Supercharge Your Innovation With Domain-Expert AI Agents!

Boot program running method and device

A technology of bootstrap and predetermined location, applied in the direction of security communication devices, computer security devices, instruments, etc., can solve problems such as increasing equipment cost, and achieve the effect of reducing equipment cost and improving equipment performance

Active Publication Date: 2018-10-09
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encrypting the BOOT program requires an additional storage device to store the decryption key, which will inevitably increase the cost of the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Boot program running method and device
  • Boot program running method and device
  • Boot program running method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The present invention will be further described in detail below in conjunction with specific embodiments and accompanying drawings. The described embodiments are some, but not all, embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0067] see figure 1 , figure 1 is a flow chart of a method for running a bootstrap program provided by an embodiment of the present invention, such as figure 1 As shown, the method includes:

[0068] S101. Read the encrypted first key from the first storage area in the external memory.

[0069] In the embodiment of the present invention, the encrypted first key is stored in the first storage area of ​​the external memory without requiring an additional memory, which is beneficial to reduce the cost of the device and further improve the performance of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a boot program running method and device. The method comprises that an encrypted first secret key is read from an external memory; the encrypted first secret key is decryptedvia a corresponding second secret key to obtain a first secret key; an encrypted version head of a boot program is read from the external memory; the encrypted version head of the boot program is decrypted via the first secret key to obtain a version head of the boot program; part of data is read from the boot program in the external memory, and a first verification value of the part of data is calculated; if the first verification value is identical with a second verification value in the version head, the part of data of the boot program is decrypted according to a third secret key; and thepart of data of the boot program is run. Thus, the encryption secret keys of the BOOT program can be encrypted and stored without extra memories, the equipment cost is reduced, and the equipment performance is improved.

Description

technical field [0001] The invention relates to the technical field of computer control, in particular to a method and device for running a boot program. Background technique [0002] At present, in an embedded system, a device generally reads a BOOT program from an external storage device to start the boot program. The external storage device directly welded in the device, if the program in the external storage device is not protected, the hacker can take advantage of the loopholes in the system to obtain the BOOT program, or solder the FLASH of the storage device, and use other devices to violently read the FLASH. BOOT program, disassemble and analyze the BOOT program and modify the BOOT program, and write it into FLASH again. [0003] In order to protect the BOOT program from being damaged, the prior art often encrypts the BOOT program. When the processor is started, the BOOT program needs to be decrypted first, and then the BOOT program is run. Encrypting the BOOT prog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0894G06F21/602G06F21/606G06F21/78
Inventor 鲍小云江坤刘怀霖
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More