CN115481405A - Safe starting and optimized upgrading method of embedded system - Google Patents

Safe starting and optimized upgrading method of embedded system Download PDF

Info

Publication number
CN115481405A
CN115481405A CN202211166660.8A CN202211166660A CN115481405A CN 115481405 A CN115481405 A CN 115481405A CN 202211166660 A CN202211166660 A CN 202211166660A CN 115481405 A CN115481405 A CN 115481405A
Authority
CN
China
Prior art keywords
upgrading
upgrade
file
kernel
starting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211166660.8A
Other languages
Chinese (zh)
Inventor
何福利
陈树峰
赵晓宇
辛海明
蒋欣欣
张杨
李明磊
吴海强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North Institute Of Science And Technology Information
Beijing Institute of Computer Technology and Applications
Original Assignee
North Institute Of Science And Technology Information
Beijing Institute of Computer Technology and Applications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North Institute Of Science And Technology Information, Beijing Institute of Computer Technology and Applications filed Critical North Institute Of Science And Technology Information
Priority to CN202211166660.8A priority Critical patent/CN115481405A/en
Publication of CN115481405A publication Critical patent/CN115481405A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Abstract

The invention relates to a safe starting and optimized upgrading method of an embedded system, belonging to the field of embedded operating systems. The invention sets a check method in the bootstrap program, when loading or upgrading the kernel image file and the root file system, the check of the safety certification is carried out, and the legal validity of the file is confirmed, and sets a check method in the bootstrap program, when loading or upgrading the kernel image file and the root file system, the check of the safety certification is carried out, and the legal validity of the file is confirmed. The invention solves the problem of safe starting of the system; 2. the illegal starting or upgrading of the system is avoided, and the stored content is obtained or tampered; the polling upgrading process in an unattended state is optimized, and the upgrading time is shortened; the polling or man-machine interaction mode can be selected according to the situation.

Description

Safe starting and optimized upgrading method of embedded system
Technical Field
The invention belongs to the field of embedded operating systems, and particularly relates to a safe starting and optimized upgrading method of an embedded system.
Background
The traditional embedded operating system uses system boot (UBOOT, PMON or UEFI) to start loading operating system kernel files from a storage device (FLASH, a magnetic disk, a U disk or a network node) to a specified memory, and then directly jumps to the specified memory for running; the traditional method for upgrading the embedded system is to copy and transmit the data to a local disk fixed partition through a network or a USB flash disk, then reset and restart the system, and cover the currently started system by using an upgrading file in the disk.
The traditional embedded operating system has no safe and reliable characteristic when started, and the kernel file of the system in the storage device is easy to be tampered and replaced; after the traditional embedded operating system is started by using an illegal kernel, other files in the operating system can be acquired or tampered randomly; the file system of the traditional embedded operating system is generally large, the upgrading time is long, the risk of abnormity or power failure in the process is high, and the upgrading failure is easy to cause system crash.
Disclosure of Invention
Technical problem to be solved
The invention provides a safe starting and optimized upgrading method of an embedded system, and aims to solve the problems that a traditional embedded operating system cannot have safe and reliable characteristics when started, a file system is generally large, the upgrading time is long, the risk of abnormity or power failure in the process is high, the upgrading is easy to fail, and the system is easy to crash.
(II) technical scheme
In order to solve the technical problem, the invention provides a method for safely starting and optimally upgrading an embedded system, which comprises the following steps:
s1: setting a legal check value; embedding a section of check program in the bootstrap program, and designating a storage position of a legal check value when the bootstrap program is manufactured and reading the legal check value by the bootstrap program;
s2: verifying the legality of a system file, wherein the system file comprises a kernel mirror image file and a root file system; firstly, a bootstrap program reads a check code customized in header information in a system file and compares the check code with a legal check value; secondly, verifying the validity and legality of the system file; if the system is legal and effective, upgrading or starting system operation; if the verification is illegal, the operator is determined to be an illegal user, and the system is started or upgraded unsuccessfully;
and S3, upgrading the system file or starting system operation in a polling or man-machine interaction mode under the guidance of the bootstrap program.
Further, the legal check value is embedded in the boot program code to generate the boot program together, or is written to a fixed address of the nonvolatile memory area.
Further, the nonvolatile storage area is FLASH or EEPROM.
Further, in the step S2, the comparison method uses a digital signature or a trusted platform module.
Further, when a polling method is adopted, an upgrade configuration file needs to be used, the upgrade configuration file is stored in a specified directory of a local disk, and the stored information includes: the kernel upgrading flag information, the path of the upgrading storage area, the root file system upgrading flag information, the upgrading mode and the path of the upgrading storage area are obtained, and the bootstrap program reads the information in the upgrading configuration file to determine the next operation.
Further, the upgrade storage area includes a spare partition of a local disk, a usb disk, a flash, or a network node.
Furthermore, the upgrading mode comprises complete upgrading or custom upgrading, and the custom upgrading only has a small amount of files needing to be modified and added, and is much smaller than the data size of the complete upgrading.
Further, in step S3, upgrading the system file or starting the system operation in a polling manner specifically includes the following steps:
s11: starting up, reading a kernel upgrading mark at a bootstrap stage, and judging whether the kernel has upgrading requirements; if the kernel needs to be upgraded, reading a kernel image file to be upgraded from an upgrade storage area appointed in the upgrade configuration file, verifying the validity of the check code, and if the check code is valid, replacing the kernel image file in the system; if the kernel upgrade is completed or the verification is not passed, clearing the kernel upgrade flag and entering the next step, and if no kernel upgrade requirement exists, directly entering the next step;
s12: reading a root file system upgrading mark of an upgrading configuration file, judging whether a root file system upgrading requirement exists or not, and judging the upgrading type, namely comprehensive upgrading or custom upgrading if the root file system upgrading requirement exists; if the upgrade is comprehensive, reading the files to be upgraded from the upgrade storage area, and covering all the currently related files after passing legal inspection; if the upgrade is the user-defined upgrade and the legal verification is successful, reading an upgrade list in the configuration file and starting corresponding upgrade operation; after the upgrade is finished or the verification fails, clearing the upgrade mark of the root file system and entering the next step, and if the upgrade of the root file system is not needed, directly entering the next step;
s13: after the upgrading work is finished, starting the embedded operating system, and checking the kernel image file in the local storage; if the code is legal, starting the system; otherwise, the system is restarted or the system returns to the man-machine interaction state of the bootstrap program.
Further, if the user has an interactive updating demand, a man-machine interaction mode is used: and in the man-machine interaction state of the bootstrap program, receiving a command, wherein the command is kernel image file upgrading, root file system upgrading or system starting, reading files from a designated storage area when entering each function, if legal verification passes, continuing operation, and returning to the man-machine interaction state when operation is completed or verification fails.
Further, in step S3, upgrading the system file or starting the system operation in a human-computer interaction manner specifically includes the following steps:
