System secure starting method and device, set top box and storage medium

A technology of system security and startup instructions, applied in the computer field, can solve the problems of large space consumption, waste, and consumption of storage space, and achieve the effect of occupying less storage space and avoiding consumption

Active Publication Date: 2018-05-29
SHENZHEN SKYWORTH SOFTWARE
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In embedded systems, the use of MLC / SLC NAND FLASH as program memory and data memory is more and more widely used. However, due to the limitation of its process principle, NAND FLASH often has bit inversion with the change of use time and environment. If it is As long as there is an uncorrectable bit reversal in the program area, the entire system will not be able to start and recover
[0003] At present, in order to solve the above problems, dual systems or dual backups are used, but this method needs to consume double the storage space, resulting in large space consumption and waste

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System secure starting method and device, set top box and storage medium
  • System secure starting method and device, set top box and storage medium
  • System secure starting method and device, set top box and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It is a flow chart of a method for securely starting a system provided by Embodiment 1 of the present invention. This embodiment is applicable to the secure startup of an embedded system in a smart terminal, especially for the secure startup of an embedded system in a smart set-top box. The method can be executed by the device for system security startup provided by the embodiment of the present invention, and the device can be realized by software and / or hardware. The method specifically includes:

[0031] S110. According to the startup instruction, load the data in the program area, and detect whether there is any abnormal data in the data in the program area.

[0032] Wherein, the starting instruction may be an instruction generated by turning on a power switch on the device, where the device may be a set-top box. After the set-top box receives the startup instruction, it starts to load the data in the program area, wherein the data in the program area ref...

Embodiment 2

[0052] image 3 It is a schematic structural diagram of a system security startup device provided in Embodiment 2 of the present invention, and the device specifically includes:

[0053] The data loading module 210 is used to load the program area data according to the startup instruction;

[0054] An abnormal data detection module 220, configured to detect whether there is abnormal data in the data in the program area;

[0055] The stripe information determination module 230 is configured to determine the stripe information of the current disk array stripe where the abnormal data is located if there is abnormal data;

[0056] The target verification data determination module 240 is used to determine the target verification data that matches the stripe information among the plurality of verification data that are cyclically played in the broadcast network, and the verification data is determined in advance according to the standard program area data;

[0057] A data recovery...

Embodiment 3

[0071] The third example of this embodiment provides a set-top box. Figure 4 It is a schematic structural diagram of a set-top box provided in Embodiment 3 of the present invention. see Figure 4 , the set-top box includes:

[0072] one or more processors 310;

[0073] memory 320, for storing one or more programs;

[0074] When the one or more programs are executed by the one or more processors 310, the one or more processors 310 implement the system security boot method proposed in the embodiment of the present invention.

[0075] Figure 4 Take a processor 310 as an example; the processor 310 and the memory 320 can be connected through a bus or in other ways, Figure 4 Take connection via bus as an example.

[0076] The memory 320, as a computer-readable storage medium, can be used to store software programs, computer-executable programs and modules, such as program instructions / modules corresponding to the system security startup method in the embodiment of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a system secure starting method and device, a set top box and a storage medium. The method comprises the steps that program area data is loaded according to astarting instruction, and whether the program area data comprises abnormal data is detected; if the abnormal data exists, band information of the abnormal data is determined; target verification datamatched with the band information is determined from multiple pieces of verification data cyclically played in a broadcast network, wherein the verification data is pre-determined according to standard program area data; and the abnormal data is recovered according to the target verification data, and the program area data obtained after recovery is loaded. The embodiment guarantees secure starting of a system, meanwhile, the verification data is played in the broadcast network, a small storage space is occupied, and consumption of the storage space is avoided.

Description

technical field [0001] Embodiments of the present invention relate to computer technology, and in particular to a method, device, set-top box and storage medium for securely starting a system. Background technique [0002] In embedded systems, the use of MLC / SLC NAND FLASH as program memory and data memory is more and more widely used. However, due to the limitation of the process principle of NAND FLASH, bit inversion often occurs with the change of use time and environment. If it is As long as there is an uncorrectable bit reversal in the program area, the entire system will not be able to start and recover. [0003] At present, in order to solve the above problems, dual systems or dual backups are set, but this method needs to consume twice as much storage space, resulting in large space consumption and waste. Contents of the invention [0004] The invention provides a method, device, set-top box and storage medium for system safe startup, so as to realize both system ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445G06F11/14H04N21/81
CPCG06F9/44505G06F11/1446H04N21/8166
Inventor 韩之光
Owner SHENZHEN SKYWORTH SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products