Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Electronic device capable of being safely upgraded and upgrading method

An electronic device, security upgrade technology, applied in the direction of program control device, program loading/starting, etc., to achieve the effect of security update

Active Publication Date: 2014-01-29
AMBIT MICROSYSTEMS (SHANGHAI) LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, electronic products equipped with such an embedded security system can only use the existing recovery system to update the system, while other electronic products without the embedded security system cannot use the update method of the embedded security system to update the system. security upgrade or update

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic device capable of being safely upgraded and upgrading method
  • Electronic device capable of being safely upgraded and upgrading method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0024] see figure 1 , is a block diagram of an electronic device that can be safely upgraded in an embodiment of the present invention. The electronic device 10 is an embedded system device, including a processor 11 , a first memory 12 and a second memory 13 . In this embodiment, the first memory 12 is a random access memory (Random-Access Memory, RAM), and the second memory 13 is a flash memory (flash memory).

[0025] The second memory 13 includes a first security list partition 130, a second security list partition 131, a user space file system (file system in user space, fuse) acquisition module partition 132, a judgment module partition 133, and a kernel (kernel) partition 134, They are respectively used to correspondingly store the first security list, the second security list, the execution program of the user space file system acquisition module, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An electronic device capable of being safely upgraded comprises a processor, a first memorizer and a second memorizer. When the electronic device is started, the processor calculates the Hash values of a plurality of executive program partitions in the second memorizer, and when the Hash values are determined to be correspondingly consistent with Hash values recorded in a first safety list, the executive program partitions are correspondingly carried out. Then, the processor calculates the Hash value of a system partition in the second memorizer again, and when the Hash value is determined to be consistent with the Hash value recorded in the second safety list, the electronic device correspondingly accesses an operation system to download an updating installation pack so that system upgrading can be carried out. The invention further provides a safe upgrading method. By means of the electronic device and the upgrading method, the hash values of the executive program partitions and the Hash value of the system partition in the memorizers are monitored, and the system can be safely upgraded.

Description

technical field [0001] The invention relates to the field of embedded software, in particular to an electronic device capable of safe upgrading and an upgrading method. Background technique [0002] Set multiple partitions for storing data in the embedded security system, such as uboot partition, uboot recovery (recovery uboot, r_uboot) partition, kernel (kernel) partition, kernel recovery (recovery kernel, r_kernel) partition, memory disk (ramdisk) partition, ramdisk recovery (recovery ramdisk, r_ramdisk) partition, and system partition, and the data stored in each partition needs to be protected to prevent malicious tampering. Usually, the hash values ​​of these partitions are stored in a security list partition, and the data integrity of each partition is determined by monitoring the hash value, so as to ensure that the data of each partition will not be tampered with at will. [0003] In view of this, electronic products with this embedded security system usually do not...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445
Inventor 李力人
Owner AMBIT MICROSYSTEMS (SHANGHAI) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products