Security chip-based trusted startup method
A security chip and secure boot technology, applied in computer security devices, instruments, platform integrity maintenance, etc. problems, to achieve the effect of simplifying the difficulty of hardware design, reducing the difficulty of development, and reducing overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0034] Example
[0035] figure 1 It is a flowchart of a specific implementation manner of a trusted boot method based on a secure chip of the present invention. Such as figure 1 As shown, the specific steps of the secure chip-based trusted boot method of the present invention include:
[0036] S101: BootLoader division:
[0037] Boot Loader is a program that runs before the operating system kernel runs. Through this program, hardware devices can be initialized and a map of memory space can be established to bring the system's software and hardware environment to a proper state for the final call operation The system kernel prepares the correct environment. In the present invention, according to the different functions of each part in the safe boot process, the BootLoader is divided into 6 parts, namely BL1 program, BL2 program, BL30 program, BL31 program, BL32 program, BL33 program, and BL1 program is used for setting Exception vector table, initialize cpu, set mmu, set control re...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap