Supercharge Your Innovation With Domain-Expert AI Agents!

A software security startup method and system for software for V2X devices

A software security and equipment technology, applied in software deployment, computer security devices, program loading/starting, etc., can solve the problems of malicious modification of Linux system, affecting the normal operation of V2X equipment, implanting illegal applications, etc., to ensure legality and integrity, eliminate potential safety hazards, and ensure the effect of safe operation

Active Publication Date: 2022-08-09
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the Bootloader is maliciously tampered with, the Linux system is at risk of being maliciously tampered with and implanted with illegal applications, seriously affecting the normal operation of V2X devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A software security startup method and system for software for V2X devices
  • A software security startup method and system for software for V2X devices
  • A software security startup method and system for software for V2X devices

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0052] like figure 1 As shown, this embodiment provides a software security startup method for a V2X device, which is characterized in that it includes the following steps:

[0053] S1: When the V2X device is started, the security processor in the V2X device is started first, and the reset signal of the application processor is controlled by the security processor.

[0054] Specifically, when the V2X device is ready to start, it starts from the security processor first, and controls the reset signal of the application processor through the security processor, so that the application processor cannot be started until the security verification of the security processor is completed.

[0055] S2: The security processor reads the encrypted Bootloader of the application processor, decrypts the encrypted Bootloader, and verifies the signature data of the encrypted Bootloader at the same time, and caches the plaintext after the verification is passed. The bootloader releases the res...

no. 2 example

[0076] like Figure 8 As shown, this embodiment provides a corresponding software secure booting system for a V2X device for executing the method in the first embodiment, including:

[0077] The reset signal control module is used to preferentially start the security processor in the V2X device when the V2X device is started, and control the reset signal of the application processor through the security processor.

[0078] Bootloader signature verification module is used to provide the security processor to read the encrypted Bootloader of the application processor, decrypt the encrypted Bootloader, and verify the signature data of the encrypted Bootloader at the same time, After the verification is passed, the bootloader that caches the plaintext releases the reset signal of the application processor. After the reset signal is released, the application processor starts to start and reads the cached plaintext Bootloader from the security processor. .

[0079] The Linux kerne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of software security, and provides a software security startup method and system for a V2X device. The method includes: starting the security processor preferentially and controlling the reset signal of the application processor; the security processor reads the application processor The encrypted Bootloader decrypts and verifies the signature data. After the verification is passed, the Bootloader of the plaintext is cached, and the reset signal of the application processor is released. The application processor starts to start and reads the cached plaintext Bootloader from the security processor; The bootloader of the application processor reads the Linux kernel image data and its signature data, verifies the signature data of the Linux kernel image, and starts the Linux kernel after the verification is passed; verifies the hash_table signature of dm‑verity, and continues to run after the verification is passed V2X devices. In the startup process, signature verification is performed step by step, and a signature verification method is also proposed for software update operations, so that V2X devices can run safely and reliably.

Description

technical field [0001] The invention relates to the technical field of software security, in particular to the technical field of software security startup of V2X devices in the Internet of Vehicles. Specifically, a software security boot method and system for V2X devices are provided. Contains secure boot and updates for the bootloader, Linux kernel and filesystem. Background technique [0002] With the continuous development of the Internet of Vehicles technology, there are more and more V2X devices. The so-called V2X is exactly the same as the popular B2B and B2C, which means vehicle to everything, that is, the exchange of information between vehicles and the outside world. The Internet of Vehicles has established a new development direction of automobile technology by integrating global positioning system (GPS) navigation technology, vehicle-to-vehicle communication technology, wireless communication and remote sensing technology, and has achieved compatibility between...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F8/63G06F8/65G06F9/445G06F21/51G06F21/602G06F21/64G06F2221/2107
Inventor 许小波周玉洁谭永伟
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More