A method for secure booting of embedded systems

An embedded system and secure boot technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of inability to achieve system update and mirror update, increase hardware overhead, and heavy equipment burden, so as to ensure secure boot. Integrity, reduce the difficulty of development, and ensure the credibility and integrity of the effect

Inactive Publication Date: 2017-02-01
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These two measures add extra hardware overhead, which is too heavy a burden on equipment with strict cost control, and second, the image that needs to be loaded is programmed at one time, making it impossible to achieve normal system updates and image updates.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for secure booting of embedded systems
  • A method for secure booting of embedded systems
  • A method for secure booting of embedded systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Next, combine the figure 1 , attached figure 2 , attached image 3 and attached Figure 4 The main realization principles, specific implementation methods and corresponding beneficial effects that can be achieved of the technical solution of the application of the present invention are described in detail.

[0038] Reference attached figure 1 , is a diagram of a secure boot process used in the implementation case of this application.

[0039] Mark 111: the detection code in the internal system firmware, the detection code is mainly to detect the credibility and integrity of the bootloader image;

[0040] Identification 112: The decryption public key in the internal system firmware. The decryption public key is the public key paired with the private key used to encrypt the image header information of the bootloader during the image making process. It can only unlock the next stage of startup. Signature information in the header of the bootloader image.

[0041] Ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe booting method of an embedded system, relates to the field of booting security of the embedded system, and in particular relates to a cryptography-based method for verifying an image and assisting the realization of the method through hardware design. During chip design, a secure system firmware is provided inside the chip, and asymmetric encryption technology is used to sign the image to be loaded, so as to ensure the credibility and integrity of the image, and at the same time, the image can be updated. The invention guarantees security based on the hardware, but does not need to add additional hardware, greatly simplifies the hardware design difficulty and overhead, and reduces the development difficulty on the premise of ensuring the integrity of the secure startup.

Description

technical field [0001] The invention relates to the field of start-up security of an embedded system, in particular to a method for verifying a mirror image based on cryptography and assisting the realization of the method through hardware design. Background technique [0002] The rapid development of information technology has brought unprecedented prosperity to the information industry; however, incidents that endanger information security continue to occur, and the situation of information security is becoming increasingly severe. The current popular system security technologies include mandatory access control technology and encryption technology, but these are all running on the upper layer of the system. The premise that they can realize the security mechanism is that the system itself is safe. If it is tampered with by a malicious program and enters an untrusted state, the application program and upper layer security mechanism based on this system are untrustworthy. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/52G06F21/54
CPCG06F21/54G06F21/575
Inventor 杨霞桑楠曾睿孙海泳张献忠魏兰石鹏刘志伟雷林孙超群沈游人
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products