Unlock instant, AI-driven research and patent intelligence for your innovation.

Chip and method of starting the chip

A chip, a technology after startup, applied in the computer field, can solve problems such as being unable to be modified

Active Publication Date: 2020-12-22
HUAWEI TECH CO LTD
View PDF32 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a chip and a method for starting the chip, which can solve the problem that part of the BootROM code (that is, the code that executes the security verification strategy) cannot be modified after the chip is taped out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chip and method of starting the chip
  • Chip and method of starting the chip
  • Chip and method of starting the chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The technical solution in this application will be described below with reference to the accompanying drawings.

[0058] figure 1 is a schematic diagram of a system-on-a-chip suitable for this application.

[0059] Such as figure 1 As shown, the system 100 includes an internal read-only memory (internal read-only memory, IROM) 110, an internal static random access memory (internal static random access memory, ISRAM) 120, a flash memory (flash) controller 130, a flash memory 140, a synchronous dynamic Random access memory (synchronous dynamic random access memory, SDRAM) controller 150 , SDRAM 160 , electronic fusion memory (eFuse) 170 and core (core) 180 .

[0060] Wherein, IROM110, ISRAM120, flash memory controller 130, SDRAM controller 150, eFuse170 and core 180 are located on the same chip, and flash memory 140 and SDRAM160 can be located on this chip, also can be located outside this chip, for example, be located at cloud server or On the single board in the stor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A chip is provided. The chip includes: a boot engine for solidifying boot code booting boot code, or for booting the chip based on logic information solidified in the boot engine, wherein the boot code or logic information is also used to verify the security of the first piece of firmware stored outside the boot engine based on the verify information, wherein the first piece of firmware is the code for executing the first security check policy after the chip is started; a programmable memory which is used to store the check information. Since the first piece of firmware is stored outside the booting engine, it is not necessary to solidify the first piece of firmware in the chip during the streaming. Therefore, if the first piece of firmware needs to be modified after the tape is completed,there is no need to re-spin the film. The first piece of firmware can be modified to solve the problems mentioned in the background art.

Description

technical field [0001] The present application relates to the field of computers, in particular to a chip and a method for starting the chip. Background technique [0002] A chip is a key component of a computer system, which can control the operation of the computer system and read data. Therefore, the security of the chip plays a vital role in the normal operation of the computer system and the confidentiality of data. As the brain of the chip, the firmware controls the operation of the chip. Once the firmware is tampered with or implanted with malicious code, the security of the data cannot be guaranteed. Therefore, the key to ensuring the security of the chip is to ensure the security of the firmware. [0003] One method of verifying the security of firmware is to verify the security of firmware through an asymmetric encryption algorithm (for example, Rivest-Shamir-Adleman (RSA) algorithm). The basic idea is to use the code in the boot read-only memory (BootROM) solidif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/4401G06F21/57
CPCG06F9/4401G06F21/575
Inventor 蔡恒伊万西尔维乌弗勒斯恰努
Owner HUAWEI TECH CO LTD