CN1809814A - Method for booting up a software in the boot sector of a programmable read-only memory - Google Patents

Method for booting up a software in the boot sector of a programmable read-only memory Download PDF

Info

Publication number
CN1809814A
CN1809814A CN 200480017664 CN200480017664A CN1809814A CN 1809814 A CN1809814 A CN 1809814A CN 200480017664 CN200480017664 CN 200480017664 CN 200480017664 A CN200480017664 A CN 200480017664A CN 1809814 A CN1809814 A CN 1809814A
Authority
CN
China
Prior art keywords
key
software
opertaing device
memory block
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200480017664
Other languages
Chinese (zh)
Other versions
CN100422930C (en
Inventor
布克哈德·库尔斯
托马斯·卡尔费坎普
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bayerische Motoren Werke AG
Original Assignee
Bayerische Motoren Werke AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bayerische Motoren Werke AG filed Critical Bayerische Motoren Werke AG
Publication of CN1809814A publication Critical patent/CN1809814A/en
Application granted granted Critical
Publication of CN100422930C publication Critical patent/CN100422930C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to a method for booting up an update software (22) in a writable memory area (20) of a boot sector of a programmable control device (1) of a vehicle. The inventive method comprises the following steps: providing a boot-up software (121, 122, 123) that can be booted up in a writable memory area of the programmable control device (1) that is outside the boot sector, said boot-up software being capable of controlling in the control device (1) installation of the update software (22) in the writable memory area (20) of the boot sector; booting up the boot-up software (121, 122, 123) and the update software (22) in the writable memory area (10) that is outside the boot sector; and executing the boot-up software (121, 122, 123) in the control device in order to install the update software (22) in the writable memory area (20) of the boot sector.

Description

Software is loaded into once more the method in the bootstrap district of programmable ROM
The present invention relates to a method that can write in the memory block in a kind of bootstrap district that update software is loaded into once more the programmable control device in the automobile.
DE 10,000 8974 A1 disclose and a kind of software have been loaded into a method that can write in the memory block in the programmable control device in the automobile once more, wherein Shu Ru software before it is transferred to opertaing device by means of a kind of public-key method, use first key of the cipher key pair of a complementation to do anti-fake mark, and after it is transferred to opertaing device, add underlined Input Software and check by second key that utilizes this cipher key pair whether it is not forged.
This method of labelling is used for avoiding uncontrolled software to be loaded into control device.Yet the prerequisite of the method is to have a security mechanism in opertaing device, and it is finished adding the above-mentioned inspection of underlined Input Software.For effective security is provided, self can resist unauthorized intrusion this security mechanism.
For this reason, described security mechanism is embedded in the bootstrap district of opertaing device usually, and the bootstrap district is protected the software change that it can not loaded afterwards usually.
Usually this is so to realize: the bootstrap district is set in the memory block that can not write (ROM) of opertaing device.Memory contents can not change afterwards again, thereby and resists unauthorized intrusion.
The shortcoming of said method is that the bootstrap district is for also ignoring through the visit of permission.Thereby in this opertaing device, can not obtain programming instruction, can not upgrade release mechanism, perhaps even can not change the key that has been disclosed.Also can not after by not controlled physical action or the aging change that causes, form the bootstrap district again, promptly so-called " bit transition " in addition.Because for software loading in the bootstrap district of this opertaing device, this known method can not be suitable for.
In order to overcome this shortcoming, the bootstrap district can be set in the changeable nonvolatile semiconductor memory member, for example in the flash memory.Yet this device district must resist unauthorized intrusion with other method.
But for this reason and known protection mechanism is not satisfied.For example in the disclosed a kind of method of US 0059 37063A, one starts firmware, and BIOS for example is by resisting non-authorized visit in the starter gear that it is presented to a safety.It and a primary processor collaborative work when starting, wherein enabled instruction is carried out encryption and decryption by using a secret key, and this key is used jointly by the starter gear and the primary processor of safety.Too time-consuming this very complicated opertaing device of method in automobile, and the expense costliness, also inapplicable generally.This in addition method still can not be upgraded opertaing device one side's security mechanism, promptly so-called privacy key.
US 005 825 878A disclose another method, wherein carry out with the form of encrypting to the transmission of the instruction and data of an opertaing device, and used security mechanism is presented in the physically safe unit at least in part opertaing device one side for this reason.Here equally still can not upgrade opertaing device one side's security mechanism, i.e. key of Bao Miing.
The object of the present invention is to provide the method in a kind of memory block write in a bootstrap district of the programmable control device that update software is loaded into once more automobile, this method has overcome above-mentioned shortcoming, and especially it can also upgrade the security mechanism of opertaing device one side in the bootstrap district in the mode of safety.
Above-mentioned task is finished by following method according to claim 1, the method may further comprise the steps: a load software that is arranged in the memory block write of outside, bootstrap district that can be loaded into programmable control device is provided, and it can control update software in the opertaing device can be write the memory block to the bootstrap district installation; Load software and update software are loaded into the memory block write that is positioned at outside, bootstrap district; In opertaing device, carry out load software, update software is installed in the memory block write in bootstrap district.
Basic ideas of the present invention are so to form the bootstrap district by known mechanism: can not directly can only conduct interviews to the bootstrap district by means of the load software that provides specially for this reason.Load software-by its control update software to the installation in bootstrap district-execution can follow suitable safety standard and carry out, these safety standards are themes of dependent claims of the present invention.
For example can make the execution of load software only when noticing the security mechanism that existence has been used for loading once more in opertaing device, just can be applied to opertaing device.Also can new security mechanism be presented in the opertaing device with load software on the other hand, these new security mechanisms are upgraded or the additional security mechanism that is present in the opertaing device.Thereby make loading once more and can guaranteeing safety of update software by the security mechanism of new introducing.
Load software and update software can be encased in the opertaing device with being separated from each other in principle; Yet update software is included in the load software, can not make the original loading procedure difficulty that becomes because this has increased the complicacy before the loading procedure, thereby improved the safe coefficient of whole process, and can not reduce convenience the user.
An effective especially modification of the method for the invention has following feature: use the method for labelling at least on the part of load software and/or update software, wherein software was labelled by means of first mark key before being transferred to opertaing device, and checked by means of second mark key that is stored in the opertaing device whether it is not forged after being transferred to opertaing device.Thereby only can guarantee by the owner of first mark key approval and add the load software that no longer changes after underlined and can in opertaing device, carry out.The concrete execution of load software for example is suppressed when mark check is failed; As an alternative, load software is loaded into depends on also in the opertaing device that whether having completed successfully mark check just carries out.What have advantage is that second mark key is stored in the memory block write in bootstrap district.Thereby can carry out reliable, the inner inspection of opertaing device.After the mark check success, this mark key itself also can be the object that the bootstrap district upgrades.
In order to label and to carry out mark check, can adopt a kind of asymmetrical method of labelling, wherein the key of a complementation of first and second mark key formation is right.This asymmetric methods for example is so-called public-key method.In a substitute variants of the present invention, use the method for labelling of symmetry, wherein first and second mark key are identical.
As replenishing or substituting to the above-mentioned method of labelling, have especially in the scheme of advantage of the method for the invention, at least a portion of load software and/or update software is encrypted by means of an encryption key before being transferred to opertaing device, and is deciphered by means of the decruption key that leaves in the opertaing device by a decryption software being transferred to opertaing device.Particularly advantageously be, put into the information in bootstrap district originally, promptly update software or its major part belong to described decrypted software section.Can guarantee that so unauthorized people can not obtain the situation about new data, this is a particular importance when for example a key that is stored in the bootstrap district need be replaced or upgrade.
With the top illustrated method of labelling comparability, what have advantage is that decruption key is stored in the memory block of writing in bootstrap district.Thereby can realize reliable, the inner inspection of opertaing device.Decruption key self also can be the object that the bootstrap district upgrades after successful decryption.
Compare with the top illustrated method of labelling equally, can adopt a kind of asymmetrical encryption method, wherein the key of a complementation of encryption key and decruption key formation is right.As an alternative, also can adopt the encryption key method of symmetry, wherein encryption key is identical with decruption key.
What have advantage is, decruption key is comprised in the load software, and with load software, be loaded in the opertaing device with update software in case of necessity.Its advantage is that the complexity of total system improves, and need not reduce convenience or raising equipment complexity to the user.
At least a portion of load software and/or update software labelled and the system of encrypting in, under the simplest situation, same key is used to label and encrypt, perhaps be used for mark check and deciphering, promptly following of symmetric case with a key, and right with the key of a complementation following of asymmetric case.Yet also can adopt key that the different keys by identical or complementary constitutes to being used to method of labelling and encryption and decryption.
Can upgrade data in the bootstrap district in the mode of safety by the method for the invention, these data can comprise and for example are stored in the key there, that be used for special security mechanism.The opertaing device that is damaged owing to " bit transition " in the bootstrap district can be recovered by reloading the previous memory contents of losing.
Below by description of drawings other advantage of the present invention.In the accompanying drawing:
Fig. 1: the synoptic diagram of a programmable control device, the memory content of described equipment shown in it
A) before implementing method of the present invention,
B) after implementing method of the present invention,
Fig. 2: the method step synoptic diagram of an embodiment of the method for the invention,
Fig. 3: the method step synoptic diagram after method step shown in Figure 2.
As example, the following describes the replacing of key in the bootstrap district.Here key shown in is not only to be used to label/mark check, and is used for the digital cipher of encrypt/decrypt.In selected embodiment, new key is not with plain mode, but only is transferred in the opertaing device by cipher mode, and load software also prevents to be distorted by means of a kind of method of labelling.In the embodiment shown, all adopt symmetry approach in both cases.Especially in the embodiment shown to label/mark check and encrypt/decrypt adopt same symmetric key.
Fig. 1 is the synoptic diagram of a programmable control device 1, wherein according to embodiment memory content is shown.Fig. 1 a illustrates the state of carrying out before the method for the invention: opertaing device comprises that can write memory block 10 and one for one can write bootstrap district 20.Control program 11 is stored in the memory block 10, and this program is controlled the basic function of opertaing device when automobilism.In bootstrap district 20, there is a key 21.This key need be substituted by a key 22, and wherein after finishing the method for the invention (Fig. 1 b), memory block 10 comprises control program 11 heavily again.
Fig. 2 is the method step synoptic diagram that is used for being written into safely new key 22.
In first main step 100, one adds underlined load software 123 by each combination of components is produced to together, then adding mark.First step by step in 110, key 22 (being the Main Ingredients and Appearance of update software) is encrypted for this reason.Here employed key is so selected, and makes to have a key that is suitable for deciphering 21 in opertaing device 1.In the embodiment shown, adopted key 21 equally for this reason, thus and the update software 111 of generation through encrypting.As an alternative, also available other key replaces key 21 to carry out asymmetrical encryption, and the key in opertaing device and this employed key are complementary.The encryption of update software is used to make loading procedure can prevent unauthorized read access, and defends unauthorized write-access effectively.Yet encrypting not is necessary technology characteristic of the present invention.
