CN1809814A - Method for booting up a software in the boot sector of a programmable read-only memory - Google Patents
Method for booting up a software in the boot sector of a programmable read-only memory Download PDFInfo
- Publication number
- CN1809814A CN1809814A CN 200480017664 CN200480017664A CN1809814A CN 1809814 A CN1809814 A CN 1809814A CN 200480017664 CN200480017664 CN 200480017664 CN 200480017664 A CN200480017664 A CN 200480017664A CN 1809814 A CN1809814 A CN 1809814A
- Authority
- CN
- China
- Prior art keywords
- key
- software
- opertaing device
- memory block
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 83
- 238000009434 installation Methods 0.000 claims abstract description 5
- 230000007246 mechanism Effects 0.000 claims description 24
- 238000002372 labelling Methods 0.000 claims description 16
- 230000008859 change Effects 0.000 claims description 10
- 230000015572 biosynthetic process Effects 0.000 claims description 4
- 230000000295 complement effect Effects 0.000 claims description 3
- 230000007704 transition Effects 0.000 claims description 3
- 230000008901 benefit Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000007689 inspection Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 2
- 239000007858 starting material Substances 0.000 description 2
- 230000032683 aging Effects 0.000 description 1
- 238000003556 assay Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000002075 main ingredient Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000000704 physical effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The invention relates to a method for booting up an update software (22) in a writable memory area (20) of a boot sector of a programmable control device (1) of a vehicle. The inventive method comprises the following steps: providing a boot-up software (121, 122, 123) that can be booted up in a writable memory area of the programmable control device (1) that is outside the boot sector, said boot-up software being capable of controlling in the control device (1) installation of the update software (22) in the writable memory area (20) of the boot sector; booting up the boot-up software (121, 122, 123) and the update software (22) in the writable memory area (10) that is outside the boot sector; and executing the boot-up software (121, 122, 123) in the control device in order to install the update software (22) in the writable memory area (20) of the boot sector.
Description
The present invention relates to a method that can write in the memory block in a kind of bootstrap district that update software is loaded into once more the programmable control device in the automobile.
DE 10,000 8974 A1 disclose and a kind of software have been loaded into a method that can write in the memory block in the programmable control device in the automobile once more, wherein Shu Ru software before it is transferred to opertaing device by means of a kind of public-key method, use first key of the cipher key pair of a complementation to do anti-fake mark, and after it is transferred to opertaing device, add underlined Input Software and check by second key that utilizes this cipher key pair whether it is not forged.
This method of labelling is used for avoiding uncontrolled software to be loaded into control device.Yet the prerequisite of the method is to have a security mechanism in opertaing device, and it is finished adding the above-mentioned inspection of underlined Input Software.For effective security is provided, self can resist unauthorized intrusion this security mechanism.
For this reason, described security mechanism is embedded in the bootstrap district of opertaing device usually, and the bootstrap district is protected the software change that it can not loaded afterwards usually.
Usually this is so to realize: the bootstrap district is set in the memory block that can not write (ROM) of opertaing device.Memory contents can not change afterwards again, thereby and resists unauthorized intrusion.
The shortcoming of said method is that the bootstrap district is for also ignoring through the visit of permission.Thereby in this opertaing device, can not obtain programming instruction, can not upgrade release mechanism, perhaps even can not change the key that has been disclosed.Also can not after by not controlled physical action or the aging change that causes, form the bootstrap district again, promptly so-called " bit transition " in addition.Because for software loading in the bootstrap district of this opertaing device, this known method can not be suitable for.
In order to overcome this shortcoming, the bootstrap district can be set in the changeable nonvolatile semiconductor memory member, for example in the flash memory.Yet this device district must resist unauthorized intrusion with other method.
But for this reason and known protection mechanism is not satisfied.For example in the disclosed a kind of method of US 0059 37063A, one starts firmware, and BIOS for example is by resisting non-authorized visit in the starter gear that it is presented to a safety.It and a primary processor collaborative work when starting, wherein enabled instruction is carried out encryption and decryption by using a secret key, and this key is used jointly by the starter gear and the primary processor of safety.Too time-consuming this very complicated opertaing device of method in automobile, and the expense costliness, also inapplicable generally.This in addition method still can not be upgraded opertaing device one side's security mechanism, promptly so-called privacy key.
US 005 825 878A disclose another method, wherein carry out with the form of encrypting to the transmission of the instruction and data of an opertaing device, and used security mechanism is presented in the physically safe unit at least in part opertaing device one side for this reason.Here equally still can not upgrade opertaing device one side's security mechanism, i.e. key of Bao Miing.
The object of the present invention is to provide the method in a kind of memory block write in a bootstrap district of the programmable control device that update software is loaded into once more automobile, this method has overcome above-mentioned shortcoming, and especially it can also upgrade the security mechanism of opertaing device one side in the bootstrap district in the mode of safety.
Above-mentioned task is finished by following method according to claim 1, the method may further comprise the steps: a load software that is arranged in the memory block write of outside, bootstrap district that can be loaded into programmable control device is provided, and it can control update software in the opertaing device can be write the memory block to the bootstrap district installation; Load software and update software are loaded into the memory block write that is positioned at outside, bootstrap district; In opertaing device, carry out load software, update software is installed in the memory block write in bootstrap district.
Basic ideas of the present invention are so to form the bootstrap district by known mechanism: can not directly can only conduct interviews to the bootstrap district by means of the load software that provides specially for this reason.Load software-by its control update software to the installation in bootstrap district-execution can follow suitable safety standard and carry out, these safety standards are themes of dependent claims of the present invention.
For example can make the execution of load software only when noticing the security mechanism that existence has been used for loading once more in opertaing device, just can be applied to opertaing device.Also can new security mechanism be presented in the opertaing device with load software on the other hand, these new security mechanisms are upgraded or the additional security mechanism that is present in the opertaing device.Thereby make loading once more and can guaranteeing safety of update software by the security mechanism of new introducing.
Load software and update software can be encased in the opertaing device with being separated from each other in principle; Yet update software is included in the load software, can not make the original loading procedure difficulty that becomes because this has increased the complicacy before the loading procedure, thereby improved the safe coefficient of whole process, and can not reduce convenience the user.
An effective especially modification of the method for the invention has following feature: use the method for labelling at least on the part of load software and/or update software, wherein software was labelled by means of first mark key before being transferred to opertaing device, and checked by means of second mark key that is stored in the opertaing device whether it is not forged after being transferred to opertaing device.Thereby only can guarantee by the owner of first mark key approval and add the load software that no longer changes after underlined and can in opertaing device, carry out.The concrete execution of load software for example is suppressed when mark check is failed; As an alternative, load software is loaded into depends on also in the opertaing device that whether having completed successfully mark check just carries out.What have advantage is that second mark key is stored in the memory block write in bootstrap district.Thereby can carry out reliable, the inner inspection of opertaing device.After the mark check success, this mark key itself also can be the object that the bootstrap district upgrades.
In order to label and to carry out mark check, can adopt a kind of asymmetrical method of labelling, wherein the key of a complementation of first and second mark key formation is right.This asymmetric methods for example is so-called public-key method.In a substitute variants of the present invention, use the method for labelling of symmetry, wherein first and second mark key are identical.
As replenishing or substituting to the above-mentioned method of labelling, have especially in the scheme of advantage of the method for the invention, at least a portion of load software and/or update software is encrypted by means of an encryption key before being transferred to opertaing device, and is deciphered by means of the decruption key that leaves in the opertaing device by a decryption software being transferred to opertaing device.Particularly advantageously be, put into the information in bootstrap district originally, promptly update software or its major part belong to described decrypted software section.Can guarantee that so unauthorized people can not obtain the situation about new data, this is a particular importance when for example a key that is stored in the bootstrap district need be replaced or upgrade.
With the top illustrated method of labelling comparability, what have advantage is that decruption key is stored in the memory block of writing in bootstrap district.Thereby can realize reliable, the inner inspection of opertaing device.Decruption key self also can be the object that the bootstrap district upgrades after successful decryption.
Compare with the top illustrated method of labelling equally, can adopt a kind of asymmetrical encryption method, wherein the key of a complementation of encryption key and decruption key formation is right.As an alternative, also can adopt the encryption key method of symmetry, wherein encryption key is identical with decruption key.
