Unlock instant, AI-driven research and patent intelligence for your innovation.

Bootloader verification extension method

An extension method, a technology of verifiers, applied in the field of electronic equipment

Pending Publication Date: 2020-05-26
TRUSTONIC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, given the limited capabilities of IoT devices, since the size of asymmetric cryptography software reserves a large fraction of the storage capacity of IoT devices for activities that are rarely performed (i.e., verification of software updates), Thus proving that the use of asymmetric cryptography is infeasible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bootloader verification extension method
  • Bootloader verification extension method
  • Bootloader verification extension method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] figure 1 A schematic diagram showing a first example method 100 for enabling a device to perform asymmetric verification of data according to the teachings of the present disclosure. The method 100 of the first embodiment includes the following steps.

[0041] At step S110, the device obtains the asymmetric verifier application from the external storage device in response to the request to verify the signature associated with the first data. The method then proceeds to step S115.

[0042] At step S115, the device loads the asymmetric verifier application. The method then proceeds to step S120.

[0043] At step S120, the device executes the asymmetric verifier application. The method then proceeds to step S130.

[0044] At step S130, the device uses the asymmetric verifier application to verify the signature associated with the first data to perform asymmetric key cryptography. The asymmetric verifier application uses one or more keys to verify the signature. The one or more...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a bootloader verification extension method. The method includes: obtaining, in response to a request to verify a signature associated with first data, an asymmetric verifier application from off-device storage; loading the asymmetric verifier application and executing the asymmetric verifier application to verify the signature associated with the first data using asymmetric-key cryptography.

Description

Technical field [0001] This technology relates to the field of electronic equipment. More specifically, the present technology relates to enabling devices to perform asymmetric verification of data. Background technique [0002] Increasingly, electronic devices are being used to access services that can involve the processing of potentially sensitive information, such as mobile banking, access to healthcare services, or the processing of employment details. In addition, with the continuous development of the Internet of Things (IoT), for example, it is becoming more common to control systems such as heating, air conditioning, or street lighting based on information provided by electronic devices. These electronic devices can provide information such as temperature data. Sensor information or proximity information indicating whether the user exists. In these scenarios, it may be important to ensure that software updates to these devices are performed safely and have not been com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/06
CPCH04L9/3247H04L9/3236H04L9/0825H04L9/06G06F21/44G06F21/575G06F21/64H04L9/0643H04L9/0891G06F21/57H04L9/3268G06F21/51G06F9/4401
Inventor 尼古拉斯·舒特
Owner TRUSTONIC