Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and apparatus for boot firmware refreshing

A firmware and image file technology, applied in computer security devices, software deployment, instruments, etc., can solve problems such as incomplete integrity verification, inability to know the security of image files, and unreliable encryption algorithms.

Inactive Publication Date: 2019-01-04
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these verification methods have problems such as unreliable encryption algorithms and incomplete integrity verification. Correspondingly, based on these verification methods, the security of the image file of the boot firmware cannot be reliably guaranteed. After mirroring the image file, it may still be impossible to accurately know whether the image file is safe, which may cause users to use the unsafe image file to refresh the boot firmware without knowing it.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and apparatus for boot firmware refreshing
  • A method and apparatus for boot firmware refreshing
  • A method and apparatus for boot firmware refreshing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051]In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0052] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of this application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the application discloses a bootstrap firmware refreshing method. The server calculates the digital signature corresponding to the original data in the first mirror file by using thedigital signature calculation script and the private key, and stores the public key corresponding to the private key in the memory chip to turn on the write protection of the memory chip; the digitalsignature and the first image file are sent to the client. After the client receives the digital signature and the first image file, the client obtains the public key from the memory chip protected by writing, decrypts the digital signature by using the public key and the digital signature decryption tool, and obtains the first hash value corresponding to the digital signature. A hash algorithm is used to hash the original data in the first mirror file to obtain a second hash value, and whether the first hash value is consistent with the second hash value is compared. If the first hash valueis consistent, the boot firmware can be refreshed according to the first mirror file. The method and apparatus prevents the client from refreshing the boot firmware with the tampered image file, and ensures the security of the boot firmware refresh.

Description

technical field [0001] The present application relates to the technical field of firmware security, in particular to a method and device for guiding firmware refresh. Background technique [0002] When the server and personal computer are started, they need to rely on the boot firmware to establish the association between the operating system and the device hardware, so that when the server and personal computer are working normally, the hardware device can respond to the instructions issued by the operating system, perform corresponding operations, and operate The system can receive the signal sent by the hardware device and process the signal accordingly. It can be seen that the boot firmware plays an important connecting role between the server and the personal computer. [0003] Today, with the rapid upgrade of the operating system and high requirements for multiple hardware configurations, the update of the boot firmware has become more frequent. Usually, the client up...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/65G06F21/62
CPCG06F8/65G06F21/6209
Inventor 赵媛
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD