Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe starting method and device

A technology for secure boot and secure addresses, applied in computer security devices, instruments, platform integrity maintenance, etc., can solve problems such as system security impact, increase system hardware costs, trade secrets and other intellectual property leakage, and achieve improved upgradeability. performance, reducing hardware resource requirements

Pending Publication Date: 2020-12-11
HORIZON ROBOTICS SHANGHAI ARTIFICIAL INTELLIGENCE TECH CO LTD
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When chip manufacturers provide customers with SoC (System on Chip, system-on-chip) solutions, sensitive information such as data and logic codes with various security attributes are usually stored inside. If these information is cracked and obtained, it will cause Leakage of intellectual property rights such as trade secrets; at the same time, if the information is illegally modified by attackers during the system startup process, system security will be affected
On the other hand, SoC chips generally use SRAM with fast access speed as the on-chip cache. If all confidential data is read to SRAM, using a large number of SRAM storage will increase the hardware cost of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe starting method and device
  • Safe starting method and device
  • Safe starting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Hereinafter, exemplary embodiments according to the present application will be described in detail with reference to the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments of the present application. It should be understood that the present application is not limited by the exemplary embodiments described here.

[0039] Application overview

[0040] With the enhancement of chip computing and processing capabilities, embedded devices using SoC systems on chips have become the choice of computer-assisted driving, industrial Internet and other application fields. Embedded devices have the characteristics of convenient mobility, non-modification and strong real-time performance, and can be embedded in existing control systems such as transportation equipment and industrial facilities. On the other hand, due to the continuous expansion of the functions of embedded devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe starting method and device. The method comprises the steps: in a second memory, loading a second program through a first program, wherein the first program is stored ina safe address space of a first memory; loading an operating system through the second program in a common address space of a third memory; loading a third program through the second program in the safe address space of at least one of the second memory and the third memory; and reading the encrypted data in the file system of the operating system into the safe address space of the third memory through the third program. Loading and decryption of large-scale security data can be realized while hardware resource requirements of an SRAM and the like are reduced, leakage of chip security data isprevented, illegal attacks are avoided, and the security of devices such as a chip and the like is improved while the system cost is reduced.

Description

technical field [0001] The present application relates to the field of chip technology, and in particular to a secure boot method, device, multiprocessor integrated device, and computer-readable storage medium. Background technique [0002] When chip manufacturers provide customers with SoC (System on Chip, system-on-chip) solutions, sensitive information such as data and logic codes with various security attributes are usually stored inside. If these information is cracked and obtained, it will cause Leakage of intellectual property rights such as business secrets; at the same time, if the information is illegally modified by attackers during the system startup process, system security will be affected. On the other hand, SoC chips generally use SRAM with fast access speed as the on-chip cache. If all confidential data is read into SRAM, using a large amount of SRAM to store will increase the hardware cost of the system. Contents of the invention [0003] In order to sol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/60G06F21/62
CPCG06F21/575G06F21/602G06F21/6218
Inventor 张斌时朝辉
Owner HORIZON ROBOTICS SHANGHAI ARTIFICIAL INTELLIGENCE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products