Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe starting method and device and terminal

A technology for secure boot and program startup, applied in the field of information security, to achieve the effect of ensuring data integrity and security

Inactive Publication Date: 2018-06-29
北京和利时控制技术有限公司
View PDF8 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the secure boot verification function in this solution is implemented by the embedded processor executing the code in the external boot ROM, that is, the code in the external boot ROM is legal by default, created offline, and runs directly after power-on without further verification.
If the content in this ROM is tampered with or the ROM hardware is illegally replaced with ROM hardware containing illegal codes, the processor will still execute the codes in the ROM after power-on, which is a blind area for security verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe starting method and device and terminal
  • Safe starting method and device and terminal
  • Safe starting method and device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0034] Such as figure 2 Shown, according to a kind of safe starting method of the present invention, comprises the following steps:

[0035] Step 201: After the processor is powered on, the programmable device controls the processor to enter a reset state;

[0036] Further, the programmable device may be a field programmable gate array (Field Programmable GateArray, FPGA), or other programmable logic devices, such as a complex programmable logic device (Complex Programmable Logic Device, CPLD).

[0037] Specifically, the programmable device controls the processor to enter ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe starting method. The safe starting method comprises the following steps: after a processor is electrified, controlling the processor to enter a resetting state by a programmable device; reading a to-be-loaded starting program and a to-be-loaded application program by the programmable device, and verifying whether the starting program and the application program are legal or not; if the starting program and the application program are legal, controlling the processor to enter a non-resetting state by the programmable device, and loading the starting program and the application program to begin to execute by the processor; and if at least one of the starting program and the application program is not legal, controlling the processor to maintain a resetting state by the programmable device. The invention further discloses a safe starting device and a terminal. The independent programmable device is used for verifying whether the to-be-loaded starting programand the to-be-loaded application program of the processor are legal or not, the verification and execution of codes of the processor are isolated completely, an independent data verifying channel isconstructed, and data integrity and safety in a terminal starting process are ensured.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and device for secure startup, and a terminal. Background technique [0002] Such as figure 1 As shown, in the power-on process of a traditional programmable logic controller (Programmable Logic Controller, PLC) processor, after the reset chip resets the processor, the processor directly reads from the non-volatile memory (usually flash memory (Flash) Chip) loads the startup program and executes the application program, and does not verify the legitimacy of these programs. This is a weak point in the integrity of information security. If the program code in Flash is tampered with in an unauthorized way, the PLC processor does not verify Under normal circumstances, loading and running will cause unexpected behavior, and in severe cases, the on-site production equipment will be in a dangerous operating state. [0003] In the application with the publ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/12G06F9/445G06F1/24G06F21/64
CPCG06F1/24G06F9/44521G06F21/121G06F21/445G06F21/64G06F2221/2141
Inventor 李根旺李蒙李宗杰
Owner 北京和利时控制技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products