Follow step by step in 120, in order to prevent to distort to adding marks through the update software 111 of encrypting.This carries out with application program 121 in the embodiment shown.This application program 121 comprises one and is suitable for decryption software 122 that update software 111 is decrypted, makes that the deciphering in the opertaing device becomes possibility.If there has been a decryption software in opertaing device, then it can be used and not need to load once more this decryption software.
The key that is used for mark calculating is so selected, and makes that having one in opertaing device is applicable to the key that carries out mark check.Shown in select for use among the embodiment of symmetry approach, adopt same key 21 to carry out that mark calculates and mark check.Have only when used key is successfully secret, the security of symmetry approach could guarantee.Also can adopt asymmetric methods, for example public-key method replaces symmetry approach.In asymmetric methods, be used for also so selection of key that mark calculates, make that having one in opertaing device is applicable to the key that carries out mark check.For example if desired key 21 is used for the mark check of asymmetric methods, then the mark in the step 120 calculates and carries out with a key with key 21 complementations.
In second main step 200, for opertaing device is written into load software 123.Load software at first is stored in the memory block 10 for this reason, and it enters the position of control program 11 in the example shown.Covering previous already present data is not that execution the method for the invention is essential, yet require below normal in practice the appearance: common reason owing to cost, the operational memory size of programmable control device only is designed to storage and operates necessary application program, and does not consider the storage of load software 123.In order to store the load software that is used to realize the method for the invention, under actual conditions,, often override already present data based on limited free memory.
Then carry out mark check in step 220, this realizes by using key 21 in the embodiment shown.In explanation, point out about its possible alternative step 120.
If when mark check, do not obtain desired assay, promptly be judged to be and undesirable data occurred and change, then cause the consequence that can set in advance.For example opertaing device is refused this software that loads once more, makes it not operate in opertaing device.Particularly in the bootstrap district, do not do any change yet, thereby and make opertaing device resist unauthorized visit.As an alternative, also can only trigger a User Alarms.On the contrary, if the mark check conclusion is sure, but then in the memory block 10 of opertaing device, deposit update software 111 and the load software 121 that process is encrypted with executive mode.
The safety practice that is used for second main step 200 also can replace mark check with another security mechanism, for example based on the method or the encryption method of certificate.Under the simplest situation, also can save safety practice fully.Can not protect the software that is loaded once more not to be subjected to unauthorized attack in this case.
In another embodiment, load software and update software can comprise step separately to the transmission of opertaing device.This is significant especially in the following cases: in the installation steps of at first carrying out a security mechanism is presented in the opertaing device, and activates it, the safety of the step of carrying out after this security mechanism is used for.
In the main step 300 of the next one, new key 22 is stored on the position of key 21 by carrying out load software 121,122.
For this reason at first at the decryption software 122 that is included in by execution in 310 step by step in the load software 121, only revert to plain code form 22 with previous with the new key of form 111 transmission of encrypting, and it is stored on the position of key original in the bootstrap district 20 21 in 320 step by step in the back.
Like this, key in the bootstrap district of the fundamental purpose of illustrated embodiment-promptly change-realize.Below method step relate to and in opertaing device memory block 10, regenerate control program 11.
In main step 400, prepare the software that the needs that include control program 11 are loaded once more in advance for this reason.In the present embodiment, step 400 mainly is that control program 11 is labelled.Here should consider the change of security mechanism in the completed bootstrap district in the various method steps in front.If as to key 21, replenishing or the alternative change of having finished security mechanism of 22 replacing, the for example change of key length or with an asymmetric method or replace the symmetry method of labelling based on the method for certificate of labelling, the software that then needs to be loaded once more will be deferred to this new security mechanism.
Comprised a kind of symmetry approach in the embodiment shown, and key 22 is used to the computations in the step 400.As aforesaid, also can adopt other to be present in key in the opertaing device.
In the main step 500 of the next one,, and consider the renewal of security mechanism in the opertaing device bootstrap district that has carried out for opertaing device is written into Control Software 11.Control Software is transmitted with labelling in this example, and is stored in step 510 in the memory block 10, and leaves on the position of load software 121.In the step 520 of back the software of input being verified, promptly is to carry out mark check in the example shown, uses key 22 during inspection.Possible alternative is pointed out in the explanation to step 400.
If the mark check conclusion is sure, but then Control Software 11 leaves in the memory block 10 of opertaing device with executive mode, has promptly realized dbjective state shown in Figure 16.If mark check is success not, then opertaing device provides an indication, points out not realize dbjective state shown in Fig. 1 b, i.e. the renewal in bootstrap district is unsuccessful, undesirable data has perhaps taken place when reloading Control Software 11 changed.

Claims (15)

1. be used for update software (22) is loaded into once more the method for the memory block write (20) in bootstrap district of a programmable control device (1) of automobile, may further comprise the steps:
A load software (121 that can be loaded into the memory block write (10) of the programmable control device (1) that is arranged in outside, bootstrap district is provided, 122,123), this software can be controlled the installation of update software (22) in the memory block write (20) in bootstrap district in opertaing device (1)
Load software (121,122,123) and update software (22) are loaded into the memory block write (10) that is arranged in outside, bootstrap district,
In opertaing device, carry out load software (121,122,123), thereby update software (22) is installed in the memory block write (20) in bootstrap district.
2. the method for claim 1 is characterized in that, described update software (22) is included in the load software (123).
3. as each described method of above-mentioned claim, it is characterized in that at least the part of load software (121,122,123) and/or update software (22) is used the method for labelling, wherein software (121,122,123; 22) labelled by means of first mark key (21) before being transferred to opertaing device (1), and checked by means of second mark key (21) that is stored in the opertaing device (1) whether software is not forged afterwards being transferred to opertaing device (1).
4. method as claimed in claim 3 is characterized in that, described second mark key (21) is stored in the memory block write in bootstrap district.
5. as claim 3 or 4 described methods, it is characterized in that, adopt a kind of asymmetrical method of labelling, wherein the key of a complementation of first and second mark key formation is right.
6. as claim 3 or 4 described methods, it is characterized in that adopt a kind of method of labelling of symmetry, wherein first and second mark key (21) are identical.
7. the method according to any one of the preceding claims, it is characterized in that, load software (121,122,123) and/or at least a portion of update software (22) encrypted by means of an encryption key before being transferred to opertaing device, and decrypted by a decryption software (122) after being transferred to opertaing device by means of the decruption key that is stored in the opertaing device.
8. method as claimed in claim 7 is characterized in that, described decruption key (21) is stored in the memory block write (20) in bootstrap district.
9. as claim 7 or 8 described methods, it is characterized in that, adopt a kind of asymmetrical encryption method, wherein the key of a complementation of encryption key and decruption key formation is right.
10. as claim 7 or 8 described methods, it is characterized in that, adopt a kind of encryption method of symmetry, wherein encryption key (21) is identical with decruption key (21).
11., it is characterized in that decryption software (122) is comprised in the load software (123) as each described method in the claim 7 to 10.
12. as each described method in the claim 7 to 11, and return and to draw in the claim 3 to 6 each, it is characterized in that first mark key is identical with encryption key, and second mark key is identical with decruption key.
13., and return and to draw in the claim 3 to 6 each as each described method in the claim 7 to 11, it is characterized in that, adopt key different, that constitute by same key or complementary key right to the method for labelling and to encryption and decryption.
14. the application the method according to any one of the preceding claims is changed the key (21) in the bootstrap district (20) that is stored in opertaing device (1) with a new key (22).
15. application the method according to any one of the preceding claims, change the memory contents that (" bit transition ") forms opertaing device bootstrap district (20) afterwards again at not controlled physics, perhaps follow-up security mechanism of appending introducing, expansion or renewal based on software.
CNB2004800176643A 2003-06-24 2004-04-29 Method for booting up a software in the boot sector of a programmable read-only memory Expired - Lifetime CN100422930C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE10328529.6 2003-06-24
DE10328529 2003-06-24
DE10357032.2 2003-12-03

Publications (2)

Publication Number Publication Date
CN1809814A true CN1809814A (en) 2006-07-26
CN100422930C CN100422930C (en) 2008-10-01

Family

ID=33520947

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004800176643A Expired - Lifetime CN100422930C (en) 2003-06-24 2004-04-29 Method for booting up a software in the boot sector of a programmable read-only memory

Country Status (2)

Country Link
CN (1) CN100422930C (en)
DE (1) DE10357032A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102105883A (en) * 2008-06-23 2011-06-22 Nxp股份有限公司 Electronic device and method of software or firmware updating of an electronic device
CN103053130A (en) * 2010-09-01 2013-04-17 罗伯特·博世有限公司 Method for providing information for a controller
CN113939859A (en) * 2019-01-21 2022-01-14 恩格雷夫Io公司 Long term offline management of cryptographic parameters
CN114442958A (en) * 2022-01-28 2022-05-06 苏州浪潮智能科技有限公司 Storage optimization method and device of distributed storage system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102015211540A1 (en) 2015-06-23 2016-12-29 Bayerische Motoren Werke Aktiengesellschaft Method, server, firewall, control unit, and system for programming a control unit of a vehicle

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1083589C (en) * 1996-05-24 2002-04-24 明碁电脑股份有限公司 Method of loading software program into EEPROM
US6138236A (en) * 1996-07-01 2000-10-24 Sun Microsystems, Inc. Method and apparatus for firmware authentication
US6266809B1 (en) * 1997-08-15 2001-07-24 International Business Machines Corporation Methods, systems and computer program products for secure firmware updates
US6009524A (en) * 1997-08-29 1999-12-28 Compact Computer Corp Method for the secure remote flashing of a BIOS memory
US6378072B1 (en) * 1998-02-03 2002-04-23 Compaq Computer Corporation Cryptographic system
US6581159B1 (en) * 1999-12-23 2003-06-17 Intel Corporation Secure method of updating bios by using a simply authenticated external module to further validate new firmware code
DE10008974B4 (en) * 2000-02-25 2005-12-29 Bayerische Motoren Werke Ag signature methods
DE10112056A1 (en) * 2001-03-14 2002-09-26 Jungheinrich Ag Data modification method for nonvolatile electrically erasable memory by receiving modification routines via bus and storing in volatile memory
DE10141737C1 (en) * 2001-08-25 2003-04-03 Daimler Chrysler Ag Secure communication method for use in vehicle has new or updated programs provided with digital signature allowing checking by external trust centre for detection of false programs

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102105883A (en) * 2008-06-23 2011-06-22 Nxp股份有限公司 Electronic device and method of software or firmware updating of an electronic device
CN103053130A (en) * 2010-09-01 2013-04-17 罗伯特·博世有限公司 Method for providing information for a controller
CN113939859A (en) * 2019-01-21 2022-01-14 恩格雷夫Io公司 Long term offline management of cryptographic parameters
CN113939859B (en) * 2019-01-21 2024-04-09 恩格雷夫Io公司 Long-term offline management of cryptographic parameters
CN114442958A (en) * 2022-01-28 2022-05-06 苏州浪潮智能科技有限公司 Storage optimization method and device of distributed storage system
CN114442958B (en) * 2022-01-28 2023-08-11 苏州浪潮智能科技有限公司 Storage optimization method and device for distributed storage system

Also Published As

Publication number Publication date
DE10357032A1 (en) 2005-01-13
CN100422930C (en) 2008-10-01

Similar Documents

Publication Publication Date Title
US7584350B2 (en) Method for booting up software in the boot sector of a programmable read-only memory
US5748940A (en) Secure updating of non-volatile memory
AU2005201995B2 (en) System and method for protected operating system boot using state validation
CN107508801B (en) Method and device for preventing file from being tampered
JP5114617B2 (en) Secure terminal, program, and method for protecting private key
CN103218569B (en) In order to replace the method for boot loader public keys
US8966646B2 (en) Software license management
US20070106890A1 (en) Method and apparatus for securely updating and boot code image
KR102649092B1 (en) Apparatus and method for controlling use of bound pointers
CN113672878B (en) System and method for preventing rollback attack
JP2009534765A (en) Allow software version installation
CN103198270B (en) Inventory is used to record the existence of effective software and calibration file
US20080084273A1 (en) Method and system for securely loading code in a security processor
CN1540522A (en) Method of reading primary memory
CN100422930C (en) Method for booting up a software in the boot sector of a programmable read-only memory
US20220391545A1 (en) Configuration data deletion based on tamper status
CN113935011A (en) Method for executing a secure boot sequence of a control device
JP4833417B2 (en) Microcomputer system protection method, memory device, and microcomputer system
KR102227558B1 (en) Data security method based on program protection
CN114091008A (en) Method for securely updating a control device
US20240289434A1 (en) Method and Apparatus for Operating a Computer
US20230129942A1 (en) Method for locking a rewritable non-volatile memory and electronic device implementing said method
US20200184115A1 (en) Method and Apparatus for Operating a Computer
JP4861150B2 (en) Information protection method, information protection firmware and firmware rewriting program
CN113935012A (en) Method for executing a secure boot sequence of a control device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20081001

CX01 Expiry of patent term