Safe software download and launch method

A software download and security technology, applied in the direction of program loading/starting, computer security devices, electrical components, etc., can solve the problem of destroying equipment security and achieve the effect of equipment security

Active Publication Date: 2019-11-12
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This download channel is also used by attackers to download illegal programs and destroy the security of the device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe software download and launch method
  • Safe software download and launch method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The safe software downloading and starting method includes a hardware verification program, a software starting program, and a download instruction processing program. The method can realize safe software download and self-starting. The device using this method stores the download flag field in the non-volatile memory; also stores the respective length fields and self-check fields of the startup program, the download program and the application program.

[0023] see figure 1 , after the device applying the safe software downloading and starting method is started, the hardware logic circuit first checks the software-implemented start-up program. This is because hardware logic circuits are less likely to be attacked by attackers than software programs, so the hardware logic circuit first checks the software-implemented startup program to ensure that the startup program has not been tampered with by an attacker. Then start the program or hardware logic circuit to read th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure software downloading and starting method. The method comprises the following steps of 1, checking a startup program realized by software by adopting a hardware logic circuit; 2, reading a downloading flag field by the startup program or the hardware logic circuit; and 3, if the downloading flag field displays that an existing device is in an application downloadable stage, checking a downloading instruction processing program by the startup program, and then executing the downloading instruction processing program; and if the downloading flag field displays that the existing device is in an application non-downloadable stage, checking an application by the startup program, and then executing the application. According to the method, attacks performed on the device by attackers through adopting different means can be resisted, so that the device security is improved.

Description

technical field [0001] The invention relates to the technical field of security chip design, in particular to a secure software downloading and starting method. Background technique [0002] An attacker can rewrite the program in the memory by means of physical attack to achieve illegal purposes. This attack is generally carried out when the device is turned off. [0003] In addition, after the equipment is produced, it is generally necessary to use different applications according to the individual needs of each user. These applications are stored in the device's non-volatile memory. This means that the device will have a download channel for users to download the application after production. [0004] This download channel is also used by attackers to download illegal programs and damage the security of the device. [0005] How to prevent these attack means and make the device more secure is the problem to be solved by the present invention. SUMMARY OF THE INVENTION ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/445G06F21/60H04L29/08
CPCG06F9/44505G06F21/606H04L67/06
Inventor 王吉健
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products