CN112784275B - Electronic device, cloud deployment system of boot image and method thereof - Google Patents
Electronic device, cloud deployment system of boot image and method thereof Download PDFInfo
- Publication number
- CN112784275B CN112784275B CN201911060258.XA CN201911060258A CN112784275B CN 112784275 B CN112784275 B CN 112784275B CN 201911060258 A CN201911060258 A CN 201911060258A CN 112784275 B CN112784275 B CN 112784275B
- Authority
- CN
- China
- Prior art keywords
- electronic device
- boot
- boot image
- images
- files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000004891 communication Methods 0.000 claims description 39
- 208000033748 Device issues Diseases 0.000 claims description 2
- 238000012795 verification Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000003213 activating effect Effects 0.000 description 3
- 230000007547 defect Effects 0.000 description 3
- 230000004913 activation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000007943 implant Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
A cloud deployment system and a method for a boot image are provided. The server includes a storage medium and a control circuit. The electronic device is used for sending out a request instruction. The storage medium is used for storing a plurality of boot images, each boot image comprises a plurality of destination files, and the combination sequence of the destination files of each boot image is different from the combination sequence of the destination files of other boot images. The control circuit is used for transmitting one of the boot images back to the electronic device according to the request instruction, and the electronic device executes the received boot image.
Description
Technical Field
The present disclosure relates to the field of cloud boot, and more particularly, to an electronic device for deploying boot images in the cloud, a cloud deployment system for deploying boot images in the cloud, and a method thereof.
Background
Electronic devices in daily use today require a boot image to be executed to boot the operating system and programs of the electronic device, and the boot image is generally installed in the electronic device when shipped from the factory. However, manufacturers do not subscribe to the boot image for a single electronic device, but instead typically load the same boot image for the same type of electronic device, so as to facilitate management and maintenance. However, the electronic devices having the same boot image may become attack pipelines for hackers due to the loading of the same program codes.
When different electronic devices have the same boot image, a hacker can attack other electronic devices according to the defects by analyzing the boot image in one of the electronic devices and finding out the defects in the boot image. Furthermore, in some cases, a hacker may not even have to implant malicious code into the electronic device, but rather use code reuse attack to make a malicious attack on the electronic device. Specifically, the code reuse attack is a hijacking control flow, which uses the existing code segments in the electronic device to spell the attack technique of malicious programs.
Therefore, when a hacker is faced with a code reuse attack, the electronic device with the same boot image is easily attacked, or not protected, and the electronic device with such defects is in need of improvement for the present day where the security issue is becoming important.
Disclosure of Invention
In view of the above, the present disclosure provides an electronic device for deploying a boot image in a cloud, a cloud deployment system for deploying the boot image in a cloud, and a method thereof.
According to some embodiments, a cloud deployment system for a boot image includes an electronic device and a server. The server includes a storage medium and a control circuit. The electronic device is used for sending out a request instruction. The storage medium is used for storing a plurality of boot images, each boot image comprises a plurality of destination files, and the combination sequence of the destination files of each boot image is different from the combination sequence of the destination files of other boot images. The control circuit is used for transmitting one of the boot images back to the electronic device according to the request instruction, and the electronic device executes the received boot image.
According to some embodiments, an electronic device includes a communication element and a controller. The controller is used for executing an input/output program to initialize the communication element. And after the communication element is initialized, the controller sends out a request instruction.
According to some embodiments, the storage medium further stores a plurality of original program codes corresponding to the electronic device. The control circuit is used for compiling and decoding the original program code as a destination file, randomly arranging the destination files, establishing a connection address corresponding to the destination file, and obtaining one of the boot images.
According to some embodiments, the storage medium further stores a plurality of original program codes corresponding to the electronic device. The server has a private key, and the electronic device has a public key corresponding to the private key. The control circuit is used for compiling and decoding the original program code as a destination file, randomly arranging the destination files, establishing a connection address corresponding to the destination file, and encrypting with a private key to obtain one of the boot images. The electronic device decrypts and executes the received boot image with the public key.
According to some embodiments, an electronic device for cloud deployment of boot images includes a communication element and a controller. The controller is used for executing an input/output program to initialize the communication element. And after the communication element is initialized, the controller sends out a request instruction and executes the received starting image.
According to some embodiments, the electronic device with the cloud deployed boot image further has a public key. The electronic device of the cloud deployment boot image decrypts and executes the received boot image by the public key.
According to some embodiments, a cloud deployment method of a boot image is suitable for an electronic device and a server. The cloud deployment method of the boot image comprises the following steps: the electronic device sends out a request instruction; the server stores a plurality of boot images, each boot image comprises a plurality of destination files, and the combination sequence of the destination files of each boot image is different from the combination sequence of the destination files of other boot images; the server transmits one of the boot images back to the electronic device according to the request instruction; and the electronic device executes the received boot image.
According to some embodiments, before the electronic device issues the request instruction, the cloud deployment method of the boot image includes: the electronic device executes an input/output program to initialize a communication element of the electronic device; and after the communication element is initialized, the electronic device sends out a request instruction.
According to some embodiments, the cloud deployment method of the boot image further includes a boot image obtaining method. The boot image obtaining method comprises the following steps: compiling and assembling a plurality of original program codes corresponding to the electronic device as a target file; randomly arranging target files; establishing a connection address of a corresponding destination file; and obtaining one of the boot images.
According to some embodiments, the cloud deployment method of the boot image further includes a boot image obtaining and verifying method. The boot image obtaining and verifying method comprises the following steps: compiling and assembling a plurality of original program codes corresponding to the electronic device as a target file; randomly arranging target files; establishing a connection address of a corresponding destination file; encrypting by using a private key to obtain one of the boot images; and decrypting and executing the received boot image by using the public key, wherein the public key corresponds to the private key.
In summary, the cloud deployment system and the cloud deployment method for the boot images according to some embodiments of the present invention can deploy a plurality of different boot images on a server, and the server provides one of the boot images for the electronic device to execute according to a request instruction of the electronic device. Because the boot images deployed by the server are obtained by randomly combining and arranging the destination files, the combination sequence of each boot image in the destination files is different, and the server randomly provides any boot image to the electronic device, so that the electronic device can obtain different boot images. Because the boot image files executed by the electronic device at each boot may be different, the electronic device can be prevented from being attacked by a hacker.
Drawings
Fig. 1 is a schematic diagram of a cloud deployment system for boot images according to some embodiments of the present disclosure.
FIG. 2 is a schematic diagram of a boot image according to some embodiments of the present disclosure.
Fig. 3 is a flowchart illustrating a cloud deployment method of a boot image according to some embodiments of the present disclosure.
Fig. 4 is a flowchart illustrating a cloud deployment method of a boot image according to some embodiments of the present disclosure.
Symbol description
10. Cloud deployment system for boot image
100. Electronic device
120. Controller for controlling a power supply
140. Communication element
160. Read only memory device
180. Random access memory device
R request instruction
200. Server
220. Control circuit
222. Compiler
224. Group translator
226. Connector for connecting with a plurality of wires
240. Storage medium
BI boot image
LIB library
DRV driver
OS operating system kernel
OBJ purpose gear
SC source code
S100-S140 steps
S110' step
Detailed Description
In this case, the term "coupled" and derivatives thereof may be used. In some embodiments, "coupled" may be used to indicate that two or more elements are in direct physical or electrical contact with each other, or may also mean that two or more elements are in indirect electrical contact with each other. The term "coupled" may also be used to indicate that two or more elements co-operate or interact with each other.
Fig. 1 is a schematic diagram of a cloud deployment system 10 for boot images according to some embodiments of the present disclosure. The cloud deployment system 10 of the boot image includes an electronic device 100 and a server 200. The electronic device 100 includes a controller 120, a communication device 140, a read only memory device 160, and a random access memory device 180. The server 200 includes a control circuit 220 and a storage medium 240. The electronic device 100 is configured to issue a request command R and execute the received boot image BI. The storage medium 240 of the server 200 is used for storing a plurality of boot images BI. The control circuit 220 of the server 200 is configured to transmit one of the boot images BI back to the electronic device 100 according to the request command R. The electronic device 100 and the server 200 transmit signals or files via a network, and are not limited to a transmission method using a wired network or a wireless network. In the electronic device 100, the controller 120 is coupled to the communication device 140, the read-only memory device 160 and the random access memory device 180. In the server 200, the control circuit 220 is coupled to the storage medium 240.
FIG. 2 is a schematic diagram of a boot image BI according to some embodiments of the disclosure. Referring to fig. 1 and fig. 2, in some embodiments, each boot image BI includes a plurality of destination files OBJ, and the combination sequence of the destination files OBJ of each boot image BI is different from the combination sequence of the destination files OBJ of other boot images BI. That is, the object files OBJ are not in the same order of combination among the respective boot images BI. Therefore, each time the server 200 transmits one of the boot images BI back to the electronic device 100, the order of the combination of the object files OBJ of the boot images BI received by the electronic device 100 is different. According to some embodiments, when the server 200 randomly selects the boot images BI to the electronic device 100, the electronic device 100 will hardly receive the boot images BI with the same combination order of the destination OBJ.
Referring to fig. 1, in some embodiments, the boot image cloud deployment system 10 is configured to enable the electronic device 100 to obtain a boot image BI from the server 200 to execute a boot program. The electronic device 100 sends a request command R to the server 200, and the server 200 returns the boot image BI to the electronic device 100 according to the request command R. Specifically, the server 200 stores a plurality of boot images BI, and the server 200 returns any one of the boot images BI to the electronic device 100 according to the request command R. It should be noted that, according to some embodiments, each of the boot images BI stored in the server 200 is also executed by the electronic device 100, but the boot images BI are obtained through randomization, so that the boot images BI are not identical. Because the server 200 randomly provides different boot images BI to the electronic device 100, each time the electronic device 100 issues the request R, the boot images BI obtained by the electronic device 100 may be different, and thus the electronic device 100 may not need to execute the same boot image BI each time to perform the boot process.
In some embodiments, the boot image BI is stored in the storage medium 240, and the control circuit 220 is configured to receive the request R, and randomly select a boot image BI on the storage medium 240 according to the request R, and transmit the selected boot image BI back to the electronic device 100. According to some embodiments, the control circuit 220 randomly selects the boot image BI according to a random number generation program. For example, the random number generation program outputs non-repeated random numbers to the boot images BI in the storage medium 240, each boot image BI has a corresponding random number, and the control circuit 220 selects the boot image BI with the largest random number to the electronic device 100.
It should be noted that, in some embodiments, the electronic device 100 is not limited to whether the boot image BI is loaded. In the case that the electronic device 100 itself does not carry the boot image BI, the electronic device 100 issues the request command R to obtain the boot image BI every time the boot process is performed. In some embodiments, the electronic device 100 does not issue the request command R at the time of booting, but issues the request command R according to the update requirement of the electronic device 100, for example, when the originally executed boot image BI has been used for more than a specific lifetime or a specific number of times.
In some embodiments, the electronic device 100 performs a power-on process, and the electronic device 100 executes a Basic Input/Output program (BIOS) first, so that the communication device 140 issues the request command R after initialization is completed. Specifically, the controller 120 is configured to execute an input/output program to initialize the communication device 140, and issue a request command R after the communication device 140 is initialized. Specifically, the initialization of the communication device 140 represents the activation of the communication function of the communication device 140, and is not limited to activating the communication device 140 to a normal communication function or activating only a portion of the communication function (e.g., only activating a portion of the communication bandwidth, communication speed, or communication mode). The communication device 140 is, for example but not limited to, a wireless communication circuit, a wired communication circuit, or a circuit having both wireless and wired communication. In some embodiments, the request instruction R includes Identification (ID) information of the electronic device 100, such as, but not limited to, a model number, a serial number, or related information that can be converted into a model number or/and a serial number of the electronic device 100. According to some embodiments, the ROM 160 is used to store I/O programs. The controller 120 obtains a storage input/output program from the read only memory 160 to perform initialization. The Read-Only Memory 160 is, for example, a Read-Only Memory (ROM).
Referring to fig. 1 and 2, in some embodiments, the electronic device 100 receives and executes a boot image BI to execute a boot program. Specifically, since the boot image BI includes a library LIB, a driver DRV and an operating System kernel (OS), wherein the library LIB includes functions such as input/output, access, and mathematical Operation, the controller 120 executes a boot process to enable the operating System and programs in the electronic device 100 to start operating. According to some embodiments, the driver DRV is used to activate the communication device 140 to normal communication functions. The random access memory 180 is used for storing the received boot image BI. The random access memory 180 is, for example, a flash memory (Random Access Memory, RAM).
In some embodiments, the control circuit 220 of the server 200 includes a Compiler (222), an assembler (Assembly) 224, and a Linker (Linker) 226. The storage medium 240 of the server 200 is used for storing the boot image BI and a plurality of original codes SC corresponding to the electronic device 100. Wherein the original program code SC is the program code of the operating system and software. The control circuit 220 converts the original program codes SC into a plurality of object files OBJ, then randomly arranges the order of the object files OBJ, and finally links the object files OBJ to obtain the boot image BI. The process of converting the original code SC into the object OBJ is completed through the compiling by the compiler 222 and the compiling by the assembler 224. The process of linking the destination OBJ is performed by linking the addresses of the destination OBJ according to the arrangement sequence of the destination OBJ through the connector 226. According to some embodiments, the connector 226, such as a GNU connector, is used to link the address of the destination OBJ by means of a connector script file (LINKER SCRIPT) in the GNU connector. It should be noted that, the address of the destination OBJ is, for example, but not limited to, a physical location or a virtual location in the electronic device 100. The connection mode of the address of the destination OBJ is not limited to the independent Jumper (jumpers) or the mapping table lookup.
In some embodiments, each boot image BI stored in the storage medium 240 includes a plurality of destination files OBJ. The order of the destination OBJ in any boot image BI is different from the order of the destination OBJ in other boot images BI, that is, the order of the destination OBJ between the boot images BI is different. Specifically, the boot image BI includes a library LIB, a driver DRV and an operating system kernel OS, and the library LIB, the driver DRV and the operating system kernel OS respectively include a plurality of object files OBJ. In the process of the control circuit 220 obtaining the boot image BI, the control circuit 220 selects at least one of the library LIB, the driver DRV and the OS kernel OS to perform the random arrangement of the object files OBJ. The boot image BI may be a random arrangement of the destination files OBJ in the library LIB, the driver DRV and the OS kernel, or a random arrangement of the destination files OBJ in the library LIB, the driver DRV and the OS kernel.
Referring to fig. 1, in some embodiments, the server 200 may generate a certain number of boot images BI in advance and store the generated boot images BI in the storage medium 240. In some embodiments, the server 200 can determine whether to generate more boot images BI to prepare for according to the remaining amount of boot images BI (i.e., the amount of boot images BI that have not been transmitted back to the electronic device 100). In some embodiments, when the server 200 receives the request command R, the control circuit 220 may generate the boot image BI according to the request command R to provide the electronic device 100 even if the storage medium 240 does not have the pre-generated boot image BI.
In some embodiments, the electronic device 100 has a public key (not shown), and the server 200 has a private key (not shown), wherein the public key corresponds to the private key. The process of obtaining the boot image BI by the control circuit 220 of the server 200 requires encrypting the boot image BI by the private key, and the controller 120 of the electronic device 100 decrypts the received boot image BI by using the public key. Specifically, the control circuit 220 encrypts the boot image BI with the private key to form a digital signature, and the encrypted boot image BI has the digital signature as verification. The control circuit 220 further stores the encrypted boot image BI in the storage medium 240, that is, the boot image BI stored in the storage medium 240 is encrypted. After the electronic device 100 obtains the encrypted boot image BI, the electronic device 100 decrypts the boot image BI by using the public key to verify whether the digital signature is correct. When the digital signature is correct, the electronic device 100 can execute the verified boot image BI to perform the boot process. Otherwise, when the digital signature is wrong, the electronic device 100 can reissue the request command R to the server 200 to re-transmit the boot image BI. In some embodiments, the electronic device 100 stores the boot image BI in the random access memory 180 when the digital signature is correct. According to some embodiments, the control circuit 220 does not encrypt the boot image BI during the process of generating the boot image BI, but the control circuit 220 encrypts the boot image BI with the private key after the control circuit 220 selects the boot image BI from the storage medium 240 and transmits the selected boot image BI back to the electronic device 100.
In some embodiments, the cloud deployment system 10 of the boot image is not limited to include only one electronic device 100. For example, the boot image cloud deployment system 10 can include multiple electronic devices 100 at the same time, and is not limited to a single frequency electronic device 100. The server 200 generates a boot image BI corresponding to each electronic device 100 according to the corresponding original program codes SC of each electronic device 100. Since the request command R sent by the electronic device 100 has identification information, the server 200 can provide the corresponding boot image BI according to different electronic devices 100. According to some embodiments, the corresponding public key and private key in the boot image cloud deployment system 10 are not limited to one set, for example, the boot image cloud deployment system 10 can match different sets of public keys and private keys according to different frequency types of electronic devices 100. Alternatively, for a single specific electronic device 100, the boot image cloud deployment system 10 can provide a single set of public and private keys to distinguish between other electronic devices 100.
