WO2011017844A1 - 一种在芯片层实现应用程序安全升级的方法 - Google Patents

一种在芯片层实现应用程序安全升级的方法 Download PDF

Info

Publication number
WO2011017844A1
WO2011017844A1 PCT/CN2009/073252 CN2009073252W WO2011017844A1 WO 2011017844 A1 WO2011017844 A1 WO 2011017844A1 CN 2009073252 W CN2009073252 W CN 2009073252W WO 2011017844 A1 WO2011017844 A1 WO 2011017844A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
storage area
otp
application
chip
Prior art date
Application number
PCT/CN2009/073252
Other languages
English (en)
French (fr)
Inventor
李�杰
王超
卜爱国
凌明
胡晨
时龙兴
Original Assignee
东南大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 东南大学 filed Critical 东南大学
Priority to PCT/CN2009/073252 priority Critical patent/WO2011017844A1/zh
Publication of WO2011017844A1 publication Critical patent/WO2011017844A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Definitions

  • the present invention relates to an upgrade protection of a chip application, and more particularly to a method for implementing an application security upgrade at a chip layer to determine the uniqueness and legitimacy of an application download user, and belongs to the field of electronic technology. Background technique
  • Terminal security involves many aspects such as physical security and logical security. Among them, the important way is to upgrade the application. At present, the most common application upgrade methods are:
  • the object of the present invention is to solve the problems in the above application upgrade technology, and for the first time, a method for implementing application security upgrade at the chip layer is proposed, by which the identity of the download user of the chip application can be uniquely determined, thereby avoiding Attacks by malicious programs and other security threats.
  • the technical solution adopted by the present invention is: A method for implementing an application security upgrade at a chip layer, wherein: a storage block including a OTP storage area for storing a fingerprint template is provided in a storage module of the chip, The FLASH storage area downloaded by the application, the ROM storage area with the fingerprint identification algorithm and the boot program; the serial port for downloading the program and the fingerprint identification module for receiving the fingerprint data; the boot program in the ROM is first started after the chip is powered on When receiving the upgrade download command sent by the serial port, the boot program retrieves the fingerprint template in the OTP and the user passes the fingerprint recognition sensor. The input fingerprints are compared. If the specified user is met, the application in the FLASH storage area is updated and updated; otherwise, the original application in the FLASH storage area is executed.
  • the fingerprint template is written to the OTP storage area at one time (supports writing multiple fingerprint templates).
  • the fingerprint template data in the OTP storage area is "read-only" and can only be read by the boot program of the ROM storage area. Take the interface.
  • the method of the invention can realize the security upgrade of the user application software, ensure the uniqueness and legality of the application downloading user, prevent the unauthorized user from downloading the program, and ensure that the application in the chip is not denied.
  • Authorized users upgrade and replace, thereby restricting illegal or non-deterministic programs from being executed locally on the terminal, improving system security.
  • traceability of the user's identity can be downloaded by the application.
  • FIG. 1 is a block diagram of a basic module of a chip of the method of the present invention.
  • FIG. 2 is a flow chart of the boot procedure in the method of the present invention. detailed description:
  • each module of the chip is hung on the bus, and in addition to a general-purpose module including a processor, a liquid crystal display, a keyboard control, a RAM (random access memory), etc., an OTP is set in the memory (a secondary programmable memory for storing fingerprints) Template;), ROM (; read-only memory, store bootloader;), FLASH (; store user program and data;) and other storage areas, where ROM is used to store the boot program (the bootloader implements application download and fingerprint recognition) , OTP is used to write fingerprint template once (supports writing multiple fingerprint templates), FLASH is used to store terminal applications and user data, MMU (; memory management unit;) is used to manage memory, serial port After accepting the program download command and accepting the downloaded program, after receiving the program download command, the boot program in the ROM executes the download function, and the program to be downloaded is written to the specific address of the FLASH through the serial port.
  • the fingerprint identification module is configured to receive fingerprint data sent by an external fingerprint sensor.
  • the whole program download process is as follows: The boot program is run in the ROM. When receiving the download command sent by the serial port, the fingerprint recognition module is enabled, and the input of the external fingerprint sensor is prepared, and the fingerprint recognition algorithm and the fingerprint comparison algorithm according to the ROM are input after input. Call the fingerprint film board in the OTP area for comparison. If the comparison is successful, download or update the program through the serial port. After the download is completed, reset it again, otherwise exit.
  • the fingerprint template in the OTP is downloaded by the chip manufacturer or by the chip distribution manager, after which the chip is Handed over to the designated chip user.
  • OTP implements storage security of authentication data based on the chip layer, that is, the fingerprint template is written once, and can only be read by the boot program in the ROM, and cannot be output through the external interface.
  • the boot program in the ROM is first started. If the download command sent from the serial port is received, the application upgrade process is entered. Otherwise, jump to the FLASH execution application. If the program is upgraded, the boot program first prompts the download user to input the fingerprint through the fingerprint sensor. After obtaining the fingerprint information, the user's fingerprint is compared with the fingerprint template stored in the OTP. Only after the comparison is successful, the upgrade program can be continued, otherwise the chip will Reject the program download or upgrade. Using this chip will ensure that only designated chip users can download and upgrade the program, eliminating unauthorized user upgrades.

Description

一种在芯片层实现应用程序安全升级的方法 技术领域
本发明涉及芯片应用程序的升级保护, 尤其涉及一种在芯片层实现应用 程序安全升级的方法, 以确定应用程序下载用户的唯一性和合法性, 属于电 子技术领域。 背景技术
终端安全性涉及物理安全、 逻辑安全等多个方面, 其中处于重要地位的 包含应用程序的升级方式。 目前比较通用的应用程序升级方式主要有:
(1)基于通用烧写工具升级应用程序。 该升级模式不具备保护措施, 只要 有烧写工具就能升级,安全级别低;
(2)基于引导程序升级应用程序, 其可以通过定制通信协议、 密码校验、 CRC 校验等普通方法来限制应用程序的非法升级。 该升级方式的缺点在于其 只能基于普通的逻辑控制来决定升级过程能否成功, 并不能确定应用程序下 载用户身份的确定性和合法性。 一旦烧写原理或者校验过程被攻破, 任何人 员都可以随意升级应用程序。
因此必须对应用程序下载人员的身份合法性进行判断, 否则将会导致非 法程序或非确定程序在终端本地执行, 这就可能引发安全事故。 应用程序安 全升级过程中的身份合法性控制对于金融类自助产品尤为重要。 发明内容
本发明的目的在于解决上述应用程序升级技术中所存在的问题, 首次提 出了一种在芯片层实现应用程序安全升级的方法, 通过该方法可以唯一确定 芯片应用程序下载用户的身份, 从而可以避免恶意程序和其他安全威胁的攻 击。
为实现上述目的, 本发明采取的技术方案是: 一种在芯片层实现应用程 序安全升级的方法, 其特征在于: 在芯片的存储模块内设有包括用于存储指 纹模板的 OTP存储区、 用于应用程序下载的 FLASH存储区、 带有指纹识别 算法及引导程序的 ROM存储区;用于下载程序的串口和用于接收指纹数据的 指纹识别模块; 芯片上电后首先启动 ROM中的引导程序, 在收到串口发来的 升级下载指令时, 引导程序调取 OTP中指纹模板与用户通过指纹识别传感器 输入的指纹进行比对, 若符合指定用户, 则对 FLASH存储区中的应用程序进 行更新升级; 反之, 则执行 FLASH存储区中的原有应用程序。
指纹模板一次性写入到 OTP存储区 (可支持写入多个指纹模板), OTP 存储区中的指纹模板数据为 "只读"且只能由 ROM存储区的引导程序读取, 无对外读取接口。
本发明的优点及有益效果: 本发明方法可以实现用户应用软件的安全 升级,保证了应用程序下载用户的唯一性和合法性,杜绝非授权用户下载程序, 保证芯片中的应用程序不会被非授权用户升级替换,从而限制非法程序或非确 定程序在终端本地执行, 提高了系统安全性。 另外, 还可以实现应用程序下 载用户身份的可追溯性。 附图说明
图 1是本发明方法的芯片基本模块框架图;
图 2 是本发明方法中的引导程序流程图。 具体实施方式:
下面结合附图与具体实施方式对本发明作进一步详细描述。
参看图 1, 芯片的各个模块都挂在总线上, 除了包括处理器、 液晶显示、 键盘控制、 RAM (随机存储器)等通用模块外, 存储器中设置了 OTP (—次性可 编程存储器,存放指纹模板;), ROM (;只读存储器,存放引导程序;), FLASH (;存放 用户程序和数据;)等存储区, 其中 ROM用于存放引导程序 (引导程序实现应 用程序下载与指纹识别功能), OTP用于一次性写入指纹模板(可支持写入多 个指纹模板), FLASH则用来存储终端应用程序和用户数据, MMU (;内存管理 单元;)用于对存储器进行管理, 串口用于接受程序下载指令及接受下载的程 序, 当接收到程序下载指令后, ROM中的引导程序执行下载功能, 要下载的 程序通过串口写入 FLASH的具体地址。指纹识别模块用于接收外部指纹传感 器发来的指纹数据。
整个程序下载过程为: ROM中运行引导程序, 当接收到串口发来的下载 指令时, 启用指纹识别模块, 准备接收外部指纹传感器的输入, 输入后根据 ROM中的指纹识别算法和指纹比对算法, 调用 OTP区的指纹膜板进行比对, 比对成功则通过串口下载或更新程序, 下载完毕后重新复位启动, 否则退出。
OTP 中的指纹模板由芯片制造商或由芯片分发管理者下载, 之后将芯片 交由指定的芯片使用者。 OTP 基于芯片层实现认证数据的存储安全, 即指纹 模板一次性写入, 且只能由 ROM中的引导程序读取, 并不能通过外部接口输 出。
参看图 2, 芯片上电后首先启动 ROM中的引导程序, 如收到串口发来的 下载指令则进入应用程序升级流程, 否则跳到 FLASH执行应用程序。 如进行 程序升级, 引导程序首先提示下载用户通过指纹传感器输入指纹, 获得指纹 信息后, 将用户的指纹与存储于 OTP中的指纹模板比对, 只有比对成功才可 以继续升级程序, 否则芯片将拒绝程序下载或升级。 使用此芯片可以保证只 有指定的芯片使用者才可以下载和升级程序, 杜绝了非授权用户升级程序。

Claims

利 要 求 书
1、 一种在芯片层实现应用程序安全升级的方法, 其特征在于: 在芯片的 存储模块内设有包括用于存储指纹模板的 OTP存储区、 用于应用程序下载的 FLASH存储区、 带有指纹识别算法及引导程序的 ROM存储区; 用于下载程 序的串口和用于接收指纹数据的指纹识别模块;芯片上电后首先启动 ROM中 的引导程序, 在收到串口发来的升级下载指令时, 弓 I导程序调取 OTP中指纹 模板与用户通过指纹识别传感器输入的指纹进行比对, 若符合指定用户, 则 对 FLASH存储区中的应用程序进行更新升级; 反之, 则执行 FLASH存储区 中的原有应用程序。
2、 根据权利要求 1所述的在芯片层实现应用程序安全升级的方法, 其特 征在于: 指纹模板一次性写入到 OTP存储区, OTP存储区中的指纹模板数 据为 "只读"且只能由 ROM存储区的引导程序读取, 无对外读取接口。
PCT/CN2009/073252 2009-08-14 2009-08-14 一种在芯片层实现应用程序安全升级的方法 WO2011017844A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/073252 WO2011017844A1 (zh) 2009-08-14 2009-08-14 一种在芯片层实现应用程序安全升级的方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/073252 WO2011017844A1 (zh) 2009-08-14 2009-08-14 一种在芯片层实现应用程序安全升级的方法

Publications (1)

Publication Number Publication Date
WO2011017844A1 true WO2011017844A1 (zh) 2011-02-17

Family

ID=43585851

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/073252 WO2011017844A1 (zh) 2009-08-14 2009-08-14 一种在芯片层实现应用程序安全升级的方法

Country Status (1)

Country Link
WO (1) WO2011017844A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927195A (zh) * 2013-12-17 2014-07-16 记忆科技(深圳)有限公司 一次性可编程芯片otp的升级方法
CN109886181A (zh) * 2019-02-18 2019-06-14 Oppo广东移动通信有限公司 指纹算法确定方法及相关设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885315A (zh) * 2006-05-26 2006-12-27 上海一维科技有限公司 嵌入式单安全芯片生物指纹识别系统及其方法
CN101131650A (zh) * 2006-08-23 2008-02-27 王悦 基于USB Host的引导、升级和维护的仪器及其方法
CN101620545A (zh) * 2009-08-14 2010-01-06 东南大学 一种在芯片层实现应用程序安全升级的方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885315A (zh) * 2006-05-26 2006-12-27 上海一维科技有限公司 嵌入式单安全芯片生物指纹识别系统及其方法
CN101131650A (zh) * 2006-08-23 2008-02-27 王悦 基于USB Host的引导、升级和维护的仪器及其方法
CN101620545A (zh) * 2009-08-14 2010-01-06 东南大学 一种在芯片层实现应用程序安全升级的方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927195A (zh) * 2013-12-17 2014-07-16 记忆科技(深圳)有限公司 一次性可编程芯片otp的升级方法
CN109886181A (zh) * 2019-02-18 2019-06-14 Oppo广东移动通信有限公司 指纹算法确定方法及相关设备

Similar Documents

Publication Publication Date Title
US8996851B2 (en) Host device and method for securely booting the host device with operating system code loaded from a storage device
TWI667586B (zh) 用以核對uefi認證變量變化之系統及方法
US7917741B2 (en) Enhancing security of a system via access by an embedded controller to a secure storage device
JP6595822B2 (ja) 情報処理装置及びその制御方法
CN104424441B (zh) 处理系统
TWI607376B (zh) 用於處理改變依照統一可延伸韌體介面計算裝置中之系統安全資料庫及韌體儲存區請求的系統及方法
US20090193211A1 (en) Software authentication for computer systems
US6223284B1 (en) Method and apparatus for remote ROM flashing and security management for a computer system
US7174463B2 (en) Method and system for preboot user authentication
JP4503576B2 (ja) コードイメージを安全に更新してブーティングする方法及び装置
US8775808B2 (en) System and method for performing a management operation
JP5373062B2 (ja) システム管理コマンドを提供するシステム及び方法
US8566815B2 (en) Mechanism for updating software
US8028165B2 (en) Trusted platform field upgrade system and method
US9262631B2 (en) Embedded device and control method thereof
JP6639620B2 (ja) コード署名の条件付き規定に基づくセキュアクライアント認証
WO2009123631A1 (en) Binding a cryptographic module to a platform
WO2022250836A1 (en) Transfer of ownership of a computing device via a security processor
US20130276149A1 (en) Secure memory management system and method
US20120060215A1 (en) Mobile terminal and method for protecting its system data
US10742412B2 (en) Separate cryptographic keys for multiple modes
WO2011017844A1 (zh) 一种在芯片层实现应用程序安全升级的方法
US20200134164A1 (en) Method for authenticating a program and corresponding integrated circuit
JP6354438B2 (ja) 情報処理装置、情報処理システム及び処理プログラム
JP5460133B2 (ja) マイクロコントローラ装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09848174

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09848174

Country of ref document: EP

Kind code of ref document: A1