s21: receiving a command in a man-machine interaction state of a bootstrap program, wherein the command is kernel image upgrading, root file system upgrading or operating system starting, and if the command is kernel image upgrading, entering S22; if the file system is updated, entering S23; if the operation system is started, entering S24;
s22: reading a kernel image file to be upgraded from a storage area to be upgraded or a storage position specified in a command, checking validity, and if the kernel image file is valid, replacing the kernel image file in the system; if the kernel is upgraded or the verification is not passed, returning to the human-computer interaction state;
s23: reading a root file system file to be upgraded from an upgrade storage area or a storage position appointed in a command, checking validity, determining whether the upgrade is complete or custom upgrade according to the command, starting the upgrade, and returning to a human-computer interaction state if the upgrade of the root file system is completed or the file verification is not passed;
s24: and starting a system command, reading the kernel image file from a storage position specified by a local disk or a command line, checking the validity, passing the check, starting the system, failing the check, and returning to a human-computer interaction state.
(III) advantageous effects
The invention provides a safe starting and optimized upgrading method of an embedded system, and the starting process in the invention has the following advantages:
1. the problem of safe starting of the system is solved;
2. the illegal starting or upgrading of the system is avoided, and the stored content is obtained or tampered;
3. the polling upgrading process in the unattended state is optimized, and the upgrading time is shortened.
4. The polling or man-machine interaction mode can be selected according to the situation.
The invention solves the problem of safe starting of the system, and confirms the legal validity of the kernel mirror image and the root file system through the check code, thereby avoiding illegal starting or upgrading of the system and obtaining or tampering the stored content; meanwhile, the upgrading process is optimized, under a general condition, the root file system can be quickly upgraded only by using a user-defined system, the upgrading time is greatly shortened, risks are avoided, developers and users can select the root file system in a diversified manner, and polling or man-machine interaction is used according to situations.
Drawings
FIG. 1 is a flowchart of the polling operation of the secure boot and optimization upgrade of the present invention;
FIG. 2 is a flow chart of the man-machine interaction work flow of the secure boot and optimization upgrade of the present invention.
Detailed Description
In order to make the objects, contents and advantages of the present invention more apparent, the following detailed description of the present invention will be made in conjunction with the accompanying drawings and examples.
Aiming at the defects and shortcomings of the starting and upgrading of the existing embedded operating system, the safe starting and optimizing upgrading method of the embedded operating system is designed by taking the starting and upgrading process of the operating system as a research object. The embedded operating system mainly comprises two parts: kernel mirror image files, root file systems. The method includes the steps that a section of checking program is inserted into a system bootstrap program, and the program can verify the legal validity of a kernel image file; in addition, an automatic polling upgrading mode or a manual interaction upgrading mode can be selected according to the situation, so that the safe starting of the embedded operating system is realized, the phenomenon that other people use the tampered kernel image file and root file system is avoided, the operating system is started, the files in the storage device are read at will, and even the system files and configuration are tampered maliciously is avoided. Meanwhile, as the complete root file system comprises a large number of binary programs, library files, configuration files, help files and the like, the complete root file system is more and more huge as the function of the operating system is more and more complete. Therefore, under the condition of unnecessary complete upgrade, a user-defined upgrade method can be used, wherein the user-defined upgrade means that a file list needing to be upgraded is set in an upgrade configuration file, and then only corresponding files in the configuration list are upgraded according to the configuration list, for example, only a few library files or configuration files are upgraded, so that the purpose of improving the upgrade efficiency is achieved, the situation that a user waits for the upgrade for a long time is avoided, and meanwhile, the risk of upgrade failure or system crash caused by power failure or other abnormalities in the upgrade process of the system can be reduced.
The invention can realize the safe start of the system, protect the system information and simultaneously ensure the safety and reliability of the system upgrade. The method for realizing the design of the invention is that a verification method is arranged in a bootstrap program, when a kernel image file and a root file system are loaded or upgraded, the verification of security authentication is carried out, the legal validity of the file is confirmed, the later mentioned security verification is explained in a unified way, and the specific steps are as follows:
s1: and setting a legal check value. Embedding a section of check program in the bootstrap program, and designating a storage position of a legal check value when the bootstrap program is manufactured and reading the legal check value by the bootstrap program;
the legal check value can be embedded into a bootstrap code to generate a bootstrap program together, and can also be written into a fixed address of a nonvolatile storage area (FLASH or EEPROM);
s2: and checking the legality of a system file, wherein the system file comprises a kernel mirror image file and a root file system. Firstly, the bootstrap program reads the check code customized in the header information in the system file, and compares the check code with the legal check value, and the comparison method can use the existing security authentication algorithm, such as: digital signatures, trusted platform modules, and the like. And secondly, verifying the validity and the legality of the system file. If the validity is valid, upgrading or starting system operation is carried out; if the verification is illegal, the operator is determined as an illegal user, and the system is started or upgraded unsuccessfully.
And S3, upgrading the system file or starting system operation in a polling or man-machine interaction mode under the guidance of the bootstrap program.
The invention optimizes the system upgrading process, shortens the optimization time and improves the upgrading efficiency. The program inserted in the boot program supports two ways: polling and human-computer interaction.
In the case of unattended operation, it is desirable to automatically complete the upgrade and system start-up functions, and a polling method may be used. When the method is adopted, an upgrade configuration file is needed, the upgrade configuration file is stored in a specified directory of a local disk, and the stored information comprises: kernel upgrade flag information, and upgrade the path of a storage area (a standby partition of a local disk, a USB flash disk, a flash disk or a network node); the upgrade flag information of the root file system, the upgrade mode (complete upgrade or custom upgrade), and the path of the upgrade storage area. The bootstrap program determines the next operation by reading the information in the upgrade configuration file. Because the user-defined upgrading only has a small amount of files to be modified and added, and the data volume is much smaller than that of the complete upgrading, the upgrading time of the root file system can be shortened, and the upgrading efficiency of the root file system is improved.
If the user has the interactive updating requirement, the automatic polling can be interrupted, the upgrading configuration file is not used, and a man-machine interaction mode is used: in the man-machine interaction state of the bootstrap program, a command is received, the command can be kernel image file upgrading, root file system upgrading or system starting, when each function is entered, files are read from a designated storage area, if legal verification is passed, operation is continued, and if the operation is completed or the verification is not passed, the man-machine interaction state is returned.
The polling method of the invention comprises the following steps.
S11: starting up, reading the kernel upgrading mark in the stage of guiding the program, and judging whether the kernel has upgrading requirements. If the kernel needs to be upgraded, reading a kernel image file to be upgraded from an upgrading storage area appointed in the upgrading configuration file, verifying the validity of the check code, and if the check code is valid, replacing the kernel image file in the system; if the kernel upgrading is completed or the verification is not passed, clearing the kernel upgrading mark and entering the next step, and if no kernel upgrading requirement exists, directly entering the next step;
s12: reading a root file system upgrading mark of the upgrading configuration file, judging whether a root file system upgrading requirement exists, if so, judging the upgrading type, and whether the upgrading is comprehensive upgrading or custom upgrading. If the upgrade is complete, reading the file to be upgraded from the upgrade storage area, and covering all the currently related files after passing legal inspection; if the upgrade is the user-defined upgrade, after the legal verification is successful, reading an upgrade list in the configuration file, and starting corresponding upgrade operation. After the upgrade is completed or the verification fails, the upgrade flag of the root file system is cleared and the next step is carried out, if the upgrade of the root file system is not needed, the next step is directly carried out;
s13: and when the upgrading work is finished, starting the embedded operating system and verifying the kernel image file in the local storage. If the code is legal, starting the system; otherwise, the system is restarted or the system returns to the man-machine interaction state of the bootstrap program.
If there is an interactive updating requirement, a man-machine interaction mode can be used, and the steps are analyzed as follows:
s21: receiving a command in a man-machine interaction state of a bootstrap program, wherein the command can be kernel image upgrading, root file system upgrading or operating system starting, and if the command is kernel image upgrading, entering S22; if the file system is updated, entering S23; if the operation system is started, entering S24;
s22: reading a kernel image file to be upgraded from a storage area to be upgraded or a storage position appointed in the command, checking the validity, and replacing the kernel image file in the system if the kernel image file is valid; if the kernel is upgraded or the verification is not passed, returning to the human-computer interaction state;
s23: reading a root file system file to be upgraded from an upgrading storage area or a storage position appointed in a command, checking validity, determining whether the upgrading is complete or custom upgrading according to the command, starting the upgrading, and returning to a human-computer interaction state if the upgrading of the root file system is completed or the file verification is not passed;
s24: and starting a system command, reading the kernel image file from a storage position specified by a local disk or a command line, checking the validity, passing the check, starting the system, failing the check, and returning to a human-computer interaction state.
The starting process in the invention has the following advantages:
1. the problem of safe starting of the system is solved;
2. the illegal starting or upgrading of the system is avoided, and the stored content is obtained or tampered;
3. the polling upgrading process in the unattended state is optimized, and the upgrading time is shortened.
4. The polling or man-machine interaction mode can be selected according to the situation.
The invention solves the problem of safe starting of the system, and the legal validity of the kernel mirror image and the root file system is confirmed through the check code, thereby avoiding illegal starting or upgrading of the system and obtaining or tampering the stored content; meanwhile, the upgrading process is optimized, under a general condition, the root file system can be quickly upgraded by only using a user-defined system, the upgrading time is greatly shortened, risks are avoided, developers and users can select the root file system in various ways, and polling or man-machine interaction is used according to situations.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A safe starting and optimized upgrading method for an embedded system is characterized by comprising the following steps:
s1: setting a legal check value; embedding a section of check program in the bootstrap program, designating a storage position of a legal check value when the bootstrap program is manufactured, and reading by using the bootstrap program;
s2: verifying the legality of a system file, wherein the system file comprises a kernel mirror image file and a root file system; firstly, a bootstrap program reads a check code customized in header information in a system file and compares the check code with a legal check value; secondly, verifying the validity and legality of the system file; if the validity is valid, upgrading or starting system operation is carried out; if the verification is illegal, the operator is determined to be an illegal user, and the system is started or upgraded unsuccessfully;
and S3, upgrading the system file or starting system operation in a polling or man-machine interaction mode under the guidance of the bootstrap program.
2. A method for secure boot and optimized upgrade of an embedded system according to claim 1, characterized in that the legal check value is embedded in the boot program code to generate the boot program together or to be written to a fixed address of the non-volatile memory area.
3. The secure booting and optimization upgrade method of an embedded system as claimed in claim 2, characterized in that the nonvolatile memory area is FLASH or EEPROM.
4. The method for secure boot and optimized upgrade of an embedded system according to claim 1, wherein in step S2, the comparison method uses a digital signature or a trusted platform module.
5. The secure booting and optimization upgrading method of the embedded system according to any one of claims 1 to 4, characterized in that when the polling method is adopted, an upgrading configuration file is needed, the upgrading configuration file is saved in a specified directory of a local disk, and the saved information includes: the kernel upgrading flag information, the path of the upgrading storage area, the root file system upgrading flag information, the upgrading mode and the path of the upgrading storage area are obtained, and the bootstrap program reads the information in the upgrading configuration file to determine the next operation.
6. The secure boot and optimized upgrade method for an embedded system according to claim 5, wherein the upgrade storage area comprises a spare partition of a local disk, a USB flash disk, a flash disk, or a network node.
7. The secure boot and optimization upgrade method for an embedded system according to claim 5, wherein the upgrade mode comprises a full upgrade or a custom upgrade, the custom upgrade has only a few files to be modified and added, and the data size is much smaller than the full upgrade.
8. The secure boot and optimized upgrade method for an embedded system according to claim 5, wherein in step S3, the upgrading of the system file or the booting of the system operation by polling specifically includes the following steps:
s11: starting up, reading a kernel upgrading mark at a bootstrap stage, and judging whether the kernel has upgrading requirements; if the kernel needs to be upgraded, reading a kernel image file to be upgraded from an upgrade storage area appointed in the upgrade configuration file, verifying the validity of the check code, and if the check code is valid, replacing the kernel image file in the system; if the kernel upgrading is completed or the verification is not passed, clearing the kernel upgrading mark and entering the next step, and if no kernel upgrading requirement exists, directly entering the next step;
s12: reading a root file system upgrading mark of an upgrading configuration file, judging whether a root file system upgrading requirement exists or not, and judging the upgrading type, namely comprehensive upgrading or custom upgrading if the root file system upgrading requirement exists; if the upgrade is comprehensive, reading the files to be upgraded from the upgrade storage area, and covering all the currently related files after passing legal inspection; if the upgrade is the user-defined upgrade and the legal verification is successful, reading an upgrade list in the configuration file and starting corresponding upgrade operation; after the upgrade is finished or the verification fails, clearing the upgrade mark of the root file system and entering the next step, and if the upgrade of the root file system is not needed, directly entering the next step;
s13: after the upgrading work is finished, starting the embedded operating system, and verifying the kernel image file in the local storage; if the code is legal, starting the system; otherwise, the system is restarted or the human-computer interaction state of the bootstrap program is returned.
9. A method for secure boot and optimized upgrade of an embedded system according to any of claims 1-4, characterized in that if the user has interactive update needs, a man-machine interaction is used: and in the man-machine interaction state of the bootstrap program, receiving a command, wherein the command is kernel image file upgrading, root file system upgrading or system starting, reading files from a designated storage area when entering each function, if legal verification passes, continuing operation, and returning to the man-machine interaction state when operation is completed or verification fails.
10. The method for secure boot and optimized upgrade of an embedded system according to claim 9, wherein in step S3, upgrading a system file or booting a system operation in a human-computer interaction manner specifically comprises the steps of:
s21: receiving a command in a man-machine interaction state of a bootstrap program, wherein the command is kernel image upgrading, root file system upgrading or operating system starting, and if the command is kernel image upgrading, entering S22; if the file system is updated for the root file system, entering S23; if the operation system is started, entering S24;
s22: reading a kernel image file to be upgraded from a storage area to be upgraded or a storage position specified in a command, checking validity, and if the kernel image file is valid, replacing the kernel image file in the system; if the kernel is upgraded or the verification is not passed, returning to the human-computer interaction state;
s23: reading a root file system file to be upgraded from an upgrading storage area or a storage position appointed in a command, checking validity, determining whether the upgrading is complete or custom upgrading according to the command, starting the upgrading, and returning to a human-computer interaction state if the upgrading of the root file system is completed or the file verification is not passed;
s24: and starting a system command, reading the kernel image file from a storage position specified by a local disk or a command line, checking the validity, passing the check, starting the system, failing the check, and returning to a human-computer interaction state.
CN202211166660.8A 2022-09-23 2022-09-23 Safe starting and optimized upgrading method of embedded system Pending CN115481405A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211166660.8A CN115481405A (en) 2022-09-23 2022-09-23 Safe starting and optimized upgrading method of embedded system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211166660.8A CN115481405A (en) 2022-09-23 2022-09-23 Safe starting and optimized upgrading method of embedded system

Publications (1)

Publication Number Publication Date
CN115481405A true CN115481405A (en) 2022-12-16

Family

ID=84393250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211166660.8A Pending CN115481405A (en) 2022-09-23 2022-09-23 Safe starting and optimized upgrading method of embedded system

Country Status (1)

Country Link
CN (1) CN115481405A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117009982A (en) * 2023-09-26 2023-11-07 统信软件技术有限公司 Image file security verification method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117009982A (en) * 2023-09-26 2023-11-07 统信软件技术有限公司 Image file security verification method and device, electronic equipment and storage medium
CN117009982B (en) * 2023-09-26 2023-12-26 统信软件技术有限公司 Image file security verification method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US10162625B2 (en) Vehicle control storage methods and systems
US8972591B2 (en) Method for downloading software
US7313682B2 (en) Method and system for updating boot memory that stores a fail-safe reset code and is configured to store boot code and boot updater code
CN103858107A (en) Secure recovery apparatus and method
CN107783776B (en) Processing method and device of firmware upgrade package and electronic equipment
CN101770372B (en) Firmware update system, method and building method of firmware of firmware update system
CN105260215A (en) Method of updating vehicle-mounted automobile data recorder terminal by USB flash disk
CN102023908A (en) Method and device for backing up boot program
CN101807152A (en) Basic output and input system for self verification of selection read only memory and verification method thereof
CN105677409B (en) A kind of method for upgrading system and device
CN115481405A (en) Safe starting and optimized upgrading method of embedded system
CN107329855A (en) Reduce the method and device of firmware information
CN104657644A (en) Method and device for acquiring and verifying fingerprint
CN103455750A (en) High-security verification method and high-security verification system for embedded devices
CN113238790A (en) Firmware program updating method and system based on SD card and EEPROM
CN111124760B (en) Uboot-based embedded equipment starting method and apparatus
CN100492293C (en) Customized basic input output system updating method
US20110185353A1 (en) Mitigating Problems Arising From Incompatible Software
CN114996717A (en) Upgrade program design method for preventing error erasure
CN105278993B (en) A kind of drive module upgrade method and device based on linux system
CN111352764B (en) Chip repairing method, device, equipment and storage medium
CN113885926A (en) Operating system online upgrading method based on security chip
CN108920210B (en) Method, system and related assembly for loading storage control software
CN111783162A (en) Data protection implementation method and device and computer equipment
CN111897583A (en) Equipment starting method and embedded equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination