Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Validation method and validation device of chip with secure booting function

A technology for secure startup and verification devices, which is applied in the field of communication, can solve problems such as easy leakage, network theft to attack the operator's network, security loopholes in the security startup program, etc., and achieve the effect of ensuring network security

Inactive Publication Date: 2013-09-04
SHANGHAI HUAWEI TECH CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the prior art, the PKEY used to check the integrity of the user BOOT program is fixed, easy to leak and be cracked, and since the BOOT KEY and SMEK are readable, if these three keys are hacked crack, the device becomes transparent to hackers. If a hacker wants to crack the board software and product software on the board, he only needs to install the fixed BOOT program, user BOOT program, PKEY, BOOT KEY, and SMEK that originally had security functions. If the chip is replaced with an original chip that does not enable security functions, a module with a hacker program can be cloned, thereby illegally embezzling the network or attacking the operator's network. Therefore, the security boot program of the single board in the prior art has serious problems. of security holes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Validation method and validation device of chip with secure booting function
  • Validation method and validation device of chip with secure booting function
  • Validation method and validation device of chip with secure booting function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The embodiment of the present invention provides a verification method and verification device for a chip with a secure boot function, which are used to start a user BOOT program on a chip with a secure boot function on a single board and determine that the user BOOT program has passed the verification , if the verification module carrying the user BOOT program verifies that the chip with the secure boot function has been replaced, it will stop running the chip with the secure boot function to prevent the single board from starting and avoid the damage caused by the chip being replaced. Security issues.

[0038] In the embodiment of the present invention, the startup of the chip control program with secure boot function on the single board mainly relies on three keys, namely PKEY, BOOT KEY, and SMEK, wherein PKEY is used to verify the integrity of the user BOOT program, And under the condition that the user BOOT program is complete, the chip with secure boot function de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a validation method and a validation device of a chip with a secure booting function. The validation method of the chip with the secure booting function comprises the following steps that the validation device carrying BOOT procedures of a user reads a chip secret key used for verifying the chip with the secure booting function after the BOOT procedures guided by the user are started by the chip with the secure booting function and the BOOT procedures of the user are confirmed to be verified; the validation device judges whether the chip with the secure booting function is replaced or not according to the chip secret key; if the chip with the secure booting function is replaced, the chip of the secure booting function is stopped operating, a single board is prevented from starting, a network is prevented from being illegally embezzled and an operator network is prevented from being attacked, and therefore the safety of networks is guaranteed.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a chip verification method and a verification device with a secure startup function. Background technique [0002] The traditional single-board secure boot technology is positive and executed sequentially. The core of the technology is a chip containing one-time programmable technology (English full name: One Time Programable, abbreviated as: OTP) storage space, and the chip Support security encryption algorithm. [0003] In the prior art, the safe boot program of the single board is: the central processing unit (full English name: Central Processing Unit, CPU) starts its internal fixed user boot (English name: BOOT) program, and initializes, and After that, the CPU invokes the public key (English full name: Public KEY, abbreviated as: PKEY) to verify the integrity of the user BOOT program, and after determining that the user BOOT program is complete, it decrypts the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51
CPCG06F21/575
Inventor 王涛
Owner SHANGHAI HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products