What have advantage is, decruption key is comprised in the load software, and with load software, be loaded in the opertaing device with update software in case of necessity.Its advantage is that the complexity of total system improves, and need not reduce convenience or raising equipment complexity to the user.
At least a portion of load software and/or update software labelled and the system of encrypting in, under the simplest situation, same key is used to label and encrypt, perhaps be used for mark check and deciphering, promptly following of symmetric case with a key, and right with the key of a complementation following of asymmetric case.Yet also can adopt key that the different keys by identical or complementary constitutes to being used to method of labelling and encryption and decryption.
Can upgrade data in the bootstrap district in the mode of safety by the method for the invention, these data can comprise and for example are stored in the key there, that be used for special security mechanism.The opertaing device that is damaged owing to " bit transition " in the bootstrap district can be recovered by reloading the previous memory contents of losing.
Below by description of drawings other advantage of the present invention.In the accompanying drawing:
Fig. 1: the synoptic diagram of a programmable control device, the memory content of described equipment shown in it
A) before implementing method of the present invention,
B) after implementing method of the present invention,
Fig. 2: the method step synoptic diagram of an embodiment of the method for the invention,
Fig. 3: the method step synoptic diagram after method step shown in Figure 2.
As example, the following describes the replacing of key in the bootstrap district.Here key shown in is not only to be used to label/mark check, and is used for the digital cipher of encrypt/decrypt.In selected embodiment, new key is not with plain mode, but only is transferred in the opertaing device by cipher mode, and load software also prevents to be distorted by means of a kind of method of labelling.In the embodiment shown, all adopt symmetry approach in both cases.Especially in the embodiment shown to label/mark check and encrypt/decrypt adopt same symmetric key.
Fig. 1 is the synoptic diagram of a programmable control device 1, wherein according to embodiment memory content is shown.Fig. 1 a illustrates the state of carrying out before the method for the invention: opertaing device comprises that can write memory block 10 and one for one can write bootstrap district 20.Control program 11 is stored in the memory block 10, and this program is controlled the basic function of opertaing device when automobilism.In bootstrap district 20, there is a key 21.This key need be substituted by a key 22, and wherein after finishing the method for the invention (Fig. 1 b), memory block 10 comprises control program 11 heavily again.
Fig. 2 is the method step synoptic diagram that is used for being written into safely new key 22.
In first main step 100, one adds underlined load software 123 by each combination of components is produced to together, then adding mark.First step by step in 110, key 22 (being the Main Ingredients and Appearance of update software) is encrypted for this reason.Here employed key is so selected, and makes to have a key that is suitable for deciphering 21 in opertaing device 1.In the embodiment shown, adopted key 21 equally for this reason, thus and the update software 111 of generation through encrypting.As an alternative, also available other key replaces key 21 to carry out asymmetrical encryption, and the key in opertaing device and this employed key are complementary.The encryption of update software is used to make loading procedure can prevent unauthorized read access, and defends unauthorized write-access effectively.Yet encrypting not is necessary technology characteristic of the present invention.
Follow step by step in 120, in order to prevent to distort to adding marks through the update software 111 of encrypting.This carries out with application program 121 in the embodiment shown.This application program 121 comprises one and is suitable for decryption software 122 that update software 111 is decrypted, makes that the deciphering in the opertaing device becomes possibility.If there has been a decryption software in opertaing device, then it can be used and not need to load once more this decryption software.
The key that is used for mark calculating is so selected, and makes that having one in opertaing device is applicable to the key that carries out mark check.Shown in select for use among the embodiment of symmetry approach, adopt same key 21 to carry out that mark calculates and mark check.Have only when used key is successfully secret, the security of symmetry approach could guarantee.Also can adopt asymmetric methods, for example public-key method replaces symmetry approach.In asymmetric methods, be used for also so selection of key that mark calculates, make that having one in opertaing device is applicable to the key that carries out mark check.For example if desired key 21 is used for the mark check of asymmetric methods, then the mark in the step 120 calculates and carries out with a key with key 21 complementations.
In second main step 200, for opertaing device is written into load software 123.Load software at first is stored in the memory block 10 for this reason, and it enters the position of control program 11 in the example shown.Covering previous already present data is not that execution the method for the invention is essential, yet require below normal in practice the appearance: common reason owing to cost, the operational memory size of programmable control device only is designed to storage and operates necessary application program, and does not consider the storage of load software 123.In order to store the load software that is used to realize the method for the invention, under actual conditions,, often override already present data based on limited free memory.
Then carry out mark check in step 220, this realizes by using key 21 in the embodiment shown.In explanation, point out about its possible alternative step 120.
If when mark check, do not obtain desired assay, promptly be judged to be and undesirable data occurred and change, then cause the consequence that can set in advance.For example opertaing device is refused this software that loads once more, makes it not operate in opertaing device.Particularly in the bootstrap district, do not do any change yet, thereby and make opertaing device resist unauthorized visit.As an alternative, also can only trigger a User Alarms.On the contrary, if the mark check conclusion is sure, but then in the memory block 10 of opertaing device, deposit update software 111 and the load software 121 that process is encrypted with executive mode.
The safety practice that is used for second main step 200 also can replace mark check with another security mechanism, for example based on the method or the encryption method of certificate.Under the simplest situation, also can save safety practice fully.Can not protect the software that is loaded once more not to be subjected to unauthorized attack in this case.
In another embodiment, load software and update software can comprise step separately to the transmission of opertaing device.This is significant especially in the following cases: in the installation steps of at first carrying out a security mechanism is presented in the opertaing device, and activates it, the safety of the step of carrying out after this security mechanism is used for.
In the main step 300 of the next one, new key 22 is stored on the position of key 21 by carrying out load software 121,122.
For this reason at first at the decryption software 122 that is included in by execution in 310 step by step in the load software 121, only revert to plain code form 22 with previous with the new key of form 111 transmission of encrypting, and it is stored on the position of key original in the bootstrap district 20 21 in 320 step by step in the back.
Like this, key in the bootstrap district of the fundamental purpose of illustrated embodiment-promptly change-realize.Below method step relate to and in opertaing device memory block 10, regenerate control program 11.
In main step 400, prepare the software that the needs that include control program 11 are loaded once more in advance for this reason.In the present embodiment, step 400 mainly is that control program 11 is labelled.Here should consider the change of security mechanism in the completed bootstrap district in the various method steps in front.If as to key 21, replenishing or the alternative change of having finished security mechanism of 22 replacing, the for example change of key length or with an asymmetric method or replace the symmetry method of labelling based on the method for certificate of labelling, the software that then needs to be loaded once more will be deferred to this new security mechanism.
Comprised a kind of symmetry approach in the embodiment shown, and key 22 is used to the computations in the step 400.As aforesaid, also can adopt other to be present in key in the opertaing device.
In the main step 500 of the next one,, and consider the renewal of security mechanism in the opertaing device bootstrap district that has carried out for opertaing device is written into Control Software 11.Control Software is transmitted with labelling in this example, and is stored in step 510 in the memory block 10, and leaves on the position of load software 121.In the step 520 of back the software of input being verified, promptly is to carry out mark check in the example shown, uses key 22 during inspection.Possible alternative is pointed out in the explanation to step 400.
If the mark check conclusion is sure, but then Control Software 11 leaves in the memory block 10 of opertaing device with executive mode, has promptly realized dbjective state shown in Figure 16.If mark check is success not, then opertaing device provides an indication, points out not realize dbjective state shown in Fig. 1 b, i.e. the renewal in bootstrap district is unsuccessful, undesirable data has perhaps taken place when reloading Control Software 11 changed.
Claims (15)
1. be used for update software (22) is loaded into once more the method for the memory block write (20) in bootstrap district of a programmable control device (1) of automobile, may further comprise the steps:
A load software (121 that can be loaded into the memory block write (10) of the programmable control device (1) that is arranged in outside, bootstrap district is provided, 122,123), this software can be controlled the installation of update software (22) in the memory block write (20) in bootstrap district in opertaing device (1)
Load software (121,122,123) and update software (22) are loaded into the memory block write (10) that is arranged in outside, bootstrap district,
In opertaing device, carry out load software (121,122,123), thereby update software (22) is installed in the memory block write (20) in bootstrap district.
2. the method for claim 1 is characterized in that, described update software (22) is included in the load software (123).
