TW202226020A - Electronic device and inspection method for data integrity - Google Patents
Electronic device and inspection method for data integrity Download PDFInfo
- Publication number
- TW202226020A TW202226020A TW109144930A TW109144930A TW202226020A TW 202226020 A TW202226020 A TW 202226020A TW 109144930 A TW109144930 A TW 109144930A TW 109144930 A TW109144930 A TW 109144930A TW 202226020 A TW202226020 A TW 202226020A
- Authority
- TW
- Taiwan
- Prior art keywords
- image file
- firmware image
- volatile memory
- signature
- check
- Prior art date
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
本發明是有關於一種資料完整性的檢驗技術,且特別是有關於一種電子裝置以及資料完整性的檢驗方法。The present invention relates to a data integrity inspection technology, and in particular, to an electronic device and a data integrity inspection method.
目前各廠商不希望讓使用者任意地調整電子裝置(如,個人電腦、筆記型電腦、伺服器設備…等)中的韌體或相關設定,從而避免電子裝置無法正常運作。為了確保這些電子裝置中韌體檔案(尤其是,特定元件如中央處理器(CPU)或是基板管理控制器(BMC)所需的韌體映像檔)的資料完整性,通常會將對應此檔案的數位簽章設置於非揮發性記憶體的特定位置上,例如,位於檔案的末尾處儲存對應的數位簽章,從而方便地對前述檔案進行資料完整性檢驗。At present, manufacturers do not want users to arbitrarily adjust firmware or related settings in electronic devices (eg, personal computers, notebook computers, server equipment, etc.), so as to prevent the electronic devices from malfunctioning. In order to ensure the data integrity of the firmware files in these electronic devices (in particular, the firmware images required for specific components such as central processing units (CPU) or baseboard management controllers (BMC)), the corresponding The digital signature is set in a specific position of the non-volatile memory, for example, the corresponding digital signature is stored at the end of the file, so as to facilitate the data integrity check of the aforementioned file.
然而,由於前述檔案會經常性地透過更新等方式來調整檔案中的內容與電子裝置的相關設定,導致前述檔案經常會增加容量,從而使得數位簽章的存取位置有可能會被增加的檔案容量所覆蓋。另一方面,由於數位簽章的存取位置已在電子裝置出廠時固定在硬體晶片中,幾乎難以透過其他方式重新調整或更改。However, because the above-mentioned files are frequently updated to adjust the content in the files and the related settings of the electronic device, the above-mentioned files are often increased in capacity, so that the access location of the digital signature may be increased. covered by the capacity. On the other hand, since the access position of the digital signature has been fixed in the hardware chip when the electronic device leaves the factory, it is almost difficult to readjust or change it by other means.
本發明提供一種電子裝置以及資料完整性的檢驗方法,其在不變動資料完整性驗證的演算法的情況下自由調整韌體映像檔所對應的數位簽章位於非揮發性記憶體的存取位置,藉以易於規劃非揮發性記憶體的空間。The present invention provides an electronic device and a data integrity verification method, which can freely adjust the digital signature corresponding to the firmware image file in the access position of the non-volatile memory without changing the data integrity verification algorithm. , which makes it easy to plan the space for non-volatile memory.
本發明的電子裝置包括第一非揮發性記憶體以及安全處理器。第一非揮發性記憶體包括第一韌體映像檔、對應第一韌體映像檔的第一電子式檢查簽章以及第一標定簽章標籤。安全處理器耦接第一非揮發性記憶體。安全處理器依據預設識別碼在該第一非揮發性記憶體中檢索該第一標定簽章標籤。安全處理器依據該第一標定簽章標籤獲得位於該第一非揮發性記憶體中的預定區塊。該預定區塊包括配置表資訊,且該配置表資訊包括該第一電子式檢查簽章。安全處理器依據該第一電子式檢查簽章對該第一韌體映像檔進行資料完整性檢驗。The electronic device of the present invention includes a first non-volatile memory and a security processor. The first non-volatile memory includes a first firmware image file, a first electronic check signature corresponding to the first firmware image file, and a first calibration signature label. The secure processor is coupled to the first non-volatile memory. The security processor retrieves the first identification signature tag in the first non-volatile memory according to the preset identification code. The security processor obtains a predetermined block in the first non-volatile memory according to the first identification signature. The predetermined block includes configuration table information, and the configuration table information includes the first electronic inspection signature. The security processor performs a data integrity check on the first firmware image file according to the first electronic check signature.
本發明的資料完整性的檢驗方法適用於包括第一非揮發性記憶體以及安全處理器的電子裝置。第一非揮發性記憶體包括韌體映像檔以及對應該第一韌體映像檔的電子式檢查簽章。資料完整性的檢驗方法包括下列步驟。依據預設識別碼在該第一非揮發性記憶體中檢索標定簽章標籤;依據該第一標定簽章標籤獲得位於該第一非揮發性記憶體中的預定區塊,其中該預定區塊包括配置表資訊,且該配置表資訊包括該第一電子式檢查簽章;以及,依據該第一電子式檢查簽章對該第一韌體映像檔進行資料完整性檢驗。The data integrity checking method of the present invention is suitable for an electronic device including a first non-volatile memory and a security processor. The first non-volatile memory includes a firmware image file and an electronic check stamp corresponding to the first firmware image file. The test method for data integrity includes the following steps. Retrieve a calibration signature tag in the first non-volatile memory according to the preset identification code; obtain a predetermined block in the first non-volatile memory according to the first calibration signature tag, wherein the predetermined block Including configuration table information, and the configuration table information includes the first electronic check signature; and performing data integrity check on the first firmware image file according to the first electronic check signature.
基於上述,本發明實施例所述的電子裝置以及資料完整性的檢驗方法會在具備韌體映像檔的非揮發性記憶體中檢索標定簽章標籤,讀取對應此標定簽章標籤的位址(例如,位於此標定簽章標籤後方的位址),並利用此位址查找用於執行資料完整性檢驗所需的相關資訊。藉此,由於對應此標定簽章標籤的位址可透過更新等方式進行調整,因此可在不變動電子裝置中對於資料完整性驗證的演算法的情況下自由地調整韌體映像檔所對應的數位簽章位於非揮發性記憶體的存取位置,藉以易於規劃非揮發性記憶體的空間。另一方面,本發明實施例還將韌體映像檔的非揮發性記憶體區分為多個檢索區塊,並藉由在每個檢索區塊中判斷預設位移量的待確認資料是否為標定簽章標籤,藉以避免全域搜尋,從而大幅降低搜尋數位簽章所耗費的時間。Based on the above, the electronic device and the data integrity verification method according to the embodiments of the present invention retrieve the calibration signature tag in the non-volatile memory with the firmware image file, and read the address corresponding to the calibration signature tag (e.g., the address located behind the label for this identification seal) and use this address to find the relevant information needed to perform data integrity checks. In this way, since the address corresponding to the labeling signature can be adjusted by means of updating, etc., it is possible to freely adjust the corresponding address of the firmware image without changing the algorithm for data integrity verification in the electronic device. The digital signature is located at the access location of the non-volatile memory, which makes it easy to plan the space of the non-volatile memory. On the other hand, the embodiment of the present invention further divides the non-volatile memory of the firmware image file into a plurality of retrieval blocks, and determines whether the data to be confirmed by the preset displacement is calibrated in each retrieval block. Signature tags to avoid global searches, thereby greatly reducing the time spent searching for digital signatures.
圖1是依照本實施例一實施例的一種電子裝置100的方塊圖。本實施例的電子裝置100可以是伺服器設備、個人電腦、筆記型電腦、平板電腦、智慧型手機或相近似電子產品。在此以伺服器設備作為電子裝置100的舉例。FIG. 1 is a block diagram of an
電子裝置100主要包括至少一個非揮發性記憶體與安全處理器110。本實施例的電子裝置100還包括中央處理器120以及基板管理控制器(baseboard management controller,BMC)130。電子裝置100包括非揮發性記憶體141與143,並且還可包括非揮發性記憶體142與144。非揮發性記憶體142~144可以是快閃記憶體(flash memory)。The
非揮發性記憶體141(亦稱為是,主要非揮發性記憶體或第一非揮發性記憶體)用以儲存中央處理器140所需的韌體映像檔(圖1中以韌體151表示)。非揮發性記憶體142用以備份中央處理器140所需的韌體映像檔(韌體152)。也就是說,非揮發性記憶體142(亦稱為是,次要非揮發性記憶體或第二非揮發性記憶體)用以備援非揮發性記憶體141,當非揮發性記憶體141無法被中央處理器140讀取或是非揮發性記憶體141中的韌體映像檔有所錯誤時,中央處理器140可透過備援的非揮發性記憶體142中的韌體映像檔來正常運作。中央處理器140所需的韌體映像檔可以是基本輸出輸入系統(BIOS)。本實施例中所述的韌體映像檔也可以稱作是韌體程式碼。應用本實施例者可知悉,韌體映像檔本身即為製造電子裝置100的廠商不希望被竄改的檔案,因此將韌體程式碼以映像檔的方式儲存在對應的非揮發性記憶體中。The non-volatile memory 141 (also known as the primary non-volatile memory or the first non-volatile memory) is used to store the firmware image file required by the central processing unit 140 (represented by the
非揮發性記憶體143(亦稱為是,主要非揮發性記憶體或第一非揮發性記憶體)用以儲存基板管理控制器130所需的韌體映像檔(韌體153)。非揮發性記憶體144(亦稱為是,次要非揮發性記憶體或第二非揮發性記憶體)用以備份基板管理控制器130所需的韌體映像檔(韌體154)。也就是說,非揮發性記憶體144用以備援非揮發性記憶體143,當非揮發性記憶體143無法被基板管理控制器130讀取或是非揮發性記憶體143中的韌體映像檔有所錯誤時,基板管理控制器130可透過備援的非揮發性記憶體144中的韌體映像檔來正常運作。The non-volatile memory 143 (also referred to as the primary non-volatile memory or the first non-volatile memory) is used to store the firmware image file (firmware 153 ) required by the
於本實施例中,為避免非揮發性記憶體141~144損壞而導致韌體損毀,這些非揮發性記憶體141~144是分別以不同的記憶體裝置實現。應用本實施例者亦可在同一個記憶體裝置中的不同區塊來儲存非揮發性記憶體141~144中的檔案,但若此記憶體裝置因損毀而無法存取資料的話,將會導致前述檔案無法存取,且非揮發性記憶體141~142之間與非揮發性記憶體143~144之間的相互備援機制可能會失效。In this embodiment, in order to avoid the damage of the non-volatile memories 141 - 144 resulting in the damage of the firmware, the non-volatile memories 141 - 144 are respectively implemented by different memory devices. Those who apply this embodiment can also store the files in the
本實施例所述的至少一個非揮發性記憶體可以是非揮發性記憶體141~144其中之一。安全處理器110用以對非揮發性記憶體141~144其中之一或全部中的韌體映像檔進行資料完整性檢驗。The at least one non-volatile memory described in this embodiment may be one of the
為避免電子裝置100中用於中央處理器140或基板管理控制器130的對應韌體映像檔(亦可稱為,韌體)受損、遭到竄改或可能影響到韌體安全性的其他情況,本實施例的安全處理器110會在中央處理器140或基板管理控制器130從相應非揮發性記憶體讀取這些韌體之前,對非揮發性記憶體141~144當中的進行韌體的資料完整性檢驗,從而讓韌體的安全性獲得保障。In order to prevent the corresponding firmware image file (also referred to as, firmware) of the
在本實施例中,資料完整性檢驗需要與此韌體對應的數位簽章才能進行。本發明實施例透過調整安全處理器110中數位簽章的存取方式以在不變動電子裝置100中對於資料完整性驗證的演算法的情況下能夠自由調整數位簽章的存取位置。詳細來說,本發明實施例的安全處理器110在具備韌體映像檔的非揮發性記憶體中檢索一標定簽章標籤、讀取對應此標定簽章標籤的位址(例如,位於此標定簽章標籤後方的位址),並利用此位址查找用於執行資料完整性檢驗所需的相關資訊。由於對應此標定簽章標籤的位址可透過更新等方式進行調整其內容,因此可在不變動電子裝置100中對於資料完整性驗證的演算法的情況下,自由地調整韌體映像檔所對應的數位簽章位於非揮發性記憶體的存取位置。另一方面,本發明實施例還將韌體映像檔的非揮發性記憶體區分為多個檢索區塊,並藉由在每個檢索區塊中判斷預設位移量的待確認資料是否為標定簽章標籤,藉以避免全域搜尋,從而大幅降低搜尋數位簽章所耗費的時間。以下以各圖式與對應描述來說明本發明各實施例。In this embodiment, the data integrity check requires a digital signature corresponding to the firmware to be performed. The embodiment of the present invention can freely adjust the access position of the digital signature by adjusting the access mode of the digital signature in the
圖2是依照本實施例一實施例的電子裝置100中安全處理器110與非揮發性記憶體140的示意圖。在此以圖2的非揮發性記憶體140作為前述非揮發性記憶體141~144其中一個的舉例,且作為本發明實施例中安全處理器110進行韌體的資料完整性檢驗的示範非揮發性記憶體。本實施例的非揮發性記憶體140包括韌體映像檔210、對應韌體映像檔210的電子式檢查簽章220以及標定簽章標籤GUID。FIG. 2 is a schematic diagram of the
在本實施例的韌體的資料完整性檢驗中,安全處理器110內建有一個預設識別碼230,並依據預設識別碼230在非揮發性記憶體140中檢索標定簽章識別碼GUID。本實施例的安全處理器110在非揮發性記憶體140中檢索標定簽章識別碼GUID有許多種作法,一種作法是以全域搜尋的方式逐一比對非揮發性記憶體140中的每個位址對應的資料是否等同於預設識別碼230,藉以找尋非揮發性記憶體140中的標定簽章識別碼GUID。前述作法可能會消耗大量的硬體運算成本且耗費許多時間在搜尋標定簽章識別碼GUID上。In the data integrity check of the firmware of the present embodiment, the
本發明實施例提供另一種作法以避免全域搜尋且仍可迅速地搜尋到標定簽章識別碼GUID,從而大幅降低搜尋數位簽章所耗費的時間。安全處理器110區分非揮發性記憶體140為多個檢索區塊(如,圖2中的檢索區塊241~244),並且經設定以在這些檢索區域的預設位移量上獲取待確認資料,也就是說,安全處理器110在大小相同的每個檢索區域中尋找與前述預設位移量對應的位址上獲取對應的待確認資料。本實施例的檢索區塊241~244大小是以4096位元作為舉例,應用本實施例者可依其需求調整檢索區塊的大小。The embodiment of the present invention provides another method to avoid the global search and still quickly search for the calibration signature identification code GUID, thereby greatly reducing the time spent searching for digital signatures. The
舉例來說,在此假設預設位移量為”1000”位元。安全處理器110在進行標定簽章識別碼GUID的檢索時,會先在第一個檢索區塊241中的首個位址加上”1000”位元(亦即,預設位移量),並在此位址對應的區域(如圖2所示的虛線方框241-1)獲得待確認資料。然後,安全處理器110將比對虛線方框241-1中的此待確認資料與前述預設識別碼,以判斷此待確認資料是否為標定簽章識別碼GUID。For example, it is assumed here that the default displacement is "1000" bits. When the
若檢索區塊241中虛線方框241-1的待確認資料與前述預設識別碼不同,則安全處理器110繼續依序對下一個檢索區塊242~244進行前述操作,直到檢索到標定簽章識別碼GUID為止。亦即,安全處理器110在檢索區塊242中的首個位址加上”1000”位元(預設位移量),並在此位址對應的區域(如圖2所示的虛線方框242-1)獲得待確認資料。然後,安全處理器110比對虛線方框242-1中的待確認資料與前述預設識別碼,以判斷此待確認資料是否為標定簽章識別碼GUID。If the data to be confirmed in the dotted box 241-1 in the
在此假設本實施例檢索區塊243中方框243-1的待確認資料經比對與標定簽章識別碼GUID相同。因此,當安全處理器110在檢索區塊243中獲得對應預設位移量(圖2中以方叧243-1呈現)的待確認資料,且判斷此待確認資料的內容等同於標定簽章識別碼GUID的內容時,表示已在非揮發性記憶體140中檢索到標定簽章識別碼GUID。Here, it is assumed that the data to be confirmed in the block 243-1 of the
於此時,安全處理器110依據檢索到的標定簽章識別碼GUID而獲得位於非揮發性記憶體140中的預定區塊(例如,圖2中的預定區塊250)。本實施例的預定區塊250包括配置表資訊,且此配置表資訊包括電子式檢查簽章220。換句話說,本實施例的配置表資訊主要用於儲存資料完整性檢驗所需使用的、韌體映像檔對應的電子式數位簽章、公共鎖匙資訊PKD等信息,且配置表資訊中的各個信息皆以固定的位移量來設計,讓安全處理器110中的演算法能在獲得預定區塊250便能知悉所需的信息。At this time, the
安全處理器110可藉由多種方式以依據標定簽章識別碼GUID來獲得預定區塊250,例如,本實施例的非揮發性記憶體140還包括預定區塊位址PAA。預定區塊位址PAA位於標定簽章識別碼GUID預定位置的記憶體區塊243-2中,例如,預定區塊位址PAA位於標定簽章識別碼GUID後方的位址空間區塊243-2中。安全處理器110在檢索到標定簽章識別碼GUID之後,從位於標定簽章識別碼GUID後方的位址空間區塊243-2中獲得預定區塊位址PAA。並且,安全處理器110查找非揮發性記憶體140中對應預定區塊位址PAA的預定區塊250(如,箭頭250-1所示)。應用本實施例者可依其需求,適度地調整標定簽章識別碼GUID與預定區塊位址PAA所在的記憶體區塊243-2之間的位置關係。例如,在一些實施例中,記憶體區塊243-2可以位在標定簽章識別碼GUID之前、之後、之上或之下,和/或記憶體區塊243-2與標定簽章識別碼GUID之間可具備預設的位移量。The
在獲知預定區塊250中的配置表資訊後,安全處理器110便找到與韌體210相對應的電子式檢查簽章220。因此,安全處理器110依據電子式檢查簽章220對韌體映像檔250進行資料完整性檢驗。詳細來說,配置表資訊250除了電子式數位簽章220以外還包括公共鎖匙資訊PKD。安全處理器110獲得配置表資訊250中的公共鎖匙資訊PKD,並依據公共鎖匙資訊PKD計算與韌體映像檔210相對應的預定雜湊值,從而依據此預定雜湊值作為資料完整性檢驗的判斷依據。也就是,安全處理器110依據電子式檢查簽章220對韌體映像檔210計算檢查雜湊值,並比對前述預定雜湊值以及此檢查雜湊值是否相同,以判斷資料完整性檢驗是否成功。當預定雜湊值以及此檢查雜湊值相同時,表示韌體映像檔210的資料完整性檢驗為成功,韌體映像檔210並未被竄改或被動。另一方面,當預定雜湊值以及此檢查雜湊值不同時,表示韌體映像檔210的資料完整性檢驗為失敗。After learning the configuration table information in the
如果安全處理器110進行前述韌體的資料完整性檢驗但失敗時,表示中央處理器140或基板管理控制器130的對應韌體有安全性上的疑慮。因此,安全處理器110將使電子裝置100不開機,並在電子裝置100的主機板上以發光二極體(LED)元件發光警示,讓電子裝置100的使用者或維護人員知悉前述情形。If the
請參考圖1,非揮發性記憶體141~144分別包括韌體151~154、對應韌體151~154的電子式檢查簽章(如,圖2中的電子式數位簽章220)以及標定簽章識別碼(如,圖2中的標定簽章識別碼GUID)。安全處理器依據各個非揮發性記憶體141~144中對應的電子式檢查簽章對位於各個非揮發性記憶體141~144的韌體映像檔(即,韌體151~154)進行該資料完整性檢驗。Referring to FIG. 1 , the
以中央處理器120的韌體來說,在對位於第一非揮發性記憶體141中的韌體映像檔(即,韌體151)進行資料完整性檢驗但失敗時,安全處理器110將進行資料完整性檢驗成功且位在第二非揮發性記憶體142中的韌體映像檔(即,韌體152)寫入到第一非揮發性記憶體141中的韌體映像檔(即,韌體151)的位置以覆蓋第一韌體映像檔。以基板管理控制器130的韌體來說,在對位於第一非揮發性記憶體143中的韌體映像檔(即,韌體153)進行資料完整性檢驗但失敗時,安全處理器110將進行資料完整性檢驗成功且位在第二非揮發性記憶體144中的韌體映像檔(即,韌體154)寫入到第一非揮發性記憶體143中的韌體映像檔(即,韌體153)的位置以覆蓋第一韌體映像檔。Taking the firmware of the
圖3是依照本實施例一實施例中資料完整性的檢驗方法的流程圖。圖3中資料完整性的檢驗方法適用於例如是圖1或圖2中包括至少一個非揮發性記憶體以及安全處理器110的電子裝置100。為方便說明,在此以圖2中的非揮發性記憶體140以及安全處理器110作為舉例,以說明圖3的檢驗方法。FIG. 3 is a flowchart of a method for checking data integrity according to an embodiment of the present embodiment. The data integrity verification method in FIG. 3 is applicable to, for example, the
於圖3的步驟S310中,安全處理器110依據預設識別碼在非揮發性記憶體140中檢索標定簽章標籤GUID。於步驟S320中,安全處理器110依據標定簽章標籤GUID獲得位於非揮發性記憶體140中的預定區塊250。預定區塊360包括配置表資訊,且此配置表資訊包括電子式檢查簽章250。於步驟S330中,安全處理器110依據電子式檢查簽章220對韌體程式碼進行資料完整性檢驗。In step S310 of FIG. 3 , the
圖4是說明圖3步驟S320的詳細流程圖。於步驟S410中,安全處理器110區分非揮發性記憶體140為多個檢索區域(如2所示的檢索區域241~244)。於步驟S420中,安全處理器110依序在每個檢索區塊中獲得對應預設位移量的待確認資料。於步驟S430中,安全處理器110將前述待確認資料與前述預設識別碼進行比對,從而判斷此待確認資料是否為標定簽章標籤GUID。若步驟S430為是(前述待確認資料的內容與前述預設識別碼的內容相同),則進入圖3步驟S330。相對地,若步驟S430為否(前述待確認資料的內容與前述預設識別碼的內容不同),則回到圖4步驟S420中,在下一個檢索區塊中獲得對應預設位移量的待確認資料。FIG. 4 is a detailed flowchart illustrating step S320 of FIG. 3 . In step S410, the
綜上所述,本發明實施例所述的電子裝置以及資料完整性的檢驗方法會在具備韌體映像檔的非揮發性記憶體中檢索標定簽章標籤,讀取對應此標定簽章標籤的位址(例如,位於此標定簽章標籤後方的位址),並利用此位址查找用於執行資料完整性檢驗所需的相關資訊。藉此,由於對應此標定簽章標籤的位址可透過更新等方式進行調整,因此可在不變動電子裝置中對於資料完整性驗證的演算法的情況下自由地調整韌體映像檔所對應的數位簽章位於非揮發性記憶體的存取位置,藉以易於規劃非揮發性記憶體的空間。另一方面,本發明實施例還將韌體映像檔的非揮發性記憶體區分為多個檢索區塊,並藉由在每個檢索區塊中判斷預設位移量的待確認資料是否為標定簽章標籤,藉以避免全域搜尋,從而大幅降低搜尋數位簽章所耗費的時間。To sum up, the electronic device and the data integrity checking method according to the embodiment of the present invention will search the calibration signature tag in the non-volatile memory with the firmware image file, and read the corresponding calibration signature tag. address (for example, the address located behind the label of this identification stamp), and use this address to find the relevant information needed to perform data integrity checks. In this way, since the address corresponding to the labeling signature can be adjusted by means of updating, etc., it is possible to freely adjust the corresponding address of the firmware image without changing the algorithm for data integrity verification in the electronic device. The digital signature is located at the access location of the non-volatile memory, which makes it easy to plan the space of the non-volatile memory. On the other hand, the embodiment of the present invention further divides the non-volatile memory of the firmware image file into a plurality of retrieval blocks, and determines whether the data to be confirmed by the preset displacement is calibrated in each retrieval block. Signature tags to avoid global searches, thereby greatly reducing the time spent searching for digital signatures.
100:電子裝置
110:安全處理器
120:中央處理器
130:基板管理控制器
140、141~144:非揮發性記憶體
151~154:韌體
210:韌體映像檔
220:電子式檢查簽章
230:預設識別碼
241-1、242-1:虛線方框
243-1:方框
243-2:標定簽章識別碼預定位置的記憶體區塊
241~244:檢索區塊
250:預定區塊
250-1:箭頭
PAA:預定區塊位址
PKD:公共鎖匙資訊
GUID:標定簽章識別碼
S310~S330、S410~S430:步驟
100: Electronics
110: Security Processor
120: CPU
130:
圖1是依照本實施例一實施例的一種電子裝置的方塊圖。 圖2是依照本實施例一實施例的電子裝置中安全處理器與非揮發性記憶體的示意圖。 圖3是依照本實施例一實施例中資料完整性的檢驗方法的流程圖。 圖4是說明圖3步驟S320的詳細流程圖。 FIG. 1 is a block diagram of an electronic device according to an embodiment of the present embodiment. FIG. 2 is a schematic diagram of a security processor and a non-volatile memory in an electronic device according to an embodiment of the present embodiment. FIG. 3 is a flowchart of a method for checking data integrity according to an embodiment of the present embodiment. FIG. 4 is a detailed flowchart illustrating step S320 of FIG. 3 .
110:安全處理器 110: Security Processor
230:預設識別碼 230: Default ID
140:非揮發性記憶體 140: non-volatile memory
210:韌體映像檔 210: Firmware image file
220:電子式檢查簽章 220: Electronic Inspection Signature
241-1、242-1:虛線方框 241-1, 242-1: dotted box
243-1:方框 243-1: Box
243-2:標定簽章識別碼預定位置的記憶體區塊 243-2: Mark the memory block of the predetermined location of the signature identification code
241~244:檢索區塊 241~244: Retrieve block
250:預定區塊 250: Scheduled block
250-1:箭頭 250-1: Arrow
PAA:預定區塊位址 PAA: Predetermined block address
PKD:公共鎖匙資訊 PKD: Public Key Information
GUID:標定簽章識別碼 GUID: Calibration Signature Identifier
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW109144930A TWI763192B (en) | 2020-12-18 | 2020-12-18 | Electronic device and inspection method for data integrity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW109144930A TWI763192B (en) | 2020-12-18 | 2020-12-18 | Electronic device and inspection method for data integrity |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI763192B TWI763192B (en) | 2022-05-01 |
TW202226020A true TW202226020A (en) | 2022-07-01 |
Family
ID=82593989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW109144930A TWI763192B (en) | 2020-12-18 | 2020-12-18 | Electronic device and inspection method for data integrity |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI763192B (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9182081B2 (en) * | 2008-06-30 | 2015-11-10 | Bp Corporation North America Inc. | Rapid data-based data adequacy procedure for pipeline integrity assessment |
TWI467408B (en) * | 2011-11-15 | 2015-01-01 | Mstar Semiconductor Inc | Embedded devices and control methods thereof |
TWI594188B (en) * | 2012-04-10 | 2017-08-01 | 祥碩科技股份有限公司 | System-on-chip and booting method thereof |
US10025587B2 (en) * | 2016-08-17 | 2018-07-17 | American Megatrends Inc. | Method of bootup and installation, and computer system thereof |
-
2020
- 2020-12-18 TW TW109144930A patent/TWI763192B/en active
Also Published As
Publication number | Publication date |
---|---|
TWI763192B (en) | 2022-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6731783B2 (en) | Tamper detection system and tamper detection method | |
WO2019153592A1 (en) | User authority data management device and method, and computer readable storage medium | |
JP6435398B2 (en) | Method and system for facilitating terminal identifiers | |
US11409518B2 (en) | Remote access controller device update system | |
CN109690493A (en) | System and method for repairing the image in duplicate removal storage device | |
CN103116621B (en) | The detection method of computer hardware temperature, system and the method identifying ardware model number | |
US20100217750A1 (en) | Archive apparatus, conversion apparatus and conversion program | |
US9817605B2 (en) | Systems and methods of storing data associated with content of a data storage device | |
US7487345B2 (en) | Method of comparing build capability flags of replacement BIOS with boot capability flags of current BIOS to determine compatibility between BIOS revisions and installed hardware during flash update | |
US20230205755A1 (en) | Methods and systems for improved search for data loss prevention | |
TWI699644B (en) | Electronic device, data scrubbing device and method of performing scrubbing on data storage device | |
JP5062909B2 (en) | Copy files from one directory to another | |
BR112014008205B1 (en) | method of automatically managing an image collection and corresponding device | |
US10304560B2 (en) | Performing error correction in computer memory | |
CN115543198A (en) | Method and device for lake entering of unstructured data, electronic equipment and storage medium | |
CN112214456A (en) | House property data processing method and device and electronic equipment | |
US20240119157A1 (en) | Secure firmware update through a predefined server | |
TWI763192B (en) | Electronic device and inspection method for data integrity | |
CN114647870A (en) | Electronic device and data integrity checking method | |
US11010250B2 (en) | Memory device failure recovery system | |
TWM602765U (en) | System for attesting and verifying insurance policy through third-party blockchain | |
US10387933B2 (en) | Technologies for identifying product sources | |
CN101894126B (en) | Method and system for storing volume attributes in database | |
TWI709042B (en) | Method and apparatus for performing mapping information management regarding redundant array of independent disks, and associated storage system | |
CN112685304A (en) | Front-end information standard checking method, system, device and storage medium |