronic equipment based on the first firmware information; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed.
2. The method of claim 1, wherein prior to verifying the first firmware information it stores with the embedded controller, the method further comprises:
judging whether the embedded controller stores the first firmware information or not;
and when the embedded controller is judged not to store the first firmware information, acquiring the first firmware information from the preset position, and storing the first firmware information to the embedded controller.
3. The method of claim 2, wherein prior to the determining whether the first firmware information is stored in the embedded controller, the method further comprises:
calculating the original firmware information by using a server according to a preset encryption algorithm to obtain a signature;
coding and encrypting by using a preset software encryption method based on the original firmware information and the signature to obtain the first firmware information;
copying the first firmware information to obtain second firmware information;
storing the first firmware information, the second firmware information, and the preset encryption algorithm in the predetermined location.
4. The method of claim 3, wherein the first firmware information comprises a signature and original firmware information;
the verifying the first firmware information stored by the embedded controller by using the embedded controller specifically includes:
acquiring the preset secret algorithm by using the embedded controller;
calculating the original firmware information by using the embedded controller according to the preset encryption algorithm to obtain a first check value;
and determining whether the first firmware information is correct according to the first check value and the signature in the first firmware information, and obtaining a verification result.
5. The method of claim 3, wherein the verifying the second firmware information using the embedded controller specifically comprises:
acquiring the preset encryption algorithm by using the embedded controller;
calculating the original firmware information by using the embedded controller according to the preset encryption algorithm to obtain a second check value;
and determining whether the second firmware information is correct according to the second check value and the signature in the second firmware information, and obtaining a verification result.
6. The method of claim 4, wherein prior to verifying the first firmware information, the method further comprises:
and decoding the first firmware information by using a preset software encryption method to obtain the decoded first firmware information so as to verify the decoded first firmware information.
7. The method of claim 5, wherein prior to verifying the second firmware information, the method further comprises:
and decoding the second firmware information by using a preset software encryption method to obtain the decoded second firmware information so as to verify the decoded second firmware information.
8. The method of claim 2, wherein the determining whether the first firmware information is stored in the embedded controller specifically comprises:
and confirming whether the embedded controller stores the first firmware information or not by using a preset boot loader.
9. The method according to claim 3, wherein the storing the first firmware information, the second firmware information, the predetermined encryption algorithm, and the predetermined software encryption method in the predetermined location specifically comprises:
storing the first firmware information, the second firmware information, the preset encryption algorithm and the preset software encryption method in BIOS firmware.
10. An activation apparatus for an electronic device, comprising:
the first verification module is used for verifying the first firmware information stored by the embedded controller;
the starting module is used for starting the electronic equipment based on the first firmware information when the first firmware information is verified to be correct; and when the first firmware information is verified to be wrong, obtaining the backed-up second firmware information from a preset position, storing the second firmware information to the embedded controller so as to verify the second firmware information by using the embedded controller, and starting the electronic equipment based on the second firmware information under the condition that the second firmware information is verified to be passed.
CN201911364233.9A 2019-12-25 2019-12-25 Starting method and device for electronic equipment Pending CN111159717A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911364233.9A CN111159717A (en) 2019-12-25 2019-12-25 Starting method and device for electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911364233.9A CN111159717A (en) 2019-12-25 2019-12-25 Starting method and device for electronic equipment

Publications (1)

Publication Number Publication Date
CN111159717A true CN111159717A (en) 2020-05-15

Family

ID=70558123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911364233.9A Pending CN111159717A (en) 2019-12-25 2019-12-25 Starting method and device for electronic equipment

Country Status (1)

Country Link
CN (1) CN111159717A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112099855A (en) * 2020-08-05 2020-12-18 联想(北京)有限公司 Information processing method, electronic equipment and computer storage medium
CN112199235A (en) * 2020-09-30 2021-01-08 联想(北京)有限公司 Electronic equipment and starting method
TWI775578B (en) * 2021-04-30 2022-08-21 新加坡商瑞昱新加坡有限公司 Embedded electronic devices, boot method and embedded electronic devices readable medium with stored programs

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106598778A (en) * 2016-11-21 2017-04-26 合肥联宝信息技术有限公司 Method and device for restoring firmware information
CN106815531A (en) * 2015-12-02 2017-06-09 比亚迪股份有限公司 The treating method and apparatus of equipment identification information
CN108108269A (en) * 2017-12-18 2018-06-01 联想(北京)有限公司 The control method and device of the BIOS of a kind of electronic equipment
CN109214168A (en) * 2018-08-27 2019-01-15 阿里巴巴集团控股有限公司 Firmware upgrade method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815531A (en) * 2015-12-02 2017-06-09 比亚迪股份有限公司 The treating method and apparatus of equipment identification information
CN106598778A (en) * 2016-11-21 2017-04-26 合肥联宝信息技术有限公司 Method and device for restoring firmware information
CN108108269A (en) * 2017-12-18 2018-06-01 联想(北京)有限公司 The control method and device of the BIOS of a kind of electronic equipment
CN109214168A (en) * 2018-08-27 2019-01-15 阿里巴巴集团控股有限公司 Firmware upgrade method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112099855A (en) * 2020-08-05 2020-12-18 联想(北京)有限公司 Information processing method, electronic equipment and computer storage medium
CN112099855B (en) * 2020-08-05 2022-01-14 联想(北京)有限公司 Information processing method, electronic equipment and computer storage medium
CN112199235A (en) * 2020-09-30 2021-01-08 联想(北京)有限公司 Electronic equipment and starting method
TWI775578B (en) * 2021-04-30 2022-08-21 新加坡商瑞昱新加坡有限公司 Embedded electronic devices, boot method and embedded electronic devices readable medium with stored programs

Similar Documents

Publication Publication Date Title
CN111159717A (en) Starting method and device for electronic equipment
EP2693789B1 (en) Mobile terminal encryption method, hardware encryption device and mobile terminal
TWI564800B (en) Authorizing a bios policy change for storage
CN112699419B (en) Method for safely executing extensible firmware application program and calculator equipment
CN102959554B (en) The memory device recovered for store status and method
CN111162911B (en) PLC firmware upgrading system and method
EP3100168B1 (en) Data erasure of a target device
EP3316160A1 (en) Authentication method and apparatus for reinforced software
CN112148314B (en) Mirror image verification method, device and equipment of embedded system and storage medium
CN110688660A (en) Method and device for safely starting terminal and storage medium
CN108427888A (en) File signature method, file verification method and corresponding intrument and equipment
CN111095200A (en) Method, device and equipment for safely upgrading embedded program and storage medium
CN106569907B (en) System startup file checking and compiling method
US9210134B2 (en) Cryptographic processing method and system using a sensitive data item
US11960608B2 (en) Fast secure booting method and system
CN110781478A (en) Method and device for realizing debugging by temporarily authorizing Root
CN111241548B (en) Computer starting method
CN116775145A (en) Method, device, equipment and storage medium for starting and recovering server
CN107704756B (en) Security verification method and system before system upgrade
CN108319848B (en) Starting-up control method and device
CN110674525A (en) Electronic equipment and file processing method thereof
JP5049179B2 (en) Information processing terminal device and application program activation authentication method
CN112966276B (en) Method, device and medium for safely starting computer
CN115357908A (en) Network equipment kernel credibility measurement and automatic restoration method
CN114764347A (en) Program verification system and method of multi-core controller and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination