Software update device, and software update program

A software update device and software technology, applied in software deployment, secure communication devices, computer security devices, etc., can solve problems such as illegal copying of embedded devices, bypassing security functions, etc.

Active Publication Date: 2016-06-22
MITSUBISHI ELECTRIC CORP
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the case of the above modification, it may lead to bypassing the security function of the embedded device
As a result, the manufacturer of the embedded device may suffer damages such as illegal copying and imitation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software update device, and software update program
  • Software update device, and software update program
  • Software update device, and software update program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0041] figure 1 is a hardware configuration diagram of the embedded device 100 (software update device).

[0042] The embedded device 100 includes a CPU 101 , a storage medium 102 , a volatile memory 103 , and a nonvolatile memory 104 .

[0043] The end user supplies the update file 105 (update data) to the embedded device 100 via the storage medium 102 . The embedded device 100 uses the update file 105 stored in the storage medium 102 to update the firmware 109 in the non-volatile memory 104 .

[0044] In the case of applying tamper detection technology to the protection of firmware, the end user supplies the embedded device 100 with verification data 106 for detecting tampering of the update file 105 together with the update file 105 .

[0045] When updating the firmware 109, the CPU 101 performs the following processing.

[0046] First, CPU 101 executes process A to copy update file 105 and verification data 106 existing in storage medium 102 to volatile memory 103 . Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The purpose of the present invention is to enable software to be updated safely in cases when a volatile memory serving as a working area is not sufficiently large. Accordingly, an integrated device sequentially performs verification processing with respect to each of a plurality of sections into which update data for updating software has been divided. The integrated device stores intermediate values obtained midway through the verification processing. When the verification processing for all of the sections is complete, the integrated device compares the values obtained by the verification processing with verification data to ascertain that there has been no modification. When it can be determined that there has been no modification, the integrated device sequentially performs verification processing with respect to each of the sections again. The integrated device compares the intermediate values obtained by the verification processing with the stored intermediate values, and when said values match, uses the sections to update the software.

Description

technical field [0001] The present invention relates to a technique for safely updating software such as firmware using update data. Background technique [0002] Software that defines the operation of an embedded apparatus is called firmware. [0003] By updating the firmware, correction of defects and addition of functions can be realized after the product is shipped. At this time, if the update can be performed by the end user, no product recall is required. Therefore, generally, a firmware update function performed by an end user is installed in an embedded device. [0004] The usual steps of firmware update by end user are (1) to (3) below. (1) The end user obtains update data from the manufacturer's website. (2) The update data is input to the target embedded device via wired communication or a recording medium. (3) The embedded device rewrites the firmware according to the update data. [0005] When the firmware update function is installed in the embedded devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F11/00
CPCG06F11/00G06F21/12G06F21/572G06F21/51G06F2221/033G06F8/65G06F8/71H04L9/0637H04L9/3236
Inventor 菅原健
Owner MITSUBISHI ELECTRIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products