[go: up one dir, main page]

CN119629169A - Hard disk firmware download method, electronic device and computer readable storage medium - Google Patents

Hard disk firmware download method, electronic device and computer readable storage medium Download PDF

Info

Publication number
CN119629169A
CN119629169A CN202510171410.0A CN202510171410A CN119629169A CN 119629169 A CN119629169 A CN 119629169A CN 202510171410 A CN202510171410 A CN 202510171410A CN 119629169 A CN119629169 A CN 119629169A
Authority
CN
China
Prior art keywords
firmware
sub
key
verification
hard disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202510171410.0A
Other languages
Chinese (zh)
Inventor
刘宇程
刘海波
贲伟建
叶建甬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Huayi Core Technology Co ltd
Original Assignee
Zhejiang Huayi Core Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Huayi Core Technology Co ltd filed Critical Zhejiang Huayi Core Technology Co ltd
Priority to CN202510171410.0A priority Critical patent/CN119629169A/en
Publication of CN119629169A publication Critical patent/CN119629169A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a hard disk firmware downloading method, electronic equipment and a computer readable storage medium, wherein the hard disk firmware downloading method comprises the steps that a solid state disk performs verification processing on a firmware downloading tool to obtain a tool verification result; the method comprises the steps of obtaining a hard disk firmware to be downloaded and a tool secret key from a firmware downloading tool in response to successful characterization verification of a tool verification result, verifying the sub firmware in the hard disk firmware to be downloaded according to the firmware tool secret key to obtain a downloading verification result, and downloading the sub firmware in response to successful characterization verification of the downloading verification result. Therefore, verification is carried out before downloading each sub firmware, the safety inside the hard disk firmware is ensured from bottom to top, and the data safety of the solid state hard disk is improved.

Description

Hard disk firmware downloading method, electronic equipment and computer readable storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a hard disk firmware downloading method, an electronic device, and a computer readable storage medium.
Background
With the advent of the digitization age, data security has become particularly important. The hard disk is used as widely used storage equipment, not only provides a large-capacity storage space, but also supports multiple functions of quick data reading and writing, system starting, data backup and recovery, and the like. In order to maintain the data security of the hard disk, the data in the hard disk can be encrypted by an encryption technology, so that the data in the hard disk is prevented from being illegally acquired.
Current encryption techniques mainly include symmetric encryption and asymmetric encryption. Symmetric encryption uses a key to encrypt and decrypt data, and asymmetric encryption uses a pair of public and private keys to encrypt and decrypt data. When a hard disk manufacturer uses an encryption technology to safely check data, a key authenticated by a CA (Certificate Authority) center is generally adopted to check data interaction between a user and a hard disk, the data security is ensured from the user level, whether the data in the hard disk is safe or not cannot be ensured, and if a security hole exists in the hard disk, the risk of being tampered or destroyed is possibly encountered even if the surface of the user data is safe.
Disclosure of Invention
The application mainly solves the technical problem of providing a hard disk firmware downloading method, electronic equipment and a computer readable storage medium, which can improve the security of firmware downloading.
The technical scheme includes that the method for downloading the hard disk firmware comprises the steps of carrying out verification processing on the firmware downloading tool by the solid state disk to obtain a tool verification result, obtaining hard disk firmware to be downloaded and a tool secret key from the firmware downloading tool if the verification result of the tool is successful, carrying out verification processing on the sub firmware in the hard disk firmware to be downloaded according to the tool secret key to obtain a downloading verification result, and downloading the sub firmware if the verification result of the firmware to be downloaded is successful.
In some embodiments, each sub-firmware comprises a private key signature, the step of verifying the firmware downloading tool by the solid state disk to obtain a tool verification result comprises the step of verifying the private key signature of the firmware downloading tool according to a first preset public key to obtain a tool verification result, and the step of verifying the sub-firmware in the hard disk firmware to be downloaded by the root according to the tool key to obtain a downloading verification result comprises the step of verifying the private key signature of each sub-firmware according to the tool public key in the tool key to obtain a downloading verification result.
In some embodiments, after the step of downloading the sub-firmware, the method further includes obtaining a start-up sequence of each sub-firmware, performing verification processing on the corresponding sub-firmware according to the start-up sequence of each sub-firmware to obtain a start-up verification result, and starting the corresponding sub-firmware if verification is successful by responding to the characterization of the start-up verification result.
In some embodiments, the at least two sub-firmware comprises a first sub-firmware and a second sub-firmware, the start-up sequence of the first sub-firmware is earlier than the start-up sequence of the second sub-firmware, the start-up verification result comprises a first start-up verification result, the step of verifying the corresponding sub-firmware according to the start-up sequence of each sub-firmware to obtain the start-up verification result comprises the step of performing a first verification process on a firmware key of the first sub-firmware according to a second preset public key to obtain the first start-up verification result, and the step of starting the corresponding sub-firmware if the start-up verification result represents that the verification is successful comprises the step of starting the first sub-firmware if the first start-up verification result represents that the verification is successful.
In some embodiments, after the step of starting the first sub-firmware if the verification is successful in response to the first start-up verification result characterization, the method further includes performing a second verification process on the firmware key of the second sub-firmware according to the firmware key of the first sub-firmware to obtain a second start-up verification result, and starting the second sub-firmware if the verification is successful in response to the second start-up verification result characterization. In some embodiments, after the step of responding to the second start-up verification result to characterize verification success and starting the second sub-firmware, the method further includes obtaining data to be processed, determining data to be encrypted according to an identification field corresponding to the data to be processed, conducting encryption processing on the data to be encrypted by adopting a preset encryption mode to obtain encrypted data, and storing key information corresponding to the encrypted data in a key storage area of the solid state disk, wherein the key storage area is used for encrypting the key information stored in the key storage area.
In some embodiments, the step of storing the key information corresponding to the encrypted data in the key storage area of the solid state disk includes performing copy processing on the key information corresponding to the encrypted data to obtain the key information after copy processing, and storing the key information corresponding to the encrypted data and the key information after copy processing in the key storage area.
In some embodiments, after the step of storing the key information corresponding to the encrypted data in the key storage area of the solid state disk, where the key storage area is used for encrypting the key information stored in the key storage area, the method further includes obtaining the encrypted data and the key information corresponding to the encrypted data, where the encrypted data includes a data public key and a private key signature, the key information includes a reference public key and a reference private key, performing verification processing on the private key signature of the encrypted data according to the reference public key to obtain a second private key signature verification result, performing verification processing on the data public key of the encrypted data according to the reference public key to obtain a data public key verification result in response to the second private key signature verification result representation verification success, and performing decryption processing on the encrypted data according to the reference private key to obtain the data to be processed in response to the data public key verification result representation verification success.
In order to solve the technical problem, the application adopts another technical scheme that the electronic equipment comprises a memory and a processor, wherein the memory stores program instructions, and the processor invokes the program instructions from the memory to execute the hard disk firmware downloading method.
In order to solve the above technical problem, another technical solution adopted by the present application is to provide a computer readable storage medium comprising stored program data, wherein the program data is used for implementing the hard disk firmware downloading method when being executed by a processor.
Compared with the traditional method that only the main body is verified and the safety of data in the hard disk firmware is not guaranteed, the method for downloading the hard disk firmware comprises the steps that a solid state disk verifies a firmware downloading tool to obtain a tool verification result, the hard disk firmware to be downloaded and a tool key are obtained from the firmware downloading tool if the tool verification result is successfully represented, the hard disk firmware to be downloaded comprises at least two sub-firmware, the sub-firmware in the hard disk firmware to be downloaded is verified according to the firmware tool key to obtain a downloading verification result, and the sub-firmware is downloaded if the tool verification result is successfully represented. Therefore, verification is performed before downloading each sub firmware, the safety of the inside of the hard disk firmware is guaranteed, and the data safety of the solid state hard disk is improved.
Drawings
For a clearer description of an embodiment of the application or of the solutions of the prior art, the drawings that are needed in the embodiment will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art, in which:
FIG. 1 is a flow chart of an exemplary embodiment of a method for downloading hard disk firmware according to the present application;
FIG. 2 is a schematic diagram of an exemplary embodiment of a sub-firmware of the present application;
FIG. 3 is a schematic diagram of a framework of a download verification process shown in the present application;
FIG. 4 is a schematic diagram of a framework for initiating a chain validation process shown in the present application;
FIG. 5 is a schematic diagram of a conventional data interaction scheme;
FIG. 6 is a flow chart illustrating data decryption according to the present application;
FIG. 7 is a schematic diagram of an exemplary embodiment of a hard disk firmware download device according to the present application;
FIG. 8 is a schematic structural diagram of an embodiment of an electronic device according to the present application;
Fig. 9 is a schematic structural diagram of an embodiment of a computer readable storage medium provided by the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. It is to be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present application are shown in the drawings. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Firstly, it should be noted that, as a widely used storage device, the solid state disk is necessary to ensure the safe storage of its data. The traditional key management method is to manage the keys from an upper layer read-write data layer, for example, a CA key authorization mode is adopted, and data interaction between a user and the solid state disk is ensured through encryption and decryption between public and private keys. However, this approach does not consider the security management of the firmware in the solid state disk, and when the user interacts with the solid state disk, if the firmware in the solid state disk has a security hole or is tampered with maliciously, even if the user data is seemingly secure, the user data may be potentially at risk of being stolen, tampered or destroyed. This risk is unknowingly silent and may be triggered by a seemingly normal firmware update or an external attack. Based on the above, the application provides a hard disk firmware downloading method, electronic equipment and a computer readable storage medium, which can improve the security of firmware downloading.
Referring to fig. 1 for details, fig. 1 is a flowchart illustrating an exemplary embodiment of a method for downloading hard disk firmware according to the present application.
The main body of execution of the hard disk firmware downloading method may be a terminal device or a server or other processing device, where the terminal device may be a User Equipment (UE), a computer, a mobile device, a User terminal, a cellular phone, a cordless phone, a Personal digital assistant (Personal DIGITAL ASSISTANT, PDA), a handheld device, a computing device, an in-vehicle device, a wearable device, or the like. The execution main body of the hard disk firmware downloading method can also be a hard disk firmware downloading device/a solid state disk. In some possible implementations, the hard disk firmware download method may be implemented by way of a processor invoking computer readable instructions stored in a memory.
Specifically, the hard disk firmware downloading method of the present embodiment includes the following steps:
S110, the solid state disk performs verification processing on the firmware downloading tool to obtain a tool verification result.
The Solid state disk (SSD STATE DRIVE) is a hard disk made of Solid state electronic memory chip array, and has the advantages of high read-write speed, good shock resistance, light weight, small volume, etc. because of no mechanical structure. In order to put the solid state disk into use, hard disk burning is required to be carried out on the solid state disk, and the hard disk burning process is to actually write the hard disk firmware into the solid state disk, namely, download the corresponding hard disk firmware to be downloaded.
The firmware downloading tool is used for providing the hard disk firmware to be downloaded. For example, before leaving a factory, a hard disk manufacturer needs to uniformly install firmware on the solid state disk through a firmware downloading tool to finish card opening. When the solid state disk is burned, the solid state disk is in communication connection with a firmware downloading tool, firstly, before the solid state disk obtains the firmware of the hard disk to be downloaded from the firmware downloading tool, whether the firmware downloading tool has risks or not needs to be verified, and if the firmware of the hard disk to be downloaded does not exist, the solid state disk obtains the firmware of the hard disk to be downloaded from the firmware downloading tool.
The tool verification result refers to the verification result of the firmware download tool. By way of example, the legitimacy, compatibility, etc. of the firmware download tool may be verified by tool verification. When the tool verification result represents successful verification, the firmware downloading tool is in accordance with the requirement of the solid state disk, and the hard disk firmware to be downloaded can be obtained from the firmware downloading tool.
And S120, responding to the tool verification result to represent that verification is successful, acquiring the hard disk firmware to be downloaded and the tool key from the firmware downloading tool, wherein the hard disk firmware to be downloaded comprises at least two sub-firmware.
The firmware to be downloaded refers to the firmware to be written into the solid state disk and is responsible for managing and controlling the basic functions and behaviors of the solid state disk. The hard disk firmware to be downloaded may be a bootable image file, for example. And writing the hard disk firmware to be downloaded into the solid state disk through the firmware downloading tool. In order to detect the security of the hard disk firmware to be downloaded, the hard disk burning can be completed in a segmented downloading mode. The hard disk firmware to be downloaded can be functionally distinguished, so that at least two sub-firmware of the hard disk firmware to be downloaded can be obtained. For example, the hard disk firmware to be downloaded may include mass production sub-firmware and product sub-firmware.
The tool key refers to the key of the firmware download tool. The firmware downloading tool may also be referred to as a tool firmware, and when the verification result of the tool is successful, the tool key of the firmware downloading tool and the hard disk firmware to be downloaded in the firmware downloading tool may be obtained. The tool key may illustratively include a tool public key, a tool private key signature, and may include a tool hash value.
S130, verifying sub-firmware in the hard disk firmware to be downloaded according to the tool key to obtain a downloading verification result.
The downloaded verification result refers to the verification result of each sub-firmware. The verification process is performed on each sub-firmware in the hard disk firmware to be downloaded through the tool key of the firmware downloading tool, so as to obtain a downloading verification result. When the download verification result represents successful verification, the corresponding sub-firmware meets the preset requirement, and can be downloaded to the solid state disk.
In order to perform verification processing on each sub-firmware, when compiling the hard disk firmware to be downloaded, digital certificates generated by a firmware public key, a private key signature and a firmware hash value (hash) are required to be packaged into each sub-firmware, the private key is stored through a server, and the corresponding private key can be used for signature only after authentication. The structure of the sub-firmware may be shown in fig. 2, where the sub-firmware includes a first digital certificate and a second digital certificate, where the first digital certificate includes a public key and a private key signature, and the second digital certificate includes a public key and a hash value of the firmware. Therefore, when the hard disk firmware is downloaded, whether each sub-firmware is safe or not can be verified in a key verification mode. In some embodiments, the sub-firmware may be sequentially verified by using the tool key to obtain a download verification result of the sub-firmware.
And S140, characterizing that the verification is successful in response to the download verification result, and downloading the sub-firmware.
And the solid state disk performs verification processing on the sub-firmware through the tool key, and if the downloaded verification result is successfully characterized, the solid state disk indicates that the corresponding sub-firmware has no security risk, and downloads the corresponding sub-firmware.
The hard disk firmware downloading method of the embodiment can be applied to updating, upgrading and the like of the hard disk firmware.
It can be seen that the solid state disk of the hard disk firmware downloading method in the embodiment of the application performs verification processing on the firmware downloading tool to obtain a tool verification result, the hard disk firmware to be downloaded and the tool key are obtained from the firmware downloading tool if the verification result is successfully represented, the hard disk firmware to be downloaded comprises at least two sub-firmware, the corresponding sub-firmware is subjected to verification processing according to the downloading sequence of the sub-firmware in the hard disk firmware to be downloaded according to the tool key to obtain the downloading verification result, and the sub-firmware is downloaded if the verification result is successfully represented according to the downloading verification result. Therefore, verification is performed before downloading each sub firmware, the safety of the inside of the hard disk firmware is guaranteed, and the data safety of the solid state hard disk is improved.
The process of verifying the firmware downloading tool and each sub-firmware in the hard disk firmware to be downloaded specifically comprises the steps of verifying a tool private key signature of the firmware downloading tool according to a first preset public key to obtain a tool verification result, obtaining the hard disk firmware to be downloaded and the tool private key from the firmware downloading tool if the tool verification result is successfully represented, and verifying the private key signature of each sub-firmware according to the tool public key in the tool private key to obtain a downloading verification result. In other embodiments, the solid state disk may further perform verification processing on the unified key in the hard disk firmware to be downloaded through the preset root key, and if verification is successful, all the sub-firmware in the hard disk firmware to be downloaded is directly downloaded.
The first preset public key is used for verifying the firmware downloading tool. In some application scenarios, if the current hard disk firmware download is a forced download, the firmware download tool is checked by a first preset public key stored in a ROM Code (read only memory Code) of the main control chip, so as to obtain a tool verification result. In other application scenarios, if the current hard disk firmware download is a normal download, the firmware download tool is checked by the first firmware successfully downloaded last time by the solid state disk, and a tool verification result is obtained. And after the tool verification result represents successful verification, verifying the hard disk firmware to be downloaded according to the tool key of the firmware downloading tool.
In some embodiments, the verification of the firmware downloading tool and each sub-firmware may be completed through an asymmetric key, specifically, the private key signature of the firmware downloading tool is verified through a first preset public key, and the private key signature of each sub-firmware is verified through a tool public key in the tool key, so as to obtain a downloading verification result. In other embodiments, verification of the firmware download tool and the sub-firmware may also be accomplished through a symmetry key.
As an example, referring to fig. 3, the process of downloading the hard disk firmware may first determine the current hard disk firmware downloading type, if the downloading type is forced downloading, verify the private key signature of the firmware downloading tool through a first preset public key in the main control chip (1 shown in fig. 3), obtain a tool verification result, if the downloading type is normal downloading, verify the private key signature of the firmware downloading tool through a public key in the first firmware successfully downloaded last time in the solid state disk (2 shown in fig. 3), obtain a tool verification result, if the tool verification result characterizes that the verification is successful, respectively verify the private key signatures in the second digital certificates of the sub-firmware in the hard disk firmware to be downloaded through the tool public key of the firmware downloading tool (3 and 4 shown in fig. 3), and then verify the first digital certificate through the second digital certificate.
After the hard disk firmware is downloaded, the starting process of the solid state disk can verify all the sub-firmware, so that the safety detection of the hard disk firmware is enhanced, and the risk of data loss is prevented.
The method comprises the steps of obtaining the starting sequence of each sub-firmware by the solid state disk in the starting stage, and verifying the corresponding sub-firmware according to the starting sequence of each sub-firmware to obtain a starting verification result.
The starting sequence refers to the sequence of starting the firmware of each sub-component of the solid state disk. Illustratively, the start-up order of each sub-firmware may be determined by the performance of each sub-firmware, e.g., the mass-produced sub-firmware is in front and the product sub-firmware is in back. In other embodiments, the starting sequence of each sub-firmware may also be determined by the storage size of each sub-firmware, where the sub-firmware with larger storage space is started first and the sub-firmware with smaller storage space is started later. When each sub firmware is started, the solid state disk sequentially performs verification processing on each sub firmware according to the starting sequence to obtain a starting verification result.
The start-up verification result includes the verification result of each sub-firmware at the start-up. Illustratively, before each sub-firmware is started, the validity of each sub-firmware is verified, and a starting verification result of the corresponding sub-firmware is obtained. In some embodiments, the same key may be used to sequentially verify each sub-firmware to obtain the boot verification result of each sub-firmware. In other embodiments, the first sub-firmware may be authenticated by a second preset public key to obtain an authentication result of the first sub-firmware, and if the first sub-firmware is authenticated successfully, the second sub-firmware may be authenticated by a firmware key of the first sub-firmware to obtain an authentication result of the second sub-firmware. And performing chain verification until all the sub-firmware is verified successfully, and indicating that the hard disk firmware is started successfully.
The method comprises the steps of carrying out first verification processing on a firmware key of the first sub-firmware according to a second preset public key to obtain a first starting verification result, and starting the first sub-firmware if the first starting verification result represents successful verification.
The first sub-firmware may be a sub-firmware with a first starting sequence in the hard disk firmware to be started. The first sub-firmware may be, for example, a mass-produced sub-firmware of the hard disk firmware to be started. In other embodiments, the first sub-firmware may also be the sub-firmware with the largest ratio among the sub-firmware. If the first starting verification result represents that the first sub-firmware verification is successful, starting the first sub-firmware, and if the first starting verification result represents that the first sub-firmware verification is failed, stopping starting and prompting that the verification is failed.
Further, if the hard disk firmware to be started further includes a second sub-firmware, the starting sequence of the second sub-firmware is later than that of the first sub-firmware. After the first sub-firmware is started, the solid state disk performs a second verification process on the firmware key of the second sub-firmware according to the firmware key of the first sub-firmware to obtain a second starting verification result, and after the second starting verification result represents that verification is successful, the second sub-firmware is started.
Further, if the hard disk firmware to be started further comprises a third sub-firmware, the starting sequence of the third sub-firmware is later than that of the second sub-firmware, after the second sub-firmware is started, the solid state disk performs third verification processing on the firmware key of the third sub-firmware according to the firmware key of the second sub-firmware to obtain a third starting verification result, and after the verification is successfully represented by the third starting verification result, the third sub-firmware is started. The method has the advantages that the firmware of the hard disk to be started is verified in a chained verification mode, the security of each layer of secret key is ensured from the bottommost layer of the firmware layer by layer, even if a certain layer of sub-firmware is tampered or damaged, the secret key of the upper layer and the security threat caused by the sub-firmware to the data of the upper layer can be timely found and prevented, and meanwhile, the secret key can be safely recovered when the solid state disk is abnormal.
The verification process is performed by using a secret key, the asymmetric encryption algorithm can be selected in this embodiment, the secret key pair is a public secret key, the public key is used for verifying the signature of the private key, and the secret key is generally arranged at the tail of the firmware. As an example, the process of performing the second verification process on the firmware key of the second sub-firmware according to the firmware key of the first sub-firmware to obtain the second start verification result may include performing the verification process on the private key signature of the second sub-firmware according to the first public key of the first sub-firmware to obtain the first private key signature verification result, performing the verification process on the second public key of the second sub-firmware according to the first public key to obtain the second public key verification result if the verification is successful in response to the first private key signature verification result, and determining the second start verification result according to the second public key verification result.
The firmware key of the first sub-firmware comprises a first public key, and the firmware key of the second sub-firmware comprises a second public key and a private key signature. The purpose of verifying the private key signature through the first public key is to judge whether the main body is correct or not, and after the main body is correct, the first public key of the first sub-firmware is used for carrying out consistency judgment on the second public key of the second sub-firmware, so that the private key signature of the second sub-firmware and the second public key are verified, and the security of the firmware secret key of the second sub-firmware is ensured. Referring to fig. 4 for details, fig. 4 is a schematic flow chart of the start chain verification according to the present application. Firstly, the solid state disk verifies the private key signature of a second digital certificate in the tail part of a product firmware through a second preset public key in a main control chip (1 shown in fig. 4), after the verification is passed, the second preset public key in the main control chip stored in the second digital certificate is compared with the second preset public key in the main control chip (2 shown in fig. 4), if the second preset public key is consistent with the second preset public key in the main control chip, the integrity judgment is carried out on the firmware hash value in the first digital certificate through the firmware public key in the second digital certificate (3 shown in fig. 4), if the first digital certificate is complete, the firmware public key in the first digital certificate is verified through the firmware public key in the second digital certificate, and if the verification is passed, the product firmware verification is successful (4 shown in fig. 4). And then the second sub-firmware is verified by the first sub-firmware in the above manner.
In addition, different sub-firmware can also set different firmware keys. The method includes the steps that if the firmware keys of a first sub-firmware and a second sub-firmware are different, a first verification process is conducted on the first sub-firmware through a solid state disk according to a second preset public key to obtain a first starting verification result, if the first starting verification result represents that verification is successful, the first sub-firmware is started, then the second sub-firmware is verified through the first sub-firmware, specifically, a private key signature of the second sub-firmware is verified through a decryption public key, obtained through the first sub-firmware, for verifying the second sub-firmware, if verification is passed, a verification process is conducted on a firmware public key of the second sub-firmware through the decryption public key of the first sub-firmware, and if verification is successful, the second sub-firmware is started.
In other embodiments, in order to improve the verification efficiency, the firmware key of the second sub-firmware may be subjected to a third verification process according to the second preset public key to obtain a third start verification result, and the second sub-firmware is started if the verification is successfully represented by the third start verification result. Therefore, verification processing is carried out on all the sub-firmware through the second preset public key, and the key safety of each sub-firmware is ensured. The verification sequence of each sub-firmware is not limited, batch verification can be performed on each sub-firmware through a second preset public key, and sequential verification can be performed on each sub-firmware through the second preset public key. If the verification of the sub-firmware fails, stopping the starting.
In other embodiments, the solid state disk may further perform verification processing on the unified key in the hard disk firmware to be started through the second preset public key, and if verification is successful, all the sub-firmware in the hard disk firmware is directly started.
After the download and boot verification of the hard disk firmware is complete, it indicates that the key used by the hard disk firmware is trusted. The user can read and write normally on the solid state disk. The conventional data interaction between the user and the solid state disk is performed by a CA key authorization method, the CA is an authentication center for providing a key, and the validity of the key distributed to the user and the device end is guaranteed, and fig. 5 can be referred to, and fig. 5 is a schematic diagram of a framework of the conventional data interaction method. The solid state disk is connected with the user through the server, when the user needs to access the solid state disk, the solid state disk can acquire the legality of the key pair of the user from the server, and the user can also acquire the legality of the key pair of the solid state disk from the server, so that the data transmission safety between the user and the solid state disk is ensured. However, in the traditional data reading and writing process, the data is not reasonably classified, so that the data reading and writing efficiency is seriously affected, and the performance of the hard disk is obviously reduced due to frequent reading and writing operations on the solid state disk, so that the user experience is affected.
Based on the above, when the embodiment of the application reads and writes data, the client can classify the data according to the data sensitivity and the importance of the application scene, and different encryption strategies are adopted for different types of data, so that unnecessary encryption and decryption operations are reduced to the greatest extent while the data security is ensured, and the efficient utilization of resources is realized.
For example, data may be classified into data that needs to be encrypted and data that does not need to be encrypted, and clients may tag data to be encrypted and data that is not encrypted by an identification field. The method comprises the steps of obtaining data to be processed from a client, determining the data to be encrypted according to an identification field corresponding to the data to be processed, conducting encryption processing on the data to be encrypted by adopting a preset encryption mode to obtain encrypted data, storing key information corresponding to the encrypted data in a key storage area of the solid state disk, wherein the key storage area is used for encrypting the key information stored in the key storage area.
When the client transmits the data to be processed, different identification fields are adopted to mark the data to be encrypted and the data not to be encrypted, for example, the data can be marked at the tail end of the data. In other embodiments, the encrypted data may also be divided into importance, marked with different identification fields, etc. Other data classifications that may occur to those skilled in the art may also be labeled with an identification field, and are not specifically limited herein.
After the solid state disk acquires the data to be processed, determining the data to be encrypted according to the identification field corresponding to the data to be processed, and encrypting the data to be encrypted by adopting a preset encryption mode to obtain the encrypted data. The preset encryption mode may be RSA (Rivest-Shamir-Adleman, rivest-samier-Adleman algorithm), ECC (Elliptic Curve Cryptography, elliptic curve encryption algorithm), DSA (Digital Signature Algorithm ), etc. After the encrypted data is obtained, the encrypted data field and the public key information can be placed in a P2L table (Physical to Logical), the encrypted data takes a bank as a unit, when one bank data is full, the P2L table is triggered to be downwards brushed, and at the moment, the encrypted data field and the public key information can be downwards brushed together, so that the performance loss is reduced.
And then storing the key information corresponding to the encrypted data into a key storage area (keystore) of the solid state disk, wherein the key storage area can be placed in a NAND flash memory fixed area in the solid state disk. The key storage area may be protected by a password provided by the user so that the key storage area may encrypt key information stored therein.
In order to prevent the problem of abnormal reading and writing caused by the fact that public and private keys cannot be read normally, the key information corresponding to the encrypted data can be copied to obtain the key information after the copying, and the key information corresponding to the encrypted data and the key information after the copying are stored in the key storage area. And when the normal private key cannot be read normally, the private key is taken out from the backup space for verification. The key information corresponding to the encrypted data and the key information after the copying process are arranged in different spaces of the key storage area, and the key information after the copying process is arranged in a backup space of the key storage area. In order to ensure that the backed-up key information is always valid and not tampered with, the client may periodically push updates to the user and verify the integrity of the backed-up key information after the user enters the password for the key storage area.
When reading data, firstly, the data needs to be decrypted. The method comprises the steps of obtaining encryption data and key information corresponding to the encryption data, obtaining data to be processed by the encryption data based on a solid state disk, determining the data to be encrypted according to an identification field corresponding to the data to be processed, and carrying out encryption processing on the data to be encrypted by adopting a preset encryption mode. The method comprises the steps of carrying out verification processing on a private key signature of encrypted data according to a reference public key to obtain a second private key signature verification result, carrying out verification processing on a data public key of the encrypted data according to the reference public key to obtain a data public key verification result if the verification result representation verification of the second private key signature verification result is successful, and carrying out decryption processing on the encrypted data according to the reference private key to obtain data to be processed if the verification result representation verification of the data public key is successful. The reference public key and the reference private key are key information stored in the key storage area in the data encryption stage.
When a user requests to read encrypted data in the solid state disk, referring to fig. 6, fig. 6 is a schematic diagram of a data decryption flow shown in the present application. Firstly, confirming whether data are encrypted or not through an identification field at the tail part of a P2L table (1 shown in fig. 6), if so, opening a key storage area through a password corresponding to the key storage area, taking out a reference public key and a reference private key from the key storage area, then, verifying private key signature in encrypted data through the reference public key of the key storage area to determine whether a main body is correct or not (2 shown in fig. 6), if so, verifying the data public key in the encrypted data according to the reference public key of the key storage area, if so, verifying whether the reference public key is consistent with the data public key, and if so, decrypting the encrypted data field through the reference private key to obtain data to be processed, namely, original data before encryption (3 shown in fig. 6).
Finally, the application is elucidated in connection with the above embodiments, in the following details:
Firstly, the solid state disk needs to download hard disk firmware before leaving the factory, and card opening is completed. The method comprises the steps of placing a first preset public key in a rom code of a main control chip, guaranteeing that the first preset public key is not obtained when being placed in a physical space, packaging digital certificates generated by the public key and a private key signature into all sub-firmware of the hard disk firmware when compiling the hard disk firmware, storing the private key through a server, signing by using the corresponding private key only when the private key passes through authentication, obtaining the private key signature, verifying a firmware downloading tool through the first preset public key by the solid state disk, stopping downloading and prompting verification failure if verification is successful, downloading all the sub-firmware in the hard disk firmware to be downloaded, and completing card opening of the solid state disk if verification is successful.
In the process of starting the hard disk firmware, the solid state disk firstly performs first verification processing on mass production firmware in the hard disk firmware to be downloaded according to a second preset public key in the rom code to obtain a first starting verification result, if the first starting verification result represents verification failure, starting is stopped and verification failure is prompted, if the first starting verification result represents verification success, the product firmware is subjected to second verification processing by the throughput firmware to obtain a second starting verification result, if the second starting verification result represents verification failure, the downloading is stopped and verification failure is prompted, and otherwise, the product firmware is started. Therefore, verification of all sub-firmware is realized in a chained verification mode, and starting of the hard disk firmware is completed.
After the downloading and starting are checked completely, the data reading and writing operation can be carried out, the data is written with the key information in the reading and writing process, and the data is decrypted by utilizing the corresponding key information in the data reading process. The method comprises the steps of dividing data to be processed into data to be encrypted and non-encrypted data according to data sensitivity and importance of an application scene by a client, marking the data to be processed by different identification fields, wherein the identification fields can be a specific identifier or a data head, determining the data to be encrypted according to the identification fields after the data to be processed is obtained by a solid state disk, conducting encryption processing on the data to be encrypted by adopting a preset encryption mode to obtain the encrypted data, placing the encrypted data and public key information in a P2L table, placing key information (a reference public key and a reference private key) corresponding to the encrypted data in a fixed position key storage area in a NAND flash memory, encrypting the key storage area through a password provided by a user, and carrying out backup processing on key information corresponding to the encrypted data. When reading data, determining whether the data is encrypted or not by identifying an identification field at the tail of the data, if yes, firstly unlocking a key storage area by a password provided by a user, then verifying a private key signature in the encrypted data by a reference public key in the key storage area, if verification is successful, verifying a data public key in the encrypted data according to the reference public key, and after the data are consistent, decrypting the encrypted data by the reference private key to obtain the data to be processed, namely the original data before encryption.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an exemplary embodiment of a hard disk firmware downloading device according to the present application. The hard disk firmware downloading device 700 comprises an acquisition module 710, a verification module 720 and a downloading module 730, wherein the acquisition module 710 is used for responding to the passing of main body verification between the solid state disk and the firmware providing end, the solid state disk acquires the hard disk firmware to be downloaded from the firmware providing end, the hard disk firmware to be downloaded comprises at least two sub-firmware, the verification module 720 is used for carrying out verification processing on the corresponding sub-firmware according to the downloading sequence of each sub-firmware to obtain a downloading verification result, and the downloading module 730 is used for responding to the successful verification of the downloading verification result characterization, and downloading the corresponding sub-firmware.
According to the scheme, the hard disk firmware downloading device responds to the fact that main body verification between the solid state disk and the firmware providing end is passed, the solid state disk obtains hard disk firmware to be downloaded from the firmware providing end, the hard disk firmware to be downloaded comprises at least two sub-firmware, verification processing is conducted on the corresponding sub-firmware according to the downloading sequence of each sub-firmware to obtain a downloading verification result, and the corresponding sub-firmware is downloaded if verification is successful in response to the fact that the downloading verification result represents that verification is successful. Therefore, verification is carried out before downloading each sub firmware, the safety inside the hard disk firmware is ensured from bottom to top, and the data safety of the solid state hard disk is improved.
The functions of each module may refer to an embodiment of a method for downloading hard disk firmware, which is not described herein.
In order to implement the method for downloading the hard disk firmware of the above embodiment, another electronic device is provided in the present application, and referring to fig. 8 specifically, fig. 8 is a schematic structural diagram of an embodiment of the electronic device provided in the present application.
The electronic device 800 includes a memory 810 and a processor 820, wherein the memory 810 and the processor 820 are coupled.
The memory 810 is used for storing program data, and the processor 820 is used for executing the program data to implement the hard disk firmware downloading method of the above embodiment.
In this embodiment, the processor 820 may also be referred to as a CPU (Central Processing Unit ). Processor 820 is an integrated circuit chip with signal processing capabilities. Processor 820 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application-specific integrated Circuit (ASIC), a Field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, a discrete gate or transistor logic device, a discrete hardware component. A general purpose processor may be a microprocessor or the processor 820 may be any conventional processor or the like.
The present application also provides a computer readable storage medium, as shown in fig. 9, where the computer readable storage medium 900 is used to store program data 910, and the program data 910, when executed by a processor, is used to implement a hard disk firmware downloading method according to an embodiment of the method of the present application.
The method of the present application in the embodiment of the method for downloading hard disk firmware may be stored in a device, such as a computer readable storage medium, when implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. The storage medium includes a U disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, an optical disk, or other various media capable of storing program codes.
The foregoing description is only of embodiments of the present application, and is not intended to limit the scope of the application, and all equivalent structures or equivalent processes using the descriptions and the drawings of the present application or directly or indirectly applied to other related technical fields are included in the scope of the present application.

Claims (10)

1.一种硬盘固件下载方法,其特征在于,所述硬盘固件下载方法应用于固态硬盘,所述固态硬盘与固件下载工具通讯连接,所述方法包括:1. A method for downloading hard disk firmware, characterized in that the method for downloading hard disk firmware is applied to a solid state hard disk, the solid state hard disk is communicatively connected with a firmware download tool, and the method comprises: 所述固态硬盘对所述固件下载工具进行验证处理,得到工具验证结果;The solid state drive performs verification processing on the firmware download tool to obtain a tool verification result; 响应于所述工具验证结果表征验证成功,则从所述固件下载工具中获取待下载硬盘固件和工具秘钥,所述待下载硬盘固件包括至少两个子固件;In response to the tool verification result indicating successful verification, obtaining hard disk firmware to be downloaded and a tool key from the firmware download tool, wherein the hard disk firmware to be downloaded includes at least two sub-firmwares; 根据所述工具秘钥对所述待下载硬盘固件中的子固件进行验证处理,得到下载验证结果;Verifying the sub-firmware in the hard disk firmware to be downloaded according to the tool key to obtain a download verification result; 响应于所述下载验证结果表征验证成功,则下载所述子固件。In response to the download verification result indicating that the verification is successful, the sub-firmware is downloaded. 2.根据权利要求1所述的硬盘固件下载方法,其特征在于,各子固件包括私钥签名,所述固态硬盘对所述固件下载工具进行验证处理,得到工具验证结果的步骤,包括:2. The hard disk firmware downloading method according to claim 1, wherein each sub-firmware includes a private key signature, and the solid state drive verifies the firmware download tool to obtain a tool verification result, comprising: 根据第一预设公钥对所述固件下载工具的工具私钥签名进行验证处理,得到工具验证结果;Verifying the tool private key signature of the firmware download tool according to the first preset public key to obtain a tool verification result; 所述根据所述工具秘钥对所述待下载硬盘固件中的子固件进行验证处理,得到下载验证结果的步骤,包括:The step of verifying the sub-firmware in the hard disk firmware to be downloaded according to the tool key to obtain a download verification result includes: 根据所述工具秘钥中的工具公钥对各子固件的私钥签名进行验证处理,得到所述下载验证结果。The private key signature of each sub-firmware is verified according to the tool public key in the tool secret key to obtain the download verification result. 3.根据权利要求1所述的硬盘固件下载方法,其特征在于,在所述下载所述子固件的步骤之后,所述方法还包括:3. The hard disk firmware downloading method according to claim 1, characterized in that after the step of downloading the sub-firmware, the method further comprises: 获取各子固件的启动顺序;Get the boot order of each sub-firmware; 根据各子固件的启动顺序对对应子固件进行验证处理,得到启动验证结果;Verifying the corresponding sub-firmware according to the startup sequence of each sub-firmware to obtain a startup verification result; 响应于所述启动验证结果表征验证成功,则启动对应的子固件。In response to the boot verification result indicating that the verification is successful, the corresponding sub-firmware is started. 4.根据权利要求3所述的硬盘固件下载方法,其特征在于,所述至少两个子固件包括第一子固件和第二子固件,所述第一子固件的启动顺序早于所述第二子固件的启动顺序,所述启动验证结果包括第一启动验证结果,所述根据各子固件的启动顺序对对应子固件进行验证处理,得到启动验证结果的步骤,包括:4. The hard disk firmware downloading method according to claim 3, characterized in that the at least two sub-firmwares include a first sub-firmware and a second sub-firmware, the startup sequence of the first sub-firmware is earlier than the startup sequence of the second sub-firmware, the startup verification result includes a first startup verification result, and the step of performing verification processing on the corresponding sub-firmware according to the startup sequence of each sub-firmware to obtain the startup verification result comprises: 根据第二预设公钥对所述第一子固件的固件秘钥进行第一次验证处理,得到第一启动验证结果;Performing a first verification process on the firmware secret key of the first sub-firmware according to the second preset public key to obtain a first startup verification result; 所述响应于所述启动验证结果表征验证成功,则启动对应的子固件的步骤,包括:The step of starting the corresponding sub-firmware in response to the startup verification result indicating that the verification is successful includes: 响应于所述第一启动验证结果表征验证成功,则启动所述第一子固件。In response to the first startup verification result indicating that the verification is successful, the first sub-firmware is started. 5.根据权利要求4所述的硬盘固件下载方法,其特征在于,在所述响应于所述第一启动验证结果表征验证成功,则启动所述第一子固件的步骤之后,所述方法还包括:5. The hard disk firmware downloading method according to claim 4, characterized in that after the step of starting the first sub-firmware in response to the first startup verification result indicating that the verification is successful, the method further comprises: 根据所述第一子固件的固件秘钥对所述第二子固件的固件秘钥进行第二次验证处理,得到第二启动验证结果;Performing a second verification process on the firmware key of the second sub-firmware according to the firmware key of the first sub-firmware to obtain a second startup verification result; 响应于所述第二启动验证结果表征验证成功,则启动所述第二子固件。In response to the second startup verification result indicating that the verification is successful, the second sub-firmware is started. 6.根据权利要求5所述的硬盘固件下载方法,其特征在于,在所述响应于所述第二启动验证结果表征验证成功,则启动所述第二子固件的步骤之后,所述方法还包括:6. The hard disk firmware downloading method according to claim 5, characterized in that after the step of starting the second sub-firmware in response to the second startup verification result indicating that the verification is successful, the method further comprises: 获取待处理数据;Get the data to be processed; 根据所述待处理数据对应的标识字段确定待加密数据;Determining the data to be encrypted according to the identification field corresponding to the data to be processed; 采用预设加密方式对所述待加密数据进行加密处理,得到加密数据;Encrypting the data to be encrypted using a preset encryption method to obtain encrypted data; 将所述加密数据对应的秘钥信息存储于所述固态硬盘的秘钥存储区,所述秘钥存储区用于加密存储于其中的秘钥信息。The key information corresponding to the encrypted data is stored in a key storage area of the solid state drive, and the key storage area is used to encrypt the key information stored therein. 7.根据权利要求6所述的硬盘固件下载方法,其特征在于,所述将所述加密数据对应的秘钥信息存储于所述固态硬盘的秘钥存储区的步骤,包括:7. The hard disk firmware downloading method according to claim 6, wherein the step of storing the key information corresponding to the encrypted data in the key storage area of the solid state drive comprises: 对所述加密数据对应的秘钥信息进行复制处理,得到复制处理后的秘钥信息;Copying the key information corresponding to the encrypted data to obtain the copied key information; 将所述加密数据对应的秘钥信息和所述复制处理后的秘钥信息存储于所述秘钥存储区。The key information corresponding to the encrypted data and the copied key information are stored in the key storage area. 8.根据权利要求6所述的硬盘固件下载方法,其特征在于,在所述将所述加密数据对应的秘钥信息存储于所述固态硬盘的秘钥存储区,所述秘钥存储区用于加密存储于其中的秘钥信息的步骤之后,所述方法还包括:8. The hard disk firmware downloading method according to claim 6, characterized in that after the step of storing the key information corresponding to the encrypted data in a key storage area of the solid state disk, wherein the key storage area is used to encrypt the key information stored therein, the method further comprises: 获取所述加密数据和所述加密数据对应的秘钥信息,所述加密数据包括数据公钥和私钥签名,所述秘钥信息包括参考公钥和参考私钥;Acquire the encrypted data and the key information corresponding to the encrypted data, the encrypted data including a data public key and a private key signature, and the key information including a reference public key and a reference private key; 根据所述参考公钥对所述加密数据的私钥签名进行验证处理,得到第二私钥签名验证结果;Verifying the private key signature of the encrypted data according to the reference public key to obtain a second private key signature verification result; 响应于所述第二私钥签名验证结果表征验证成功,则根据所述参考公钥对所述加密数据的数据公钥进行验证处理,得到数据公钥验证结果;In response to the second private key signature verification result indicating successful verification, verifying the data public key of the encrypted data according to the reference public key to obtain a data public key verification result; 响应于所述数据公钥验证结果表征验证成功,则根据所述参考私钥对所述加密数据进行解密处理,得到所述待处理数据。In response to the data public key verification result indicating successful verification, the encrypted data is decrypted according to the reference private key to obtain the data to be processed. 9.一种电子设备,其特征在于,包括:存储器和处理器,其中,所述存储器存储有程序指令,所述处理器从所述存储器调取所述程序指令以执行如权利要求1-8任一项所述的方法。9. An electronic device, comprising: a memory and a processor, wherein the memory stores program instructions, and the processor retrieves the program instructions from the memory to execute the method according to any one of claims 1 to 8. 10.一种计算机可读存储介质,其特征在于,包括:存储有程序数据,所述程序数据被处理器执行时用于实现如权利要求1-8任一项所述的方法。10. A computer-readable storage medium, characterized in that it includes: storing program data, wherein the program data is used to implement the method according to any one of claims 1 to 8 when executed by a processor.
CN202510171410.0A 2025-02-17 2025-02-17 Hard disk firmware download method, electronic device and computer readable storage medium Pending CN119629169A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510171410.0A CN119629169A (en) 2025-02-17 2025-02-17 Hard disk firmware download method, electronic device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510171410.0A CN119629169A (en) 2025-02-17 2025-02-17 Hard disk firmware download method, electronic device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN119629169A true CN119629169A (en) 2025-03-14

Family

ID=94909863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510171410.0A Pending CN119629169A (en) 2025-02-17 2025-02-17 Hard disk firmware download method, electronic device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN119629169A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273150A (en) * 2017-05-10 2017-10-20 深圳市金百锐通信科技有限公司 Preload firmware and download wiring method and device
CN109445705A (en) * 2018-10-29 2019-03-08 湖南国科微电子股份有限公司 Firmware authentication method and solid state hard disk
CN109766731A (en) * 2019-01-11 2019-05-17 深圳忆联信息系统有限公司 Encryption data processing method, device and computer equipment based on solid state hard disk
CN112187544A (en) * 2020-09-30 2021-01-05 深圳忆联信息系统有限公司 Firmware upgrading method and device, computer equipment and storage medium
CN113805908A (en) * 2020-06-17 2021-12-17 瑞昱半导体股份有限公司 Firmware update system and method
CN118656130A (en) * 2024-05-30 2024-09-17 深圳大普微电子股份有限公司 Firmware startup method and device for solid state hard disk, firmware hard disk and non-volatile storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273150A (en) * 2017-05-10 2017-10-20 深圳市金百锐通信科技有限公司 Preload firmware and download wiring method and device
CN109445705A (en) * 2018-10-29 2019-03-08 湖南国科微电子股份有限公司 Firmware authentication method and solid state hard disk
CN109766731A (en) * 2019-01-11 2019-05-17 深圳忆联信息系统有限公司 Encryption data processing method, device and computer equipment based on solid state hard disk
CN113805908A (en) * 2020-06-17 2021-12-17 瑞昱半导体股份有限公司 Firmware update system and method
US20210397441A1 (en) * 2020-06-17 2021-12-23 Realtek Semiconductor Corp. Firmware updating system and method
CN112187544A (en) * 2020-09-30 2021-01-05 深圳忆联信息系统有限公司 Firmware upgrading method and device, computer equipment and storage medium
CN118656130A (en) * 2024-05-30 2024-09-17 深圳大普微电子股份有限公司 Firmware startup method and device for solid state hard disk, firmware hard disk and non-volatile storage medium

Similar Documents

Publication Publication Date Title
CN111030822B (en) Method and system for protecting firmware, and computer readable medium
CN109313690B (en) Self-contained encrypted boot policy verification
TWI667586B (en) System and method for verifying changes to uefi authenticated variables
JP6595822B2 (en) Information processing apparatus and control method thereof
JP5703391B2 (en) System and method for tamper resistant boot processing
FI114416B (en) Procedure for securing electronic device, fuse system and electronic device
TWI416932B (en) Device for preventing copying combined with flash/boot technology
CN102426640B (en) For the fail-safe software product identifiers of Product Validation and activation
JP4912879B2 (en) Security protection method for access to protected resources of processor
TWI851820B (en) Integrated circuit, system for securely managing a plurality of keys used for data security and method performed by integrated circuit
CN113434853B (en) Method for burning firmware to storage device and controller
US8392724B2 (en) Information terminal, security device, data protection method, and data protection program
TW201802719A (en) Information authentication with security code verification
CN109445705B (en) Firmware authentication method and solid state disk
CN104462965A (en) Method for verifying integrity of application program and network device
JP2017157018A (en) Information processing device, information processing method, information processing program, and trusted platform module
CN112148314B (en) Mirror image verification method, device and equipment of embedded system and storage medium
CN116561734B (en) Verification method, verification device, computer and computer configuration system
KR20170089352A (en) Firmware integrity verification for performing the virtualization system
US20080229106A1 (en) Information processing apparatus and data transmission method of information processing apparatus
CN110781478A (en) Method and device for temporarily authorizing root to realize debugging
WO2014183643A1 (en) Check method and check device for chip having secure startup function
CN113761538A (en) Security boot file configuration method, boot method, device, equipment and medium
CN119629169A (en) Hard disk firmware download method, electronic device and computer readable storage medium
CN115062330B (en) TPM-based intelligent password key password application interface implementation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination