TW202226020A - Electronic device and inspection method for data integrity - Google Patents

Electronic device and inspection method for data integrity Download PDF

Info

Publication number
TW202226020A
TW202226020A TW109144930A TW109144930A TW202226020A TW 202226020 A TW202226020 A TW 202226020A TW 109144930 A TW109144930 A TW 109144930A TW 109144930 A TW109144930 A TW 109144930A TW 202226020 A TW202226020 A TW 202226020A
Authority
TW
Taiwan
Prior art keywords
image file
firmware image
volatile memory
signature
check
Prior art date
Application number
TW109144930A
Other languages
Chinese (zh)
Other versions
TWI763192B (en
Inventor
謝宜璁
黃山益
陳佳佑
黃添壽
Original Assignee
技嘉科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 技嘉科技股份有限公司 filed Critical 技嘉科技股份有限公司
Priority to TW109144930A priority Critical patent/TWI763192B/en
Application granted granted Critical
Publication of TWI763192B publication Critical patent/TWI763192B/en
Publication of TW202226020A publication Critical patent/TW202226020A/en

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

An electronic device and an inspection method for data integrity. The electronic device includes a non-volatile memory and a security processor. The non-volatile memory includes a firmware code, an electronic check signature corresponding to the firmware code, and a marked signature identification code. The security processor retrieves the marked signature identification code in the non-volatile memory according to a preset identification code, and obtains a predetermined block in the non-volatile memory according to the marked signature identification code. The predetermined block includes configuration table information, and the configuration table information includes the electronic check signature. And, the security processor performs a data integrity check on the firmware code according to the electronic check signature.

Description

電子裝置以及資料完整性的檢驗方法Electronic device and test method for data integrity

本發明是有關於一種資料完整性的檢驗技術,且特別是有關於一種電子裝置以及資料完整性的檢驗方法。The present invention relates to a data integrity inspection technology, and in particular, to an electronic device and a data integrity inspection method.

目前各廠商不希望讓使用者任意地調整電子裝置(如,個人電腦、筆記型電腦、伺服器設備…等)中的韌體或相關設定,從而避免電子裝置無法正常運作。為了確保這些電子裝置中韌體檔案(尤其是,特定元件如中央處理器(CPU)或是基板管理控制器(BMC)所需的韌體映像檔)的資料完整性,通常會將對應此檔案的數位簽章設置於非揮發性記憶體的特定位置上,例如,位於檔案的末尾處儲存對應的數位簽章,從而方便地對前述檔案進行資料完整性檢驗。At present, manufacturers do not want users to arbitrarily adjust firmware or related settings in electronic devices (eg, personal computers, notebook computers, server equipment, etc.), so as to prevent the electronic devices from malfunctioning. In order to ensure the data integrity of the firmware files in these electronic devices (in particular, the firmware images required for specific components such as central processing units (CPU) or baseboard management controllers (BMC)), the corresponding The digital signature is set in a specific position of the non-volatile memory, for example, the corresponding digital signature is stored at the end of the file, so as to facilitate the data integrity check of the aforementioned file.

然而,由於前述檔案會經常性地透過更新等方式來調整檔案中的內容與電子裝置的相關設定,導致前述檔案經常會增加容量,從而使得數位簽章的存取位置有可能會被增加的檔案容量所覆蓋。另一方面,由於數位簽章的存取位置已在電子裝置出廠時固定在硬體晶片中,幾乎難以透過其他方式重新調整或更改。However, because the above-mentioned files are frequently updated to adjust the content in the files and the related settings of the electronic device, the above-mentioned files are often increased in capacity, so that the access location of the digital signature may be increased. covered by the capacity. On the other hand, since the access position of the digital signature has been fixed in the hardware chip when the electronic device leaves the factory, it is almost difficult to readjust or change it by other means.

本發明提供一種電子裝置以及資料完整性的檢驗方法,其在不變動資料完整性驗證的演算法的情況下自由調整韌體映像檔所對應的數位簽章位於非揮發性記憶體的存取位置,藉以易於規劃非揮發性記憶體的空間。The present invention provides an electronic device and a data integrity verification method, which can freely adjust the digital signature corresponding to the firmware image file in the access position of the non-volatile memory without changing the data integrity verification algorithm. , which makes it easy to plan the space for non-volatile memory.

本發明的電子裝置包括第一非揮發性記憶體以及安全處理器。第一非揮發性記憶體包括第一韌體映像檔、對應第一韌體映像檔的第一電子式檢查簽章以及第一標定簽章標籤。安全處理器耦接第一非揮發性記憶體。安全處理器依據預設識別碼在該第一非揮發性記憶體中檢索該第一標定簽章標籤。安全處理器依據該第一標定簽章標籤獲得位於該第一非揮發性記憶體中的預定區塊。該預定區塊包括配置表資訊,且該配置表資訊包括該第一電子式檢查簽章。安全處理器依據該第一電子式檢查簽章對該第一韌體映像檔進行資料完整性檢驗。The electronic device of the present invention includes a first non-volatile memory and a security processor. The first non-volatile memory includes a first firmware image file, a first electronic check signature corresponding to the first firmware image file, and a first calibration signature label. The secure processor is coupled to the first non-volatile memory. The security processor retrieves the first identification signature tag in the first non-volatile memory according to the preset identification code. The security processor obtains a predetermined block in the first non-volatile memory according to the first identification signature. The predetermined block includes configuration table information, and the configuration table information includes the first electronic inspection signature. The security processor performs a data integrity check on the first firmware image file according to the first electronic check signature.

本發明的資料完整性的檢驗方法適用於包括第一非揮發性記憶體以及安全處理器的電子裝置。第一非揮發性記憶體包括韌體映像檔以及對應該第一韌體映像檔的電子式檢查簽章。資料完整性的檢驗方法包括下列步驟。依據預設識別碼在該第一非揮發性記憶體中檢索標定簽章標籤;依據該第一標定簽章標籤獲得位於該第一非揮發性記憶體中的預定區塊,其中該預定區塊包括配置表資訊,且該配置表資訊包括該第一電子式檢查簽章;以及,依據該第一電子式檢查簽章對該第一韌體映像檔進行資料完整性檢驗。The data integrity checking method of the present invention is suitable for an electronic device including a first non-volatile memory and a security processor. The first non-volatile memory includes a firmware image file and an electronic check stamp corresponding to the first firmware image file. The test method for data integrity includes the following steps. Retrieve a calibration signature tag in the first non-volatile memory according to the preset identification code; obtain a predetermined block in the first non-volatile memory according to the first calibration signature tag, wherein the predetermined block Including configuration table information, and the configuration table information includes the first electronic check signature; and performing data integrity check on the first firmware image file according to the first electronic check signature.

基於上述,本發明實施例所述的電子裝置以及資料完整性的檢驗方法會在具備韌體映像檔的非揮發性記憶體中檢索標定簽章標籤,讀取對應此標定簽章標籤的位址(例如,位於此標定簽章標籤後方的位址),並利用此位址查找用於執行資料完整性檢驗所需的相關資訊。藉此,由於對應此標定簽章標籤的位址可透過更新等方式進行調整,因此可在不變動電子裝置中對於資料完整性驗證的演算法的情況下自由地調整韌體映像檔所對應的數位簽章位於非揮發性記憶體的存取位置,藉以易於規劃非揮發性記憶體的空間。另一方面,本發明實施例還將韌體映像檔的非揮發性記憶體區分為多個檢索區塊,並藉由在每個檢索區塊中判斷預設位移量的待確認資料是否為標定簽章標籤,藉以避免全域搜尋,從而大幅降低搜尋數位簽章所耗費的時間。Based on the above, the electronic device and the data integrity verification method according to the embodiments of the present invention retrieve the calibration signature tag in the non-volatile memory with the firmware image file, and read the address corresponding to the calibration signature tag (e.g., the address located behind the label for this identification seal) and use this address to find the relevant information needed to perform data integrity checks. In this way, since the address corresponding to the labeling signature can be adjusted by means of updating, etc., it is possible to freely adjust the corresponding address of the firmware image without changing the algorithm for data integrity verification in the electronic device. The digital signature is located at the access location of the non-volatile memory, which makes it easy to plan the space of the non-volatile memory. On the other hand, the embodiment of the present invention further divides the non-volatile memory of the firmware image file into a plurality of retrieval blocks, and determines whether the data to be confirmed by the preset displacement is calibrated in each retrieval block. Signature tags to avoid global searches, thereby greatly reducing the time spent searching for digital signatures.

圖1是依照本實施例一實施例的一種電子裝置100的方塊圖。本實施例的電子裝置100可以是伺服器設備、個人電腦、筆記型電腦、平板電腦、智慧型手機或相近似電子產品。在此以伺服器設備作為電子裝置100的舉例。FIG. 1 is a block diagram of an electronic device 100 according to an embodiment of the present embodiment. The electronic device 100 in this embodiment may be a server device, a personal computer, a notebook computer, a tablet computer, a smart phone, or similar electronic products. Here, a server device is used as an example of the electronic device 100 .

電子裝置100主要包括至少一個非揮發性記憶體與安全處理器110。本實施例的電子裝置100還包括中央處理器120以及基板管理控制器(baseboard management controller,BMC)130。電子裝置100包括非揮發性記憶體141與143,並且還可包括非揮發性記憶體142與144。非揮發性記憶體142~144可以是快閃記憶體(flash memory)。The electronic device 100 mainly includes at least one non-volatile memory and a security processor 110 . The electronic device 100 of this embodiment further includes a central processing unit 120 and a baseboard management controller (baseboard management controller, BMC) 130 . The electronic device 100 includes non-volatile memories 141 and 143 , and may further include non-volatile memories 142 and 144 . The non-volatile memories 142 - 144 may be flash memories.

非揮發性記憶體141(亦稱為是,主要非揮發性記憶體或第一非揮發性記憶體)用以儲存中央處理器140所需的韌體映像檔(圖1中以韌體151表示)。非揮發性記憶體142用以備份中央處理器140所需的韌體映像檔(韌體152)。也就是說,非揮發性記憶體142(亦稱為是,次要非揮發性記憶體或第二非揮發性記憶體)用以備援非揮發性記憶體141,當非揮發性記憶體141無法被中央處理器140讀取或是非揮發性記憶體141中的韌體映像檔有所錯誤時,中央處理器140可透過備援的非揮發性記憶體142中的韌體映像檔來正常運作。中央處理器140所需的韌體映像檔可以是基本輸出輸入系統(BIOS)。本實施例中所述的韌體映像檔也可以稱作是韌體程式碼。應用本實施例者可知悉,韌體映像檔本身即為製造電子裝置100的廠商不希望被竄改的檔案,因此將韌體程式碼以映像檔的方式儲存在對應的非揮發性記憶體中。The non-volatile memory 141 (also known as the primary non-volatile memory or the first non-volatile memory) is used to store the firmware image file required by the central processing unit 140 (represented by the firmware 151 in FIG. 1 ) ). The non-volatile memory 142 is used for backing up the firmware image file (firmware 152 ) required by the central processing unit 140 . That is, the non-volatile memory 142 (also known as the secondary non-volatile memory or the second non-volatile memory) is used to back up the non-volatile memory 141, when the non-volatile memory 141 When the CPU 140 cannot be read or the firmware image file in the non-volatile memory 141 is wrong, the CPU 140 can operate normally through the firmware image file in the redundant non-volatile memory 142 . The firmware image required by the CPU 140 may be a basic input input system (BIOS). The firmware image file described in this embodiment may also be referred to as a firmware code. Those who apply this embodiment know that the firmware image file itself is a file that the manufacturer of the electronic device 100 does not want to be tampered with, so the firmware code is stored in the corresponding non-volatile memory in the form of an image file.

非揮發性記憶體143(亦稱為是,主要非揮發性記憶體或第一非揮發性記憶體)用以儲存基板管理控制器130所需的韌體映像檔(韌體153)。非揮發性記憶體144(亦稱為是,次要非揮發性記憶體或第二非揮發性記憶體)用以備份基板管理控制器130所需的韌體映像檔(韌體154)。也就是說,非揮發性記憶體144用以備援非揮發性記憶體143,當非揮發性記憶體143無法被基板管理控制器130讀取或是非揮發性記憶體143中的韌體映像檔有所錯誤時,基板管理控制器130可透過備援的非揮發性記憶體144中的韌體映像檔來正常運作。The non-volatile memory 143 (also referred to as the primary non-volatile memory or the first non-volatile memory) is used to store the firmware image file (firmware 153 ) required by the baseboard management controller 130 . The non-volatile memory 144 (also referred to as the secondary non-volatile memory or the second non-volatile memory) is used to back up the firmware image file (firmware 154 ) required by the baseboard management controller 130 . That is to say, the non-volatile memory 144 is used to backup the non-volatile memory 143 when the non-volatile memory 143 cannot be read by the baseboard management controller 130 or the firmware image file in the non-volatile memory 143 When there is an error, the baseboard management controller 130 can operate normally through the firmware image file in the redundant non-volatile memory 144 .

於本實施例中,為避免非揮發性記憶體141~144損壞而導致韌體損毀,這些非揮發性記憶體141~144是分別以不同的記憶體裝置實現。應用本實施例者亦可在同一個記憶體裝置中的不同區塊來儲存非揮發性記憶體141~144中的檔案,但若此記憶體裝置因損毀而無法存取資料的話,將會導致前述檔案無法存取,且非揮發性記憶體141~142之間與非揮發性記憶體143~144之間的相互備援機制可能會失效。In this embodiment, in order to avoid the damage of the non-volatile memories 141 - 144 resulting in the damage of the firmware, the non-volatile memories 141 - 144 are respectively implemented by different memory devices. Those who apply this embodiment can also store the files in the non-volatile memories 141 to 144 in different blocks in the same memory device, but if the memory device cannot access the data due to damage, it will lead to The aforementioned files cannot be accessed, and the mutual backup mechanism between the non-volatile memories 141-142 and the non-volatile memories 143-144 may fail.

本實施例所述的至少一個非揮發性記憶體可以是非揮發性記憶體141~144其中之一。安全處理器110用以對非揮發性記憶體141~144其中之一或全部中的韌體映像檔進行資料完整性檢驗。The at least one non-volatile memory described in this embodiment may be one of the non-volatile memories 141 to 144 . The security processor 110 is used for performing data integrity check on the firmware image files in one or all of the non-volatile memories 141-144.

為避免電子裝置100中用於中央處理器140或基板管理控制器130的對應韌體映像檔(亦可稱為,韌體)受損、遭到竄改或可能影響到韌體安全性的其他情況,本實施例的安全處理器110會在中央處理器140或基板管理控制器130從相應非揮發性記憶體讀取這些韌體之前,對非揮發性記憶體141~144當中的進行韌體的資料完整性檢驗,從而讓韌體的安全性獲得保障。In order to prevent the corresponding firmware image file (also referred to as, firmware) of the electronic device 100 for the central processing unit 140 or the baseboard management controller 130 from being damaged, tampered with, or other situations that may affect the security of the firmware , before the CPU 140 or the baseboard management controller 130 reads the firmware from the corresponding non-volatile memory, the security processor 110 of this embodiment will perform a firmware update on the non-volatile memories 141-144. Data integrity check, so that the security of the firmware is guaranteed.

在本實施例中,資料完整性檢驗需要與此韌體對應的數位簽章才能進行。本發明實施例透過調整安全處理器110中數位簽章的存取方式以在不變動電子裝置100中對於資料完整性驗證的演算法的情況下能夠自由調整數位簽章的存取位置。詳細來說,本發明實施例的安全處理器110在具備韌體映像檔的非揮發性記憶體中檢索一標定簽章標籤、讀取對應此標定簽章標籤的位址(例如,位於此標定簽章標籤後方的位址),並利用此位址查找用於執行資料完整性檢驗所需的相關資訊。由於對應此標定簽章標籤的位址可透過更新等方式進行調整其內容,因此可在不變動電子裝置100中對於資料完整性驗證的演算法的情況下,自由地調整韌體映像檔所對應的數位簽章位於非揮發性記憶體的存取位置。另一方面,本發明實施例還將韌體映像檔的非揮發性記憶體區分為多個檢索區塊,並藉由在每個檢索區塊中判斷預設位移量的待確認資料是否為標定簽章標籤,藉以避免全域搜尋,從而大幅降低搜尋數位簽章所耗費的時間。以下以各圖式與對應描述來說明本發明各實施例。In this embodiment, the data integrity check requires a digital signature corresponding to the firmware to be performed. The embodiment of the present invention can freely adjust the access position of the digital signature by adjusting the access mode of the digital signature in the security processor 110 without changing the algorithm for data integrity verification in the electronic device 100 . In detail, the security processor 110 of the embodiment of the present invention retrieves a calibration signature tag in a non-volatile memory with a firmware image file, reads the address corresponding to the calibration signature tag (for example, located in the calibration the address behind the signature label) and use this address to find the relevant information needed to perform a data integrity check. Since the content of the address corresponding to the calibration signature can be adjusted by means of updating, etc., the corresponding firmware image file can be freely adjusted without changing the algorithm for data integrity verification in the electronic device 100 The digital signature is located in the non-volatile memory access location. On the other hand, the embodiment of the present invention further divides the non-volatile memory of the firmware image file into a plurality of retrieval blocks, and determines whether the data to be confirmed by the preset displacement is calibrated in each retrieval block. Signature tags to avoid global searches, thereby greatly reducing the time spent searching for digital signatures. Embodiments of the present invention are described below with reference to various drawings and corresponding descriptions.

圖2是依照本實施例一實施例的電子裝置100中安全處理器110與非揮發性記憶體140的示意圖。在此以圖2的非揮發性記憶體140作為前述非揮發性記憶體141~144其中一個的舉例,且作為本發明實施例中安全處理器110進行韌體的資料完整性檢驗的示範非揮發性記憶體。本實施例的非揮發性記憶體140包括韌體映像檔210、對應韌體映像檔210的電子式檢查簽章220以及標定簽章標籤GUID。FIG. 2 is a schematic diagram of the secure processor 110 and the non-volatile memory 140 in the electronic device 100 according to an embodiment of the present embodiment. Here, the non-volatile memory 140 of FIG. 2 is used as an example of one of the aforementioned non-volatile memories 141 to 144, and is used as an exemplary non-volatile memory for the security processor 110 to perform the data integrity check of the firmware in the embodiment of the present invention Sexual memory. The non-volatile memory 140 of this embodiment includes a firmware image file 210 , an electronic check signature 220 corresponding to the firmware image file 210 , and a label GUID for the labeling signature.

在本實施例的韌體的資料完整性檢驗中,安全處理器110內建有一個預設識別碼230,並依據預設識別碼230在非揮發性記憶體140中檢索標定簽章識別碼GUID。本實施例的安全處理器110在非揮發性記憶體140中檢索標定簽章識別碼GUID有許多種作法,一種作法是以全域搜尋的方式逐一比對非揮發性記憶體140中的每個位址對應的資料是否等同於預設識別碼230,藉以找尋非揮發性記憶體140中的標定簽章識別碼GUID。前述作法可能會消耗大量的硬體運算成本且耗費許多時間在搜尋標定簽章識別碼GUID上。In the data integrity check of the firmware of the present embodiment, the security processor 110 has a built-in default identification code 230 and searches the non-volatile memory 140 according to the default identification code 230 for the calibration signature identification code GUID . There are many ways for the security processor 110 of the present embodiment to retrieve the labeling signature ID GUID in the non-volatile memory 140. One way is to compare each bit in the non-volatile memory 140 one by one in a global search manner. Whether the data corresponding to the address is equal to the default identification code 230 is used to find the signature identification code GUID in the non-volatile memory 140 . The aforementioned method may consume a large amount of hardware computing cost and spend a lot of time in searching for the signature ID GUID.

本發明實施例提供另一種作法以避免全域搜尋且仍可迅速地搜尋到標定簽章識別碼GUID,從而大幅降低搜尋數位簽章所耗費的時間。安全處理器110區分非揮發性記憶體140為多個檢索區塊(如,圖2中的檢索區塊241~244),並且經設定以在這些檢索區域的預設位移量上獲取待確認資料,也就是說,安全處理器110在大小相同的每個檢索區域中尋找與前述預設位移量對應的位址上獲取對應的待確認資料。本實施例的檢索區塊241~244大小是以4096位元作為舉例,應用本實施例者可依其需求調整檢索區塊的大小。The embodiment of the present invention provides another method to avoid the global search and still quickly search for the calibration signature identification code GUID, thereby greatly reducing the time spent searching for digital signatures. The security processor 110 distinguishes the non-volatile memory 140 into a plurality of retrieval blocks (eg, retrieval blocks 241 to 244 in FIG. 2 ), and is set to obtain the data to be confirmed at the preset displacement of these retrieval areas That is to say, the security processor 110 searches for the address corresponding to the aforementioned preset displacement amount in each retrieval area with the same size to obtain the corresponding data to be confirmed. The size of the retrieval blocks 241 to 244 in this embodiment is 4096 bits as an example, and those applying this embodiment can adjust the size of the retrieval blocks according to their needs.

舉例來說,在此假設預設位移量為”1000”位元。安全處理器110在進行標定簽章識別碼GUID的檢索時,會先在第一個檢索區塊241中的首個位址加上”1000”位元(亦即,預設位移量),並在此位址對應的區域(如圖2所示的虛線方框241-1)獲得待確認資料。然後,安全處理器110將比對虛線方框241-1中的此待確認資料與前述預設識別碼,以判斷此待確認資料是否為標定簽章識別碼GUID。For example, it is assumed here that the default displacement is "1000" bits. When the security processor 110 searches for the label ID GUID, the first address in the first search block 241 will first add a "1000" bit (ie, the preset shift amount), and The data to be confirmed is obtained in the area corresponding to this address (the dotted box 241-1 shown in FIG. 2 ). Then, the security processor 110 compares the to-be-confirmed data in the dotted box 241-1 with the aforementioned preset identification code to determine whether the to-be-confirmed data is the label identification code GUID.

若檢索區塊241中虛線方框241-1的待確認資料與前述預設識別碼不同,則安全處理器110繼續依序對下一個檢索區塊242~244進行前述操作,直到檢索到標定簽章識別碼GUID為止。亦即,安全處理器110在檢索區塊242中的首個位址加上”1000”位元(預設位移量),並在此位址對應的區域(如圖2所示的虛線方框242-1)獲得待確認資料。然後,安全處理器110比對虛線方框242-1中的待確認資料與前述預設識別碼,以判斷此待確認資料是否為標定簽章識別碼GUID。If the data to be confirmed in the dotted box 241-1 in the retrieval block 241 is different from the aforementioned preset identification code, the security processor 110 continues to perform the aforementioned operations on the next retrieval blocks 242-244 in sequence until the tag is retrieved chapter identification code GUID. That is, the security processor 110 adds the "1000" bit (the preset displacement amount) to the first address in the retrieval block 242, and adds the "1000" bit (the preset displacement amount) to the area corresponding to this address (the dotted box shown in FIG. 2 ). 242-1) Obtaining information to be confirmed. Then, the security processor 110 compares the data to be confirmed in the dotted box 242 - 1 with the aforementioned preset identification code, to determine whether the data to be confirmed is the label ID GUID.

在此假設本實施例檢索區塊243中方框243-1的待確認資料經比對與標定簽章識別碼GUID相同。因此,當安全處理器110在檢索區塊243中獲得對應預設位移量(圖2中以方叧243-1呈現)的待確認資料,且判斷此待確認資料的內容等同於標定簽章識別碼GUID的內容時,表示已在非揮發性記憶體140中檢索到標定簽章識別碼GUID。Here, it is assumed that the data to be confirmed in the block 243-1 of the retrieval block 243 in this embodiment is the same as the calibration signature identification code GUID after comparison. Therefore, when the security processor 110 obtains the data to be confirmed corresponding to the preset displacement amount (represented by the square 243-1 in FIG. 2 ) in the retrieval block 243, and judges that the content of the data to be confirmed is equivalent to the calibration signature identification When the content of the code GUID is retrieved, it means that the tagging seal identification code GUID has been retrieved in the non-volatile memory 140 .

於此時,安全處理器110依據檢索到的標定簽章識別碼GUID而獲得位於非揮發性記憶體140中的預定區塊(例如,圖2中的預定區塊250)。本實施例的預定區塊250包括配置表資訊,且此配置表資訊包括電子式檢查簽章220。換句話說,本實施例的配置表資訊主要用於儲存資料完整性檢驗所需使用的、韌體映像檔對應的電子式數位簽章、公共鎖匙資訊PKD等信息,且配置表資訊中的各個信息皆以固定的位移量來設計,讓安全處理器110中的演算法能在獲得預定區塊250便能知悉所需的信息。At this time, the security processor 110 obtains a predetermined block (eg, the predetermined block 250 in FIG. 2 ) located in the non-volatile memory 140 according to the retrieved calibration signature identification code GUID. The predetermined block 250 of this embodiment includes configuration table information, and the configuration table information includes the electronic inspection signature 220 . In other words, the configuration table information in this embodiment is mainly used to store information such as electronic digital signatures, public key information PKD, etc., which are required for data integrity checking, corresponding to the firmware image file, and the information in the configuration table information is The information is designed with a fixed displacement, so that the algorithm in the security processor 110 can obtain the required information after obtaining the predetermined block 250 .

安全處理器110可藉由多種方式以依據標定簽章識別碼GUID來獲得預定區塊250,例如,本實施例的非揮發性記憶體140還包括預定區塊位址PAA。預定區塊位址PAA位於標定簽章識別碼GUID預定位置的記憶體區塊243-2中,例如,預定區塊位址PAA位於標定簽章識別碼GUID後方的位址空間區塊243-2中。安全處理器110在檢索到標定簽章識別碼GUID之後,從位於標定簽章識別碼GUID後方的位址空間區塊243-2中獲得預定區塊位址PAA。並且,安全處理器110查找非揮發性記憶體140中對應預定區塊位址PAA的預定區塊250(如,箭頭250-1所示)。應用本實施例者可依其需求,適度地調整標定簽章識別碼GUID與預定區塊位址PAA所在的記憶體區塊243-2之間的位置關係。例如,在一些實施例中,記憶體區塊243-2可以位在標定簽章識別碼GUID之前、之後、之上或之下,和/或記憶體區塊243-2與標定簽章識別碼GUID之間可具備預設的位移量。The secure processor 110 can obtain the predetermined block 250 according to the labelled signature identification code GUID in various ways. For example, the non-volatile memory 140 of this embodiment further includes the predetermined block address PAA. The predetermined block address PAA is located in the memory block 243-2 at the predetermined position of the calibration signature ID GUID, for example, the predetermined block address PAA is located in the address space block 243-2 behind the calibration signature ID GUID middle. After retrieving the calibration signature identification code GUID, the secure processor 110 obtains the predetermined block address PAA from the address space block 243-2 located behind the calibration signature identification code GUID. And, the secure processor 110 searches the predetermined block 250 in the non-volatile memory 140 corresponding to the predetermined block address PAA (as indicated by the arrow 250-1). Those applying this embodiment can appropriately adjust the positional relationship between the calibration signature ID GUID and the memory block 243 - 2 where the predetermined block address PAA is located according to their needs. For example, in some embodiments, memory block 243-2 may be located before, after, above, or below the calibration signature ID GUID, and/or memory bank 243-2 and the calibration signature ID There can be preset displacements between GUIDs.

在獲知預定區塊250中的配置表資訊後,安全處理器110便找到與韌體210相對應的電子式檢查簽章220。因此,安全處理器110依據電子式檢查簽章220對韌體映像檔250進行資料完整性檢驗。詳細來說,配置表資訊250除了電子式數位簽章220以外還包括公共鎖匙資訊PKD。安全處理器110獲得配置表資訊250中的公共鎖匙資訊PKD,並依據公共鎖匙資訊PKD計算與韌體映像檔210相對應的預定雜湊值,從而依據此預定雜湊值作為資料完整性檢驗的判斷依據。也就是,安全處理器110依據電子式檢查簽章220對韌體映像檔210計算檢查雜湊值,並比對前述預定雜湊值以及此檢查雜湊值是否相同,以判斷資料完整性檢驗是否成功。當預定雜湊值以及此檢查雜湊值相同時,表示韌體映像檔210的資料完整性檢驗為成功,韌體映像檔210並未被竄改或被動。另一方面,當預定雜湊值以及此檢查雜湊值不同時,表示韌體映像檔210的資料完整性檢驗為失敗。After learning the configuration table information in the predetermined block 250 , the security processor 110 finds the electronic check signature 220 corresponding to the firmware 210 . Therefore, the security processor 110 performs a data integrity check on the firmware image file 250 according to the electronic check signature 220 . Specifically, the configuration table information 250 includes the public key information PKD in addition to the electronic digital signature 220 . The security processor 110 obtains the public key information PKD in the configuration table information 250, and calculates a predetermined hash value corresponding to the firmware image file 210 according to the public key information PKD, so as to use the predetermined hash value as a judgment basis for data integrity checking . That is, the security processor 110 calculates a check hash value for the firmware image file 210 according to the electronic check signature 220, and compares the predetermined hash value and the check hash value to determine whether the data integrity check is successful. When the predetermined hash value and the check hash value are the same, it means that the data integrity check of the firmware image file 210 is successful, and the firmware image file 210 has not been tampered with or passive. On the other hand, when the predetermined hash value and the check hash value are different, it means that the data integrity check of the firmware image file 210 fails.

如果安全處理器110進行前述韌體的資料完整性檢驗但失敗時,表示中央處理器140或基板管理控制器130的對應韌體有安全性上的疑慮。因此,安全處理器110將使電子裝置100不開機,並在電子裝置100的主機板上以發光二極體(LED)元件發光警示,讓電子裝置100的使用者或維護人員知悉前述情形。If the security processor 110 fails the data integrity check of the aforementioned firmware, it means that the corresponding firmware of the central processing unit 140 or the baseboard management controller 130 has security concerns. Therefore, the security processor 110 will turn off the electronic device 100, and use light emitting diode (LED) elements on the main board of the electronic device 100 to emit a warning to let the user or maintenance personnel of the electronic device 100 know the foregoing situation.

請參考圖1,非揮發性記憶體141~144分別包括韌體151~154、對應韌體151~154的電子式檢查簽章(如,圖2中的電子式數位簽章220)以及標定簽章識別碼(如,圖2中的標定簽章識別碼GUID)。安全處理器依據各個非揮發性記憶體141~144中對應的電子式檢查簽章對位於各個非揮發性記憶體141~144的韌體映像檔(即,韌體151~154)進行該資料完整性檢驗。Referring to FIG. 1 , the non-volatile memories 141 to 144 respectively include firmware 151 to 154 , an electronic check signature corresponding to the firmware 151 to 154 (eg, the electronic digital signature 220 in FIG. 2 ), and a calibration label The seal identifier (eg, the calibration seal identifier GUID in Figure 2). The security processor performs the data integrity on the firmware image files (ie, the firmware 151-154) located in each of the non-volatile memories 141-144 according to the corresponding electronic check signature in each of the non-volatile memories 141-144. sex test.

以中央處理器120的韌體來說,在對位於第一非揮發性記憶體141中的韌體映像檔(即,韌體151)進行資料完整性檢驗但失敗時,安全處理器110將進行資料完整性檢驗成功且位在第二非揮發性記憶體142中的韌體映像檔(即,韌體152)寫入到第一非揮發性記憶體141中的韌體映像檔(即,韌體151)的位置以覆蓋第一韌體映像檔。以基板管理控制器130的韌體來說,在對位於第一非揮發性記憶體143中的韌體映像檔(即,韌體153)進行資料完整性檢驗但失敗時,安全處理器110將進行資料完整性檢驗成功且位在第二非揮發性記憶體144中的韌體映像檔(即,韌體154)寫入到第一非揮發性記憶體143中的韌體映像檔(即,韌體153)的位置以覆蓋第一韌體映像檔。Taking the firmware of the CPU 120 as an example, when the data integrity check on the firmware image file (ie, the firmware 151 ) in the first non-volatile memory 141 fails, the security processor 110 will perform a data integrity check. The data integrity check is successful and the firmware image file (ie, the firmware 152 ) in the second non-volatile memory 142 is written to the firmware image file (ie, the firmware 152 ) in the first non-volatile memory 141 body 151) to cover the first firmware image file. Taking the firmware of the baseboard management controller 130 as an example, when the data integrity check on the firmware image file (ie, the firmware 153 ) in the first non-volatile memory 143 fails, the security processor 110 will The data integrity check is successful and the firmware image file (ie, the firmware 154 ) located in the second non-volatile memory 144 is written to the firmware image file (ie, the firmware 154 ) in the first non-volatile memory 143 firmware 153) to cover the first firmware image file.

圖3是依照本實施例一實施例中資料完整性的檢驗方法的流程圖。圖3中資料完整性的檢驗方法適用於例如是圖1或圖2中包括至少一個非揮發性記憶體以及安全處理器110的電子裝置100。為方便說明,在此以圖2中的非揮發性記憶體140以及安全處理器110作為舉例,以說明圖3的檢驗方法。FIG. 3 is a flowchart of a method for checking data integrity according to an embodiment of the present embodiment. The data integrity verification method in FIG. 3 is applicable to, for example, the electronic device 100 in FIG. 1 or FIG. 2 including at least one non-volatile memory and the security processor 110 . For the convenience of description, the non-volatile memory 140 and the security processor 110 in FIG. 2 are used as examples to illustrate the verification method in FIG. 3 .

於圖3的步驟S310中,安全處理器110依據預設識別碼在非揮發性記憶體140中檢索標定簽章標籤GUID。於步驟S320中,安全處理器110依據標定簽章標籤GUID獲得位於非揮發性記憶體140中的預定區塊250。預定區塊360包括配置表資訊,且此配置表資訊包括電子式檢查簽章250。於步驟S330中,安全處理器110依據電子式檢查簽章220對韌體程式碼進行資料完整性檢驗。In step S310 of FIG. 3 , the security processor 110 retrieves the label GUID in the non-volatile memory 140 according to the preset identification code. In step S320, the security processor 110 obtains the predetermined block 250 in the non-volatile memory 140 according to the label GUID of the labeling signature. The predetermined block 360 includes configuration table information, and the configuration table information includes the electronic inspection signature 250 . In step S330 , the security processor 110 performs a data integrity check on the firmware code according to the electronic check signature 220 .

圖4是說明圖3步驟S320的詳細流程圖。於步驟S410中,安全處理器110區分非揮發性記憶體140為多個檢索區域(如2所示的檢索區域241~244)。於步驟S420中,安全處理器110依序在每個檢索區塊中獲得對應預設位移量的待確認資料。於步驟S430中,安全處理器110將前述待確認資料與前述預設識別碼進行比對,從而判斷此待確認資料是否為標定簽章標籤GUID。若步驟S430為是(前述待確認資料的內容與前述預設識別碼的內容相同),則進入圖3步驟S330。相對地,若步驟S430為否(前述待確認資料的內容與前述預設識別碼的內容不同),則回到圖4步驟S420中,在下一個檢索區塊中獲得對應預設位移量的待確認資料。FIG. 4 is a detailed flowchart illustrating step S320 of FIG. 3 . In step S410, the security processor 110 distinguishes the non-volatile memory 140 into a plurality of search areas (the search areas 241-244 shown in 2). In step S420, the security processor 110 sequentially obtains the data to be confirmed corresponding to the preset displacement in each retrieval block. In step S430, the security processor 110 compares the above-mentioned data to be confirmed with the above-mentioned preset identification code, so as to determine whether the data to be confirmed is the label GUID of the label. If step S430 is yes (the content of the aforementioned data to be confirmed is the same as that of the aforementioned preset identification code), then go to step S330 in FIG. 3 . In contrast, if step S430 is negative (the content of the aforementioned data to be confirmed is different from the content of the aforementioned preset identification code), then go back to step S420 in FIG. 4 , and obtain the pending confirmation corresponding to the preset displacement in the next retrieval block material.

綜上所述,本發明實施例所述的電子裝置以及資料完整性的檢驗方法會在具備韌體映像檔的非揮發性記憶體中檢索標定簽章標籤,讀取對應此標定簽章標籤的位址(例如,位於此標定簽章標籤後方的位址),並利用此位址查找用於執行資料完整性檢驗所需的相關資訊。藉此,由於對應此標定簽章標籤的位址可透過更新等方式進行調整,因此可在不變動電子裝置中對於資料完整性驗證的演算法的情況下自由地調整韌體映像檔所對應的數位簽章位於非揮發性記憶體的存取位置,藉以易於規劃非揮發性記憶體的空間。另一方面,本發明實施例還將韌體映像檔的非揮發性記憶體區分為多個檢索區塊,並藉由在每個檢索區塊中判斷預設位移量的待確認資料是否為標定簽章標籤,藉以避免全域搜尋,從而大幅降低搜尋數位簽章所耗費的時間。To sum up, the electronic device and the data integrity checking method according to the embodiment of the present invention will search the calibration signature tag in the non-volatile memory with the firmware image file, and read the corresponding calibration signature tag. address (for example, the address located behind the label of this identification stamp), and use this address to find the relevant information needed to perform data integrity checks. In this way, since the address corresponding to the labeling signature can be adjusted by means of updating, etc., it is possible to freely adjust the corresponding address of the firmware image without changing the algorithm for data integrity verification in the electronic device. The digital signature is located at the access location of the non-volatile memory, which makes it easy to plan the space of the non-volatile memory. On the other hand, the embodiment of the present invention further divides the non-volatile memory of the firmware image file into a plurality of retrieval blocks, and determines whether the data to be confirmed by the preset displacement is calibrated in each retrieval block. Signature tags to avoid global searches, thereby greatly reducing the time spent searching for digital signatures.

100:電子裝置 110:安全處理器 120:中央處理器 130:基板管理控制器 140、141~144:非揮發性記憶體 151~154:韌體 210:韌體映像檔 220:電子式檢查簽章 230:預設識別碼 241-1、242-1:虛線方框 243-1:方框 243-2:標定簽章識別碼預定位置的記憶體區塊 241~244:檢索區塊 250:預定區塊 250-1:箭頭 PAA:預定區塊位址 PKD:公共鎖匙資訊 GUID:標定簽章識別碼 S310~S330、S410~S430:步驟 100: Electronics 110: Security Processor 120: CPU 130: Baseboard Management Controller 140, 141~144: non-volatile memory 151~154: Firmware 210: Firmware image file 220: Electronic Inspection Signature 230: Default ID 241-1, 242-1: dotted box 243-1: Box 243-2: Mark the memory block of the predetermined location of the signature identification code 241~244: Retrieve block 250: Scheduled block 250-1: Arrow PAA: Predetermined block address PKD: Public Key Information GUID: Calibration Signature Identifier S310~S330, S410~S430: Steps

圖1是依照本實施例一實施例的一種電子裝置的方塊圖。 圖2是依照本實施例一實施例的電子裝置中安全處理器與非揮發性記憶體的示意圖。 圖3是依照本實施例一實施例中資料完整性的檢驗方法的流程圖。 圖4是說明圖3步驟S320的詳細流程圖。 FIG. 1 is a block diagram of an electronic device according to an embodiment of the present embodiment. FIG. 2 is a schematic diagram of a security processor and a non-volatile memory in an electronic device according to an embodiment of the present embodiment. FIG. 3 is a flowchart of a method for checking data integrity according to an embodiment of the present embodiment. FIG. 4 is a detailed flowchart illustrating step S320 of FIG. 3 .

110:安全處理器 110: Security Processor

230:預設識別碼 230: Default ID

140:非揮發性記憶體 140: non-volatile memory

210:韌體映像檔 210: Firmware image file

220:電子式檢查簽章 220: Electronic Inspection Signature

241-1、242-1:虛線方框 241-1, 242-1: dotted box

243-1:方框 243-1: Box

243-2:標定簽章識別碼預定位置的記憶體區塊 243-2: Mark the memory block of the predetermined location of the signature identification code

241~244:檢索區塊 241~244: Retrieve block

250:預定區塊 250: Scheduled block

250-1:箭頭 250-1: Arrow

PAA:預定區塊位址 PAA: Predetermined block address

PKD:公共鎖匙資訊 PKD: Public Key Information

GUID:標定簽章識別碼 GUID: Calibration Signature Identifier

Claims (15)

一種電子裝置,包括: 一第一非揮發性記憶體,包括一第一韌體映像檔、對應該第一韌體映像檔的一第一電子式檢查簽章以及一第一標定簽章標籤;以及 一安全處理器,耦接該第一非揮發性記憶體, 其中該安全處理器依據一預設識別碼在該第一非揮發性記憶體中檢索該第一標定簽章標籤, 依據該第一標定簽章標籤獲得位於該第一非揮發性記憶體中的一預定區塊,其中該預定區塊包括一配置表資訊,且該配置表資訊包括該第一電子式檢查簽章, 以及依據該第一電子式檢查簽章對該第一韌體映像檔進行一資料完整性檢驗。 An electronic device, comprising: a first non-volatile memory including a first firmware image file, a first electronic check signature and a first calibration signature label corresponding to the first firmware image file; and a secure processor coupled to the first non-volatile memory, wherein the security processor retrieves the first labeling seal tag in the first non-volatile memory according to a preset identification code, Obtaining a predetermined block in the first non-volatile memory according to the first calibration signature label, wherein the predetermined block includes a configuration table information, and the configuration table information includes the first electronic inspection signature , and performing a data integrity check on the first firmware image file according to the first electronic check signature. 如請求項1所述的電子裝置,其中該安全處理器區分該第一非揮發性記憶體為多個檢索區塊,依序在每個檢索區塊中獲得對應一預設位移量的一待確認資料,將該待確認資料與該預設識別碼進行比對,並且判斷該待確認資料是否為該第一標定簽章標籤。The electronic device of claim 1, wherein the security processor distinguishes the first non-volatile memory into a plurality of retrieval blocks, and sequentially obtains a waiting block corresponding to a preset displacement in each retrieval block Confirming the data, comparing the data to be confirmed with the preset identification code, and determining whether the data to be confirmed is the first calibration signature label. 如請求項1所述的電子裝置,其中該第一非揮發性記憶體還包括: 一預定區塊位址,位於該第一標定簽章標籤後方的一位址空間區塊中, 其中該安全處理器在檢索到該第一標定簽章標籤之後,從位於該第一標定簽章標籤後方的該位址空間區塊中獲得該預定區塊位址, 並且,該安全處理器查找該第一非揮發性記憶體中對應該預定區塊位址的該預定區塊。 The electronic device of claim 1, wherein the first non-volatile memory further comprises: a predetermined block address, located in an address space block behind the first calibration signature label, Wherein the security processor obtains the predetermined block address from the address space block located behind the first calibration signature label after retrieving the first calibration signature label, And, the security processor searches the predetermined block corresponding to the predetermined block address in the first non-volatile memory. 如請求項1所述的電子裝置,其中該配置表資訊還包括一公共鎖匙資訊, 其中,在該安全處理器獲得位於該第一非揮發性記憶體中的該預定區塊之後,該安全處理器獲得該配置表資訊中的該公共鎖匙資訊,依據該公共鎖匙資訊計算與該第一韌體映像檔相對應的一預定雜湊值,依據該第一電子式檢查簽章對該第一韌體映像檔計算一檢查雜湊值,並比對該預定雜湊值以及該檢查雜湊值以判斷該資料完整性檢驗是否成功。 The electronic device of claim 1, wherein the configuration table information further includes a public key information, Wherein, after the security processor obtains the predetermined block in the first non-volatile memory, the security processor obtains the public key information in the configuration table information, and calculates the correlation with the first key information according to the public key information. A predetermined hash value corresponding to a firmware image file, a check hash value is calculated for the first firmware image file according to the first electronic check signature, and the predetermined hash value and the check hash value are compared to determine Whether the data integrity check is successful. 如請求項1所述的電子裝置,還包括: 一第二非揮發性記憶體,包括一第二韌體映像檔、對應該第二韌體映像檔的一第二電子式檢查簽章以及一第二標定簽章標籤, 其中該安全處理器依據該第二電子式檢查簽章對該第二韌體映像檔進行該資料完整性檢驗。 The electronic device according to claim 1, further comprising: a second non-volatile memory including a second firmware image file, a second electronic check signature and a second calibration signature label corresponding to the second firmware image file, The security processor performs the data integrity check on the second firmware image file according to the second electronic check signature. 如請求項5所述的電子裝置,其中,在對位於該第一非揮發性記憶體中的該第一韌體映像檔進行該資料完整性檢驗但失敗時,該安全處理器將進行該資料完整性檢驗成功且位在該第二非揮發性記憶體中的該第二韌體映像檔寫入到該第一非揮發性記憶體中的該第一韌體映像檔的位置以覆蓋該第一韌體映像檔。The electronic device of claim 5, wherein when the data integrity check is performed on the first firmware image file located in the first non-volatile memory and fails, the secure processor will perform the data integrity check The integrity check is successful and the second firmware image file in the second non-volatile memory is written to the location of the first firmware image file in the first non-volatile memory to cover the first firmware image file A firmware image file. 如請求項1所述的電子裝置,其中該電子裝置還包括: 一中央處理器,其中該第一韌體映像檔為該中央處理器的韌體,或是 一基板管理控制器(BMC),其中該第一韌體映像檔為該基板管理控制器的韌體。 The electronic device of claim 1, wherein the electronic device further comprises: a central processing unit, wherein the first firmware image file is the firmware of the central processing unit, or A baseboard management controller (BMC), wherein the first firmware image file is the firmware of the baseboard management controller. 如請求項7所述的電子裝置,其中該安全處理器在該中央處理器載入該第一韌體映像檔或該基板管理控制器載入該第一韌體映像檔之前,依據該第一電子式檢查簽章對該第一韌體映像檔進行該資料完整性檢驗, 並且,在該安全處理器對該第一韌體映像檔進行該資料完整性檢驗但失敗時,使該電子裝置不開機。 The electronic device of claim 7, wherein the security processor, before the central processing unit loads the first firmware image file or the baseboard management controller loads the first firmware image file, according to the first The electronic inspection signature performs the data integrity check on the first firmware image file, And, when the security processor fails to perform the data integrity check on the first firmware image file, the electronic device is turned off. 一種資料完整性的檢驗方法,適用於包括一第一非揮發性記憶體以及一安全處理器的一電子裝置,其中該第一非揮發性記憶體包括一第一韌體映像檔以及對應該第一韌體映像檔的一電子式檢查簽章,所述資料完整性的檢驗方法包括: 依據一預設識別碼在該第一非揮發性記憶體中檢索一第一標定簽章標籤; 依據該第一標定簽章標籤獲得位於該第一非揮發性記憶體中的一預定區塊,其中該預定區塊包括一配置表資訊,且該配置表資訊包括該第一電子式檢查簽章;以及 依據該第一電子式檢查簽章對該第一韌體映像檔進行一資料完整性檢驗。 A data integrity check method is suitable for an electronic device including a first non-volatile memory and a security processor, wherein the first non-volatile memory includes a first firmware image file and a corresponding first firmware image file. An electronic check signature of a firmware image file, the data integrity check method includes: retrieving a first calibration signature label in the first non-volatile memory according to a preset identification code; Obtaining a predetermined block in the first non-volatile memory according to the first calibration signature label, wherein the predetermined block includes a configuration table information, and the configuration table information includes the first electronic inspection signature ;as well as A data integrity check is performed on the first firmware image file according to the first electronic check signature. 如請求項9所述的檢驗方法,依據該預設識別碼在該第一非揮發性記憶體中檢索該第一標定簽章標籤的步驟包括: 區分該第一非揮發性記憶體為多個檢索區塊; 依序在每個檢索區塊中獲得對應一預設位移量的一待確認資料; 將該待確認資料與該預設識別碼進行比對,以判斷該待確認資料是否為該第一標定簽章標籤;以及 在該待確認資料並非為該第一標定簽章標籤的情況下,在下一個檢索區塊中獲得對應該預設位移量的該待確認資料。 As claimed in claim 9, the step of retrieving the first calibration signature label in the first non-volatile memory according to the preset identification code includes: distinguishing the first non-volatile memory into a plurality of retrieval blocks; Obtaining data to be confirmed corresponding to a preset displacement in each retrieval block in sequence; comparing the to-be-confirmed data with the preset identification code to determine whether the to-be-confirmed data is the first calibration seal label; and In the case that the data to be confirmed is not the first calibration seal label, the data to be confirmed corresponding to the preset displacement is obtained in the next retrieval block. 如請求項9所述的檢驗方法,依據該第一標定簽章標籤獲得位於該第一非揮發性記憶體中的該預定區塊的步驟包括: 在檢索到該第一標定簽章標籤之後,從位於該第一標定簽章標籤後方的一位址空間區塊中獲得一預定區塊位址;以及 查找該第一非揮發性記憶體中對應該預定區塊位址的該預定區塊。 The inspection method according to claim 9, wherein the step of obtaining the predetermined block in the first non-volatile memory according to the first calibration signature includes: After retrieving the first calibration signature label, obtain a predetermined block address from a block of address space located behind the first calibration signature label; and Searching for the predetermined block corresponding to the predetermined block address in the first non-volatile memory. 如請求項9所述的檢驗方法,其中該配置表資訊還包括一公共鎖匙資訊, 其中,依據該第一電子式檢查簽章對該第一韌體映像檔進行該資料完整性檢驗的步驟包括: 獲得該配置表資訊中的該公共鎖匙資訊; 依據該公共鎖匙資訊計算與該第一韌體映像檔相對應的一預定雜湊值; 依據該第一電子式檢查簽章對該第一韌體映像檔計算一檢查雜湊值;以及 比對該預定雜湊值以及該檢查雜湊值以判斷該資料完整性檢驗是否成功。 The inspection method according to claim 9, wherein the configuration table information further includes a public key information, Wherein, the step of performing the data integrity check on the first firmware image file according to the first electronic check signature includes: obtain the public key information in the configuration table information; calculating a predetermined hash value corresponding to the first firmware image file according to the public key information; calculating a check hash value for the first firmware image file according to the first electronic check signature; and The predetermined hash value and the check hash value are compared to determine whether the data integrity check is successful. 如請求項9所述的檢驗方法,其中該電子裝置還包括: 一第二非揮發性記憶體,包括一第二韌體映像檔、對應該第二韌體映像檔的一第二電子式檢查簽章以及一第二標定簽章標籤, 其中該檢驗方法還包括: 依據該第二電子式檢查簽章對該第二韌體映像檔進行該資料完整性檢驗。 The inspection method as claimed in claim 9, wherein the electronic device further comprises: a second non-volatile memory including a second firmware image file, a second electronic check signature and a second calibration signature label corresponding to the second firmware image file, The test method also includes: The data integrity check is performed on the second firmware image file according to the second electronic check signature. 如請求項13所述的檢驗方法,還包括: 在該電子裝置的一中央處理器載入該第一韌體映像檔或該電子裝的一基板管理控制器載入該第一韌體映像檔之前,依據該第一電子式檢查簽章對該第一韌體映像檔進行該資料完整性檢驗;以及 在對位於該第一非揮發性記憶體中的該第一韌體映像檔進行該資料完整性檢驗但失敗時,將進行該資料完整性檢驗成功且位在該第二非揮發性記憶體中的該第二韌體映像檔寫入到該第一非揮發性記憶體中的該第一韌體映像檔的位置以覆蓋該第一韌體映像檔。 The inspection method according to claim 13, further comprising: Before a central processing unit of the electronic device loads the first firmware image file or a baseboard management controller of the electronic device loads the first firmware image file, according to the first electronic inspection signature the first firmware image file performs the data integrity check; and When the data integrity check is performed on the first firmware image file located in the first non-volatile memory and fails, the data integrity check will be performed successfully and located in the second non-volatile memory The second firmware image file is written to the position of the first firmware image file in the first non-volatile memory to cover the first firmware image file. 如請求項9所述的檢驗方法,還包括: 在該電子裝置的一中央處理器載入該第一韌體映像檔或該電子裝的一基板管理控制器載入該第一韌體映像檔之前,依據該第一電子式檢查簽章對該第一韌體映像檔進行該資料完整性檢驗;以及 在對該第一韌體映像檔進行該資料完整性檢驗但失敗時,使該電子裝置不開機。 The inspection method according to claim 9, further comprising: Before a central processing unit of the electronic device loads the first firmware image file or a baseboard management controller of the electronic device loads the first firmware image file, according to the first electronic inspection signature the first firmware image file performs the data integrity check; and When the data integrity check on the first firmware image file fails, the electronic device is turned off.
TW109144930A 2020-12-18 2020-12-18 Electronic device and inspection method for data integrity TWI763192B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW109144930A TWI763192B (en) 2020-12-18 2020-12-18 Electronic device and inspection method for data integrity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW109144930A TWI763192B (en) 2020-12-18 2020-12-18 Electronic device and inspection method for data integrity

Publications (2)

Publication Number Publication Date
TWI763192B TWI763192B (en) 2022-05-01
TW202226020A true TW202226020A (en) 2022-07-01

Family

ID=82593989

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109144930A TWI763192B (en) 2020-12-18 2020-12-18 Electronic device and inspection method for data integrity

Country Status (1)

Country Link
TW (1) TWI763192B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9182081B2 (en) * 2008-06-30 2015-11-10 Bp Corporation North America Inc. Rapid data-based data adequacy procedure for pipeline integrity assessment
TWI467408B (en) * 2011-11-15 2015-01-01 Mstar Semiconductor Inc Embedded devices and control methods thereof
TWI594188B (en) * 2012-04-10 2017-08-01 祥碩科技股份有限公司 System-on-chip and booting method thereof
US10025587B2 (en) * 2016-08-17 2018-07-17 American Megatrends Inc. Method of bootup and installation, and computer system thereof

Also Published As

Publication number Publication date
TWI763192B (en) 2022-05-01

Similar Documents

Publication Publication Date Title
JP6731783B2 (en) Tamper detection system and tamper detection method
WO2019153592A1 (en) User authority data management device and method, and computer readable storage medium
JP6435398B2 (en) Method and system for facilitating terminal identifiers
US11409518B2 (en) Remote access controller device update system
CN109690493A (en) System and method for repairing the image in duplicate removal storage device
CN103116621B (en) The detection method of computer hardware temperature, system and the method identifying ardware model number
US20100217750A1 (en) Archive apparatus, conversion apparatus and conversion program
US9817605B2 (en) Systems and methods of storing data associated with content of a data storage device
US7487345B2 (en) Method of comparing build capability flags of replacement BIOS with boot capability flags of current BIOS to determine compatibility between BIOS revisions and installed hardware during flash update
US20230205755A1 (en) Methods and systems for improved search for data loss prevention
TWI699644B (en) Electronic device, data scrubbing device and method of performing scrubbing on data storage device
JP5062909B2 (en) Copy files from one directory to another
BR112014008205B1 (en) method of automatically managing an image collection and corresponding device
US10304560B2 (en) Performing error correction in computer memory
CN115543198A (en) Method and device for lake entering of unstructured data, electronic equipment and storage medium
CN112214456A (en) House property data processing method and device and electronic equipment
US20240119157A1 (en) Secure firmware update through a predefined server
TWI763192B (en) Electronic device and inspection method for data integrity
CN114647870A (en) Electronic device and data integrity checking method
US11010250B2 (en) Memory device failure recovery system
TWM602765U (en) System for attesting and verifying insurance policy through third-party blockchain
US10387933B2 (en) Technologies for identifying product sources
CN101894126B (en) Method and system for storing volume attributes in database
TWI709042B (en) Method and apparatus for performing mapping information management regarding redundant array of independent disks, and associated storage system
CN112685304A (en) Front-end information standard checking method, system, device and storage medium