3. as each described method of above-mentioned claim, it is characterized in that at least the part of load software (121,122,123) and/or update software (22) is used the method for labelling, wherein software (121,122,123; 22) labelled by means of first mark key (21) before being transferred to opertaing device (1), and checked by means of second mark key (21) that is stored in the opertaing device (1) whether software is not forged afterwards being transferred to opertaing device (1).
4. method as claimed in claim 3 is characterized in that, described second mark key (21) is stored in the memory block write in bootstrap district.
5. as claim 3 or 4 described methods, it is characterized in that, adopt a kind of asymmetrical method of labelling, wherein the key of a complementation of first and second mark key formation is right.
6. as claim 3 or 4 described methods, it is characterized in that adopt a kind of method of labelling of symmetry, wherein first and second mark key (21) are identical.
7. the method according to any one of the preceding claims, it is characterized in that, load software (121,122,123) and/or at least a portion of update software (22) encrypted by means of an encryption key before being transferred to opertaing device, and decrypted by a decryption software (122) after being transferred to opertaing device by means of the decruption key that is stored in the opertaing device.
8. method as claimed in claim 7 is characterized in that, described decruption key (21) is stored in the memory block write (20) in bootstrap district.
9. as claim 7 or 8 described methods, it is characterized in that, adopt a kind of asymmetrical encryption method, wherein the key of a complementation of encryption key and decruption key formation is right.
10. as claim 7 or 8 described methods, it is characterized in that, adopt a kind of encryption method of symmetry, wherein encryption key (21) is identical with decruption key (21).
11., it is characterized in that decryption software (122) is comprised in the load software (123) as each described method in the claim 7 to 10.
12. as each described method in the claim 7 to 11, and return and to draw in the claim 3 to 6 each, it is characterized in that first mark key is identical with encryption key, and second mark key is identical with decruption key.
13., and return and to draw in the claim 3 to 6 each as each described method in the claim 7 to 11, it is characterized in that, adopt key different, that constitute by same key or complementary key right to the method for labelling and to encryption and decryption.
14. the application the method according to any one of the preceding claims is changed the key (21) in the bootstrap district (20) that is stored in opertaing device (1) with a new key (22).
15. application the method according to any one of the preceding claims, change the memory contents that (" bit transition ") forms opertaing device bootstrap district (20) afterwards again at not controlled physics, perhaps follow-up security mechanism of appending introducing, expansion or renewal based on software.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10328529.6 | 2003-06-24 | ||
DE10328529 | 2003-06-24 | ||
DE10357032.2 | 2003-12-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1809814A true CN1809814A (en) | 2006-07-26 |
CN100422930C CN100422930C (en) | 2008-10-01 |
Family
ID=33520947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004800176643A Expired - Lifetime CN100422930C (en) | 2003-06-24 | 2004-04-29 | Method for booting up a software in the boot sector of a programmable read-only memory |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN100422930C (en) |
DE (1) | DE10357032A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102105883A (en) * | 2008-06-23 | 2011-06-22 | Nxp股份有限公司 | Electronic device and method of software or firmware updating of an electronic device |
CN103053130A (en) * | 2010-09-01 | 2013-04-17 | 罗伯特·博世有限公司 | Method for providing information for a controller |
CN113939859A (en) * | 2019-01-21 | 2022-01-14 | 恩格雷夫Io公司 | Long term offline management of cryptographic parameters |
CN114442958A (en) * | 2022-01-28 | 2022-05-06 | 苏州浪潮智能科技有限公司 | Storage optimization method and device of distributed storage system |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102015211540A1 (en) | 2015-06-23 | 2016-12-29 | Bayerische Motoren Werke Aktiengesellschaft | Method, server, firewall, control unit, and system for programming a control unit of a vehicle |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1083589C (en) * | 1996-05-24 | 2002-04-24 | 明碁电脑股份有限公司 | Method of loading software program into EEPROM |
US6138236A (en) * | 1996-07-01 | 2000-10-24 | Sun Microsystems, Inc. | Method and apparatus for firmware authentication |
US6266809B1 (en) * | 1997-08-15 | 2001-07-24 | International Business Machines Corporation | Methods, systems and computer program products for secure firmware updates |
US6009524A (en) * | 1997-08-29 | 1999-12-28 | Compact Computer Corp | Method for the secure remote flashing of a BIOS memory |
US6378072B1 (en) * | 1998-02-03 | 2002-04-23 | Compaq Computer Corporation | Cryptographic system |
US6581159B1 (en) * | 1999-12-23 | 2003-06-17 | Intel Corporation | Secure method of updating bios by using a simply authenticated external module to further validate new firmware code |
DE10008974B4 (en) * | 2000-02-25 | 2005-12-29 | Bayerische Motoren Werke Ag | signature methods |
DE10112056A1 (en) * | 2001-03-14 | 2002-09-26 | Jungheinrich Ag | Data modification method for nonvolatile electrically erasable memory by receiving modification routines via bus and storing in volatile memory |
DE10141737C1 (en) * | 2001-08-25 | 2003-04-03 | Daimler Chrysler Ag | Secure communication method for use in vehicle has new or updated programs provided with digital signature allowing checking by external trust centre for detection of false programs |
-
2003
- 2003-12-03 DE DE10357032A patent/DE10357032A1/en not_active Ceased
-
2004
- 2004-04-29 CN CNB2004800176643A patent/CN100422930C/en not_active Expired - Lifetime
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102105883A (en) * | 2008-06-23 | 2011-06-22 | Nxp股份有限公司 | Electronic device and method of software or firmware updating of an electronic device |
CN103053130A (en) * | 2010-09-01 | 2013-04-17 | 罗伯特·博世有限公司 | Method for providing information for a controller |
CN113939859A (en) * | 2019-01-21 | 2022-01-14 | 恩格雷夫Io公司 | Long term offline management of cryptographic parameters |
CN113939859B (en) * | 2019-01-21 | 2024-04-09 | 恩格雷夫Io公司 | Long-term offline management of cryptographic parameters |
CN114442958A (en) * | 2022-01-28 | 2022-05-06 | 苏州浪潮智能科技有限公司 | Storage optimization method and device of distributed storage system |
CN114442958B (en) * | 2022-01-28 | 2023-08-11 | 苏州浪潮智能科技有限公司 | Storage optimization method and device for distributed storage system |
Also Published As
Publication number | Publication date |
---|---|
DE10357032A1 (en) | 2005-01-13 |
CN100422930C (en) | 2008-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7584350B2 (en) | Method for booting up software in the boot sector of a programmable read-only memory | |
US5748940A (en) | Secure updating of non-volatile memory | |
AU2005201995B2 (en) | System and method for protected operating system boot using state validation | |
CN107508801B (en) | Method and device for preventing file from being tampered | |
JP5114617B2 (en) | Secure terminal, program, and method for protecting private key | |
CN103218569B (en) | In order to replace the method for boot loader public keys | |
US8966646B2 (en) | Software license management | |
US20070106890A1 (en) | Method and apparatus for securely updating and boot code image | |
KR102649092B1 (en) | Apparatus and method for controlling use of bound pointers | |
CN113672878B (en) | System and method for preventing rollback attack | |
JP2009534765A (en) | Allow software version installation | |
CN103198270B (en) | Inventory is used to record the existence of effective software and calibration file | |
US20080084273A1 (en) | Method and system for securely loading code in a security processor | |
CN1540522A (en) | Method of reading primary memory | |
CN100422930C (en) | Method for booting up a software in the boot sector of a programmable read-only memory | |
US20220391545A1 (en) | Configuration data deletion based on tamper status | |
CN113935011A (en) | Method for executing a secure boot sequence of a control device | |
JP4833417B2 (en) | Microcomputer system protection method, memory device, and microcomputer system | |
KR102227558B1 (en) | Data security method based on program protection | |
CN114091008A (en) | Method for securely updating a control device | |
US20240289434A1 (en) | Method and Apparatus for Operating a Computer | |
US20230129942A1 (en) | Method for locking a rewritable non-volatile memory and electronic device implementing said method | |
US20200184115A1 (en) | Method and Apparatus for Operating a Computer | |
JP4861150B2 (en) | Information protection method, information protection firmware and firmware rewriting program | |
CN113935012A (en) | Method for executing a secure boot sequence of a control device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CX01 | Expiry of patent term |
Granted publication date: 20081001 |
|
CX01 | Expiry of patent term |