Fig. 3 is a flowchart illustrating a cloud deployment method of a boot image according to some embodiments of the present disclosure. Reference to
Fig. 3 is a schematic diagram of a cloud deployment method of a boot image, which is suitable for execution by the electronic device 100 and the server 200 in some embodiments. The cloud deployment method of the boot image comprises the following steps: the electronic device 100 sends out a request command R (step S110); the server 200 stores a plurality of boot images BI, each of the boot images BI includes a plurality of destination files OBJ, and the combination sequence of the destination files OBJ of each of the boot images BI is different from the combination sequence of the destination files OBJ of the other boot images BI (step S120); the server 200 transmits one of the boot images BI back to the electronic device 100 according to the request command R (step S130); and, the electronic device 100 executes the received boot image BI (step S140).
Fig. 4 is a flowchart illustrating a cloud deployment method of a boot image according to some embodiments of the present disclosure. Referring to fig. 4, in some embodiments, the cloud deployment method of the boot image is suitable for the electronic device 100 and the server 200 to execute. The cloud deployment method of the boot image comprises the following steps: the electronic device 100 executes the input/output program to initialize the communication device 140 of the electronic device (step S100); after the communication element 140 is initialized, the electronic device 100 sends a request command R (step S110'); the server 200 stores a plurality of boot images BI, each of the boot images BI includes a plurality of destination files OBJ, and the combination sequence of the destination files OBJ of each of the boot images BI is different from the combination sequence of the destination files OBJ of the other boot images BI (step S120); the server 200 transmits one of the boot images BI back to the electronic device 100 according to the request command R (step S130); and, the electronic device 100 executes the received boot image BI (step S140).
In summary, the cloud deployment system and the cloud deployment method for the boot images according to some embodiments of the present invention can deploy a plurality of different boot images on a server, and the server provides one of the boot images for the electronic device to execute according to a request instruction of the electronic device. Because the boot images deployed by the server are obtained by randomly combining and arranging the destination files, the combination sequence of each boot image in the destination files is different, and the server randomly provides any boot image to the electronic device, so that the electronic device can obtain different boot images. Because the boot image files executed by the electronic device at each boot may be different, the electronic device can be prevented from being attacked by a hacker. In some embodiments, the cloud deployment system of the boot image and the method thereof further comprise a pair of corresponding public key and private key, the server encrypts the boot image with the private key, and the electronic device decrypts the boot image with the public key, so that the electronic device can also authenticate whether the boot image provided by the server is correct.
Claims (8)
1. A cloud deployment system for a boot image, comprising:
An electronic device for issuing a request command according to an update request; and
A server, comprising:
The storage medium is used for storing a plurality of boot images, each boot image comprises a plurality of destination files, and the combination sequence of the destination files of each boot image is different from the combination sequence of the destination files of other boot images; and
A control circuit for transmitting one of the boot images back to the electronic device according to the request instruction, the electronic device executing the received boot image,
The control circuit is used for compiling and compiling the original program codes into the target files, randomly arranging the target files and establishing connection addresses corresponding to the target files so as to obtain one of the starting images.
2. The boot image cloud deployment system of claim 1, wherein the electronic device comprises:
A communication element; and
And the controller is used for executing an input/output program to initialize the communication element and sending out the request instruction after the communication element is initialized.
3. The cloud deployment system of claim 1, wherein said storage medium further stores a plurality of original codes corresponding to said electronic device, said server has a private key, said electronic device has a public key corresponding to said private key, said control circuit is used for compiling and translating said original codes into said destination files, randomly arranging said destination files, establishing link addresses corresponding to said destination files, and encrypting with said private key, so as to obtain one of said boot images, said electronic device decrypts and executes said received boot image with said public key.
4. An electronic device for cloud deployment of a boot image, the electronic device comprising:
A communication element; and
And the controller is used for executing an input/output program to initialize the communication element, sending a request instruction according to an update request after the communication element is initialized, and executing a received boot image.
5. The electronic device of claim 4, further comprising a public key, wherein the electronic device with the boot image deployed by the cloud decrypts and executes the received boot image with the public key.
6. A cloud deployment method of a boot image is suitable for an electronic device and a server, and comprises the following steps:
the electronic device sends a request instruction according to an update request;
The server stores a plurality of boot images, each boot image comprises a plurality of destination files, and the combination sequence of the destination files of each boot image is different from the combination sequence of the destination files of other boot images;
the server transmits one of the boot images back to the electronic device according to the request instruction; and
The electronic device executes the received boot image,
The method further comprises a boot image obtaining method, which comprises the following steps:
Compiling and compiling a plurality of original program codes corresponding to the electronic device into the target files;
Randomly arranging the target files;
Establishing connection addresses corresponding to the destination files; and
One of the boot images is obtained.
7. The cloud deployment method of the boot image according to claim 6, wherein before the electronic device issues the request instruction, the cloud deployment method of the boot image comprises:
the electronic device executes an input/output program to initialize a communication device of the electronic device; and
After the communication element is initialized, the electronic device sends out the request instruction.
8. The cloud deployment method of boot images of claim 6, further comprising a boot image acquisition and verification method comprising:
Compiling and compiling a plurality of original program codes corresponding to the electronic device into the target files;
Randomly arranging the target files;
establishing connection addresses corresponding to the destination files;
encrypting by using a private key to obtain one of the boot images; and
Decrypting and executing the received boot image by using a public key, wherein the public key corresponds to the private key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911060258.XA CN112784275B (en) | 2019-11-01 | 2019-11-01 | Electronic device, cloud deployment system of boot image and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911060258.XA CN112784275B (en) | 2019-11-01 | 2019-11-01 | Electronic device, cloud deployment system of boot image and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112784275A CN112784275A (en) | 2021-05-11 |
CN112784275B true CN112784275B (en) | 2024-09-03 |
Family
ID=75747204
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911060258.XA Active CN112784275B (en) | 2019-11-01 | 2019-11-01 | Electronic device, cloud deployment system of boot image and method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112784275B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102939587A (en) * | 2010-03-31 | 2013-02-20 | 埃德图加拿大公司 | Method for linking and loading to protect applications |
CN107958155A (en) * | 2016-10-17 | 2018-04-24 | 深圳市中兴微电子技术有限公司 | A kind of system initialization method and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7478147B2 (en) * | 2005-07-21 | 2009-01-13 | International Business Machines Corporation | Method and apparatus for a secure network install |
US20150234775A1 (en) * | 2014-02-14 | 2015-08-20 | Western Digital Technologies, Inc. | Enabling file oriented access on storage devices |
-
2019
- 2019-11-01 CN CN201911060258.XA patent/CN112784275B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102939587A (en) * | 2010-03-31 | 2013-02-20 | 埃德图加拿大公司 | Method for linking and loading to protect applications |
CN107958155A (en) * | 2016-10-17 | 2018-04-24 | 深圳市中兴微电子技术有限公司 | A kind of system initialization method and device |
Also Published As
Publication number | Publication date |
---|---|
CN112784275A (en) | 2021-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10715335B2 (en) | Methods and apparatus to provide for efficient and secure software updates | |
CN108475319B (en) | Birth certificate of device | |
CN101218588B (en) | Attachment device and arrangement with authenticable firmware and method for authenticating the firmware | |
US10268845B2 (en) | Securing of the loading of data into a nonvolatile memory of a secure element | |
US20080189554A1 (en) | Method and system for securing communication between a host computer and a secure portable device | |
US20220405392A1 (en) | Secure and flexible boot firmware update for devices with a primary platform | |
KR20190043473A (en) | Information processing apparatus, method for controlling same, and storage medium | |
CN104657174A (en) | Method and device for dynamically realizing application function | |
JP2003032242A (en) | Method of updating firmware in micro-controller | |
US20120159447A1 (en) | Hardware security module and debugging method of such a module | |
TWI768255B (en) | Cloud deployment boot image electronic device, boot image cloud deployment system and method thereof | |
CN107329787B (en) | Method for updating terminal equipment program | |
CN101128800A (en) | Method, system and apparatus for launching an interface with an electronic device | |
JP6988444B2 (en) | Initial setup method, secure element, device and program | |
CN109491716A (en) | Start method and device, program storage method and device | |
CN112784275B (en) | Electronic device, cloud deployment system of boot image and method thereof | |
CN101627605A (en) | In computer system, be used to carry out the method and the corresponding apparatus of transfer of data | |
El Jaouhari et al. | Toward a generic and secure bootloader for IoT device firmware OTA update | |
CN117063176A (en) | Configuration control apparatus and method for configuring electronic components of electronic device | |
CN107179917A (en) | System architecture and dispositions method for the operating system of installing multiple test systems | |
CN117610089B (en) | Encryption method, system, equipment and storage medium of multi-core heterogeneous chip | |
CN115617379B (en) | Java application bug hot-update repairing method based on Javaagent | |
KR102387685B1 (en) | Secure Boot Verification Method and Secure Element for the Same | |
EP4002790A1 (en) | A provisioning method and system | |
JP6897203B2 (en) | Embedded device and control method of embedded device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |