CN115481405A - Safe starting and optimized upgrading method of embedded system - Google Patents
Safe starting and optimized upgrading method of embedded system Download PDFInfo
- Publication number
- CN115481405A CN115481405A CN202211166660.8A CN202211166660A CN115481405A CN 115481405 A CN115481405 A CN 115481405A CN 202211166660 A CN202211166660 A CN 202211166660A CN 115481405 A CN115481405 A CN 115481405A
- Authority
- CN
- China
- Prior art keywords
- upgrading
- upgrade
- file
- kernel
- starting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The invention relates to a safe starting and optimized upgrading method of an embedded system, belonging to the field of embedded operating systems. The invention sets a check method in the bootstrap program, when loading or upgrading the kernel image file and the root file system, the check of the safety certification is carried out, and the legal validity of the file is confirmed, and sets a check method in the bootstrap program, when loading or upgrading the kernel image file and the root file system, the check of the safety certification is carried out, and the legal validity of the file is confirmed. The invention solves the problem of safe starting of the system; 2. the illegal starting or upgrading of the system is avoided, and the stored content is obtained or tampered; the polling upgrading process in an unattended state is optimized, and the upgrading time is shortened; the polling or man-machine interaction mode can be selected according to the situation.
Description
Technical Field
The invention belongs to the field of embedded operating systems, and particularly relates to a safe starting and optimized upgrading method of an embedded system.
Background
The traditional embedded operating system uses system boot (UBOOT, PMON or UEFI) to start loading operating system kernel files from a storage device (FLASH, a magnetic disk, a U disk or a network node) to a specified memory, and then directly jumps to the specified memory for running; the traditional method for upgrading the embedded system is to copy and transmit the data to a local disk fixed partition through a network or a USB flash disk, then reset and restart the system, and cover the currently started system by using an upgrading file in the disk.
The traditional embedded operating system has no safe and reliable characteristic when started, and the kernel file of the system in the storage device is easy to be tampered and replaced; after the traditional embedded operating system is started by using an illegal kernel, other files in the operating system can be acquired or tampered randomly; the file system of the traditional embedded operating system is generally large, the upgrading time is long, the risk of abnormity or power failure in the process is high, and the upgrading failure is easy to cause system crash.
Disclosure of Invention
Technical problem to be solved
The invention provides a safe starting and optimized upgrading method of an embedded system, and aims to solve the problems that a traditional embedded operating system cannot have safe and reliable characteristics when started, a file system is generally large, the upgrading time is long, the risk of abnormity or power failure in the process is high, the upgrading is easy to fail, and the system is easy to crash.
(II) technical scheme
In order to solve the technical problem, the invention provides a method for safely starting and optimally upgrading an embedded system, which comprises the following steps:
s1: setting a legal check value; embedding a section of check program in the bootstrap program, and designating a storage position of a legal check value when the bootstrap program is manufactured and reading the legal check value by the bootstrap program;
s2: verifying the legality of a system file, wherein the system file comprises a kernel mirror image file and a root file system; firstly, a bootstrap program reads a check code customized in header information in a system file and compares the check code with a legal check value; secondly, verifying the validity and legality of the system file; if the system is legal and effective, upgrading or starting system operation; if the verification is illegal, the operator is determined to be an illegal user, and the system is started or upgraded unsuccessfully;
and S3, upgrading the system file or starting system operation in a polling or man-machine interaction mode under the guidance of the bootstrap program.
Further, the legal check value is embedded in the boot program code to generate the boot program together, or is written to a fixed address of the nonvolatile memory area.
Further, the nonvolatile storage area is FLASH or EEPROM.
Further, in the step S2, the comparison method uses a digital signature or a trusted platform module.
Further, when a polling method is adopted, an upgrade configuration file needs to be used, the upgrade configuration file is stored in a specified directory of a local disk, and the stored information includes: the kernel upgrading flag information, the path of the upgrading storage area, the root file system upgrading flag information, the upgrading mode and the path of the upgrading storage area are obtained, and the bootstrap program reads the information in the upgrading configuration file to determine the next operation.
Further, the upgrade storage area includes a spare partition of a local disk, a usb disk, a flash, or a network node.
Furthermore, the upgrading mode comprises complete upgrading or custom upgrading, and the custom upgrading only has a small amount of files needing to be modified and added, and is much smaller than the data size of the complete upgrading.
Further, in step S3, upgrading the system file or starting the system operation in a polling manner specifically includes the following steps:
s11: starting up, reading a kernel upgrading mark at a bootstrap stage, and judging whether the kernel has upgrading requirements; if the kernel needs to be upgraded, reading a kernel image file to be upgraded from an upgrade storage area appointed in the upgrade configuration file, verifying the validity of the check code, and if the check code is valid, replacing the kernel image file in the system; if the kernel upgrade is completed or the verification is not passed, clearing the kernel upgrade flag and entering the next step, and if no kernel upgrade requirement exists, directly entering the next step;
s12: reading a root file system upgrading mark of an upgrading configuration file, judging whether a root file system upgrading requirement exists or not, and judging the upgrading type, namely comprehensive upgrading or custom upgrading if the root file system upgrading requirement exists; if the upgrade is comprehensive, reading the files to be upgraded from the upgrade storage area, and covering all the currently related files after passing legal inspection; if the upgrade is the user-defined upgrade and the legal verification is successful, reading an upgrade list in the configuration file and starting corresponding upgrade operation; after the upgrade is finished or the verification fails, clearing the upgrade mark of the root file system and entering the next step, and if the upgrade of the root file system is not needed, directly entering the next step;
s13: after the upgrading work is finished, starting the embedded operating system, and checking the kernel image file in the local storage; if the code is legal, starting the system; otherwise, the system is restarted or the system returns to the man-machine interaction state of the bootstrap program.
Further, if the user has an interactive updating demand, a man-machine interaction mode is used: and in the man-machine interaction state of the bootstrap program, receiving a command, wherein the command is kernel image file upgrading, root file system upgrading or system starting, reading files from a designated storage area when entering each function, if legal verification passes, continuing operation, and returning to the man-machine interaction state when operation is completed or verification fails.
Further, in step S3, upgrading the system file or starting the system operation in a human-computer interaction manner specifically includes the following steps:
s21: receiving a command in a man-machine interaction state of a bootstrap program, wherein the command is kernel image upgrading, root file system upgrading or operating system starting, and if the command is kernel image upgrading, entering S22; if the file system is updated, entering S23; if the operation system is started, entering S24;
s22: reading a kernel image file to be upgraded from a storage area to be upgraded or a storage position specified in a command, checking validity, and if the kernel image file is valid, replacing the kernel image file in the system; if the kernel is upgraded or the verification is not passed, returning to the human-computer interaction state;
s23: reading a root file system file to be upgraded from an upgrade storage area or a storage position appointed in a command, checking validity, determining whether the upgrade is complete or custom upgrade according to the command, starting the upgrade, and returning to a human-computer interaction state if the upgrade of the root file system is completed or the file verification is not passed;
s24: and starting a system command, reading the kernel image file from a storage position specified by a local disk or a command line, checking the validity, passing the check, starting the system, failing the check, and returning to a human-computer interaction state.
(III) advantageous effects
The invention provides a safe starting and optimized upgrading method of an embedded system, and the starting process in the invention has the following advantages:
1. the problem of safe starting of the system is solved;
2. the illegal starting or upgrading of the system is avoided, and the stored content is obtained or tampered;
3. the polling upgrading process in the unattended state is optimized, and the upgrading time is shortened.
4. The polling or man-machine interaction mode can be selected according to the situation.
The invention solves the problem of safe starting of the system, and confirms the legal validity of the kernel mirror image and the root file system through the check code, thereby avoiding illegal starting or upgrading of the system and obtaining or tampering the stored content; meanwhile, the upgrading process is optimized, under a general condition, the root file system can be quickly upgraded only by using a user-defined system, the upgrading time is greatly shortened, risks are avoided, developers and users can select the root file system in a diversified manner, and polling or man-machine interaction is used according to situations.
Drawings
FIG. 1 is a flowchart of the polling operation of the secure boot and optimization upgrade of the present invention;
FIG. 2 is a flow chart of the man-machine interaction work flow of the secure boot and optimization upgrade of the present invention.
Detailed Description
In order to make the objects, contents and advantages of the present invention more apparent, the following detailed description of the present invention will be made in conjunction with the accompanying drawings and examples.
Aiming at the defects and shortcomings of the starting and upgrading of the existing embedded operating system, the safe starting and optimizing upgrading method of the embedded operating system is designed by taking the starting and upgrading process of the operating system as a research object. The embedded operating system mainly comprises two parts: kernel mirror image files, root file systems. The method includes the steps that a section of checking program is inserted into a system bootstrap program, and the program can verify the legal validity of a kernel image file; in addition, an automatic polling upgrading mode or a manual interaction upgrading mode can be selected according to the situation, so that the safe starting of the embedded operating system is realized, the phenomenon that other people use the tampered kernel image file and root file system is avoided, the operating system is started, the files in the storage device are read at will, and even the system files and configuration are tampered maliciously is avoided. Meanwhile, as the complete root file system comprises a large number of binary programs, library files, configuration files, help files and the like, the complete root file system is more and more huge as the function of the operating system is more and more complete. Therefore, under the condition of unnecessary complete upgrade, a user-defined upgrade method can be used, wherein the user-defined upgrade means that a file list needing to be upgraded is set in an upgrade configuration file, and then only corresponding files in the configuration list are upgraded according to the configuration list, for example, only a few library files or configuration files are upgraded, so that the purpose of improving the upgrade efficiency is achieved, the situation that a user waits for the upgrade for a long time is avoided, and meanwhile, the risk of upgrade failure or system crash caused by power failure or other abnormalities in the upgrade process of the system can be reduced.
The invention can realize the safe start of the system, protect the system information and simultaneously ensure the safety and reliability of the system upgrade. The method for realizing the design of the invention is that a verification method is arranged in a bootstrap program, when a kernel image file and a root file system are loaded or upgraded, the verification of security authentication is carried out, the legal validity of the file is confirmed, the later mentioned security verification is explained in a unified way, and the specific steps are as follows:
s1: and setting a legal check value. Embedding a section of check program in the bootstrap program, and designating a storage position of a legal check value when the bootstrap program is manufactured and reading the legal check value by the bootstrap program;
the legal check value can be embedded into a bootstrap code to generate a bootstrap program together, and can also be written into a fixed address of a nonvolatile storage area (FLASH or EEPROM);
s2: and checking the legality of a system file, wherein the system file comprises a kernel mirror image file and a root file system. Firstly, the bootstrap program reads the check code customized in the header information in the system file, and compares the check code with the legal check value, and the comparison method can use the existing security authentication algorithm, such as: digital signatures, trusted platform modules, and the like. And secondly, verifying the validity and the legality of the system file. If the validity is valid, upgrading or starting system operation is carried out; if the verification is illegal, the operator is determined as an illegal user, and the system is started or upgraded unsuccessfully.
And S3, upgrading the system file or starting system operation in a polling or man-machine interaction mode under the guidance of the bootstrap program.
The invention optimizes the system upgrading process, shortens the optimization time and improves the upgrading efficiency. The program inserted in the boot program supports two ways: polling and human-computer interaction.
In the case of unattended operation, it is desirable to automatically complete the upgrade and system start-up functions, and a polling method may be used. When the method is adopted, an upgrade configuration file is needed, the upgrade configuration file is stored in a specified directory of a local disk, and the stored information comprises: kernel upgrade flag information, and upgrade the path of a storage area (a standby partition of a local disk, a USB flash disk, a flash disk or a network node); the upgrade flag information of the root file system, the upgrade mode (complete upgrade or custom upgrade), and the path of the upgrade storage area. The bootstrap program determines the next operation by reading the information in the upgrade configuration file. Because the user-defined upgrading only has a small amount of files to be modified and added, and the data volume is much smaller than that of the complete upgrading, the upgrading time of the root file system can be shortened, and the upgrading efficiency of the root file system is improved.
If the user has the interactive updating requirement, the automatic polling can be interrupted, the upgrading configuration file is not used, and a man-machine interaction mode is used: in the man-machine interaction state of the bootstrap program, a command is received, the command can be kernel image file upgrading, root file system upgrading or system starting, when each function is entered, files are read from a designated storage area, if legal verification is passed, operation is continued, and if the operation is completed or the verification is not passed, the man-machine interaction state is returned.
The polling method of the invention comprises the following steps.
S11: starting up, reading the kernel upgrading mark in the stage of guiding the program, and judging whether the kernel has upgrading requirements. If the kernel needs to be upgraded, reading a kernel image file to be upgraded from an upgrading storage area appointed in the upgrading configuration file, verifying the validity of the check code, and if the check code is valid, replacing the kernel image file in the system; if the kernel upgrading is completed or the verification is not passed, clearing the kernel upgrading mark and entering the next step, and if no kernel upgrading requirement exists, directly entering the next step;
s12: reading a root file system upgrading mark of the upgrading configuration file, judging whether a root file system upgrading requirement exists, if so, judging the upgrading type, and whether the upgrading is comprehensive upgrading or custom upgrading. If the upgrade is complete, reading the file to be upgraded from the upgrade storage area, and covering all the currently related files after passing legal inspection; if the upgrade is the user-defined upgrade, after the legal verification is successful, reading an upgrade list in the configuration file, and starting corresponding upgrade operation. After the upgrade is completed or the verification fails, the upgrade flag of the root file system is cleared and the next step is carried out, if the upgrade of the root file system is not needed, the next step is directly carried out;
s13: and when the upgrading work is finished, starting the embedded operating system and verifying the kernel image file in the local storage. If the code is legal, starting the system; otherwise, the system is restarted or the system returns to the man-machine interaction state of the bootstrap program.
If there is an interactive updating requirement, a man-machine interaction mode can be used, and the steps are analyzed as follows:
s21: receiving a command in a man-machine interaction state of a bootstrap program, wherein the command can be kernel image upgrading, root file system upgrading or operating system starting, and if the command is kernel image upgrading, entering S22; if the file system is updated, entering S23; if the operation system is started, entering S24;
s22: reading a kernel image file to be upgraded from a storage area to be upgraded or a storage position appointed in the command, checking the validity, and replacing the kernel image file in the system if the kernel image file is valid; if the kernel is upgraded or the verification is not passed, returning to the human-computer interaction state;
s23: reading a root file system file to be upgraded from an upgrading storage area or a storage position appointed in a command, checking validity, determining whether the upgrading is complete or custom upgrading according to the command, starting the upgrading, and returning to a human-computer interaction state if the upgrading of the root file system is completed or the file verification is not passed;
s24: and starting a system command, reading the kernel image file from a storage position specified by a local disk or a command line, checking the validity, passing the check, starting the system, failing the check, and returning to a human-computer interaction state.
The starting process in the invention has the following advantages:
1. the problem of safe starting of the system is solved;
2. the illegal starting or upgrading of the system is avoided, and the stored content is obtained or tampered;
3. the polling upgrading process in the unattended state is optimized, and the upgrading time is shortened.
4. The polling or man-machine interaction mode can be selected according to the situation.
The invention solves the problem of safe starting of the system, and the legal validity of the kernel mirror image and the root file system is confirmed through the check code, thereby avoiding illegal starting or upgrading of the system and obtaining or tampering the stored content; meanwhile, the upgrading process is optimized, under a general condition, the root file system can be quickly upgraded by only using a user-defined system, the upgrading time is greatly shortened, risks are avoided, developers and users can select the root file system in various ways, and polling or man-machine interaction is used according to situations.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.
Claims (10)
1. A safe starting and optimized upgrading method for an embedded system is characterized by comprising the following steps:
s1: setting a legal check value; embedding a section of check program in the bootstrap program, designating a storage position of a legal check value when the bootstrap program is manufactured, and reading by using the bootstrap program;
s2: verifying the legality of a system file, wherein the system file comprises a kernel mirror image file and a root file system; firstly, a bootstrap program reads a check code customized in header information in a system file and compares the check code with a legal check value; secondly, verifying the validity and legality of the system file; if the validity is valid, upgrading or starting system operation is carried out; if the verification is illegal, the operator is determined to be an illegal user, and the system is started or upgraded unsuccessfully;
and S3, upgrading the system file or starting system operation in a polling or man-machine interaction mode under the guidance of the bootstrap program.
2. A method for secure boot and optimized upgrade of an embedded system according to claim 1, characterized in that the legal check value is embedded in the boot program code to generate the boot program together or to be written to a fixed address of the non-volatile memory area.
3. The secure booting and optimization upgrade method of an embedded system as claimed in claim 2, characterized in that the nonvolatile memory area is FLASH or EEPROM.
4. The method for secure boot and optimized upgrade of an embedded system according to claim 1, wherein in step S2, the comparison method uses a digital signature or a trusted platform module.
5. The secure booting and optimization upgrading method of the embedded system according to any one of claims 1 to 4, characterized in that when the polling method is adopted, an upgrading configuration file is needed, the upgrading configuration file is saved in a specified directory of a local disk, and the saved information includes: the kernel upgrading flag information, the path of the upgrading storage area, the root file system upgrading flag information, the upgrading mode and the path of the upgrading storage area are obtained, and the bootstrap program reads the information in the upgrading configuration file to determine the next operation.
6. The secure boot and optimized upgrade method for an embedded system according to claim 5, wherein the upgrade storage area comprises a spare partition of a local disk, a USB flash disk, a flash disk, or a network node.
7. The secure boot and optimization upgrade method for an embedded system according to claim 5, wherein the upgrade mode comprises a full upgrade or a custom upgrade, the custom upgrade has only a few files to be modified and added, and the data size is much smaller than the full upgrade.
8. The secure boot and optimized upgrade method for an embedded system according to claim 5, wherein in step S3, the upgrading of the system file or the booting of the system operation by polling specifically includes the following steps:
s11: starting up, reading a kernel upgrading mark at a bootstrap stage, and judging whether the kernel has upgrading requirements; if the kernel needs to be upgraded, reading a kernel image file to be upgraded from an upgrade storage area appointed in the upgrade configuration file, verifying the validity of the check code, and if the check code is valid, replacing the kernel image file in the system; if the kernel upgrading is completed or the verification is not passed, clearing the kernel upgrading mark and entering the next step, and if no kernel upgrading requirement exists, directly entering the next step;
s12: reading a root file system upgrading mark of an upgrading configuration file, judging whether a root file system upgrading requirement exists or not, and judging the upgrading type, namely comprehensive upgrading or custom upgrading if the root file system upgrading requirement exists; if the upgrade is comprehensive, reading the files to be upgraded from the upgrade storage area, and covering all the currently related files after passing legal inspection; if the upgrade is the user-defined upgrade and the legal verification is successful, reading an upgrade list in the configuration file and starting corresponding upgrade operation; after the upgrade is finished or the verification fails, clearing the upgrade mark of the root file system and entering the next step, and if the upgrade of the root file system is not needed, directly entering the next step;
s13: after the upgrading work is finished, starting the embedded operating system, and verifying the kernel image file in the local storage; if the code is legal, starting the system; otherwise, the system is restarted or the human-computer interaction state of the bootstrap program is returned.
9. A method for secure boot and optimized upgrade of an embedded system according to any of claims 1-4, characterized in that if the user has interactive update needs, a man-machine interaction is used: and in the man-machine interaction state of the bootstrap program, receiving a command, wherein the command is kernel image file upgrading, root file system upgrading or system starting, reading files from a designated storage area when entering each function, if legal verification passes, continuing operation, and returning to the man-machine interaction state when operation is completed or verification fails.
10. The method for secure boot and optimized upgrade of an embedded system according to claim 9, wherein in step S3, upgrading a system file or booting a system operation in a human-computer interaction manner specifically comprises the steps of:
s21: receiving a command in a man-machine interaction state of a bootstrap program, wherein the command is kernel image upgrading, root file system upgrading or operating system starting, and if the command is kernel image upgrading, entering S22; if the file system is updated for the root file system, entering S23; if the operation system is started, entering S24;
s22: reading a kernel image file to be upgraded from a storage area to be upgraded or a storage position specified in a command, checking validity, and if the kernel image file is valid, replacing the kernel image file in the system; if the kernel is upgraded or the verification is not passed, returning to the human-computer interaction state;
s23: reading a root file system file to be upgraded from an upgrading storage area or a storage position appointed in a command, checking validity, determining whether the upgrading is complete or custom upgrading according to the command, starting the upgrading, and returning to a human-computer interaction state if the upgrading of the root file system is completed or the file verification is not passed;
s24: and starting a system command, reading the kernel image file from a storage position specified by a local disk or a command line, checking the validity, passing the check, starting the system, failing the check, and returning to a human-computer interaction state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211166660.8A CN115481405A (en) | 2022-09-23 | 2022-09-23 | Safe starting and optimized upgrading method of embedded system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211166660.8A CN115481405A (en) | 2022-09-23 | 2022-09-23 | Safe starting and optimized upgrading method of embedded system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115481405A true CN115481405A (en) | 2022-12-16 |
Family
ID=84393250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211166660.8A Pending CN115481405A (en) | 2022-09-23 | 2022-09-23 | Safe starting and optimized upgrading method of embedded system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115481405A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117009982A (en) * | 2023-09-26 | 2023-11-07 | 统信软件技术有限公司 | Image file security verification method and device, electronic equipment and storage medium |
-
2022
- 2022-09-23 CN CN202211166660.8A patent/CN115481405A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117009982A (en) * | 2023-09-26 | 2023-11-07 | 统信软件技术有限公司 | Image file security verification method and device, electronic equipment and storage medium |
CN117009982B (en) * | 2023-09-26 | 2023-12-26 | 统信软件技术有限公司 | Image file security verification method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10162625B2 (en) | Vehicle control storage methods and systems | |
US8972591B2 (en) | Method for downloading software | |
US7313682B2 (en) | Method and system for updating boot memory that stores a fail-safe reset code and is configured to store boot code and boot updater code | |
CN103858107A (en) | Secure recovery apparatus and method | |
CN101770372B (en) | Firmware update system, method and firmware construction method of firmware update system | |
CN105260215A (en) | Method of updating vehicle-mounted automobile data recorder terminal by USB flash disk | |
CN105760200A (en) | Terminal equipment and its system upgrading method | |
CN102023908A (en) | Method and device for backing up boot program | |
CN107783776B (en) | Method and device for processing firmware upgrade package, and electronic device | |
CN101807152A (en) | Basic output and input system for self verification of selection read only memory and verification method thereof | |
CN105677409B (en) | A kind of method for upgrading system and device | |
CN116501573A (en) | Firmware detection method, firmware detection device, electronic device, storage medium and program product | |
CN115481405A (en) | Safe starting and optimized upgrading method of embedded system | |
CN104657644A (en) | Method and device for acquiring and verifying fingerprint | |
CN105278993B (en) | A kind of drive module upgrade method and device based on linux system | |
CN107329855A (en) | Reduce the method and device of firmware information | |
CN103455750A (en) | High-security verification method and high-security verification system for embedded devices | |
CN102184115B (en) | Method for updating system software and terminal device | |
CN111124760B (en) | Uboot-based embedded equipment starting method and apparatus | |
CN112363749A (en) | Safe starting and upgrading method of MIPS architecture system | |
CN117235707A (en) | Application program starting method and device, electronic equipment and storage medium | |
CN115828255A (en) | Method for upgrading signed firmware, electronic device and storage medium | |
CN111783162B (en) | Data protection implementation method and device and computer equipment | |
CN115357293A (en) | Method for upgrading signed firmware, electronic device and storage medium | |
CN113885926A (en) | Operating system online upgrading method based on security chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |