Unlock instant, AI-driven research and patent intelligence for your innovation.

Firmware verification method and device

A firmware and data verification technology, applied in the computer field, can solve problems such as insufficient security verification, and achieve the effect of improving security

Active Publication Date: 2018-07-31
TSINGHUA UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this security strategy is not only limited for firmware verification, but also insufficient for security verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firmware verification method and device
  • Firmware verification method and device
  • Firmware verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0023] Validation of firmware currently relies on security policies provided by chipmakers. Chip manufacturers usually focus on whether the firmware can be booted securely, so the security policy may only be related to the boot part of the firmware. In this way, the verification of the firmware is very limited, and it is also difficult to ensure the security of the firmware. For example, Intel (Intel) usually provides boot protection (Boot Guard) specifications to ensure the safe boot of the basic input-output system (Base Input-Output System, BIOS) on its processors...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose a firmware verification method and device. The method comprises the following steps of: determining a third party public key generated by a trusted third party; verifying a signature of a data structure file on the basis of the third party public key so as to verify the credibility of the data structure file, wherein the data structure file is used for expressing an immutable area of secure firmware passing the test of the trusted third party, and the signature is obtained by the trusted third party by utilizing a third party secret key corresponding to the third party public key; and after determining that the data structure file is trusted, verifying the integrity of at least area of to-be-tested firmware by utilizing the data structure file. By adoption of the method and device, firmware can be verified more perfectly, so that the security of the firmware can be improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a method and device for verifying firmware. Background technique [0002] This section is intended to provide a background or context to embodiments of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] Firmware is between software and hardware, and it can be embedded on a chip. The security of the chip is usually controlled by the chip manufacturer. To ensure that chips can boot securely, chip manufacturers usually provide relevant security policies to verify the boot portion of the firmware. However, this security strategy not only has limitations for firmware verification, but also insufficient for security verification. Contents of the invention [0004] In order to verify the firmware more completely and improve the security of the firmware, the em...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 刘雷波朱敏魏少军
Owner TSINGHUA UNIV