Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure software downloading and starting method

A software download and security technology, applied in the direction of program loading/starting, computer security devices, electrical components, etc., can solve the problem of destroying equipment security and achieve the effect of equipment security

Active Publication Date: 2017-03-08
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This download channel is also used by attackers to download illegal programs and destroy the security of the device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure software downloading and starting method
  • Secure software downloading and starting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The safe software downloading and starting method includes a hardware verification program, a software starting program, and a download instruction processing program. The method can realize safe software downloading and self-starting. The device using this method stores the download flag field in the non-volatile memory; also stores the respective length fields and self-checking fields of the startup program, the download program and the application program.

[0023] see figure 1 After the device using the safe software download and startup method is started, the hardware logic circuit first checks the startup program implemented by the software. This is because the hardware logic circuit is not easily attacked by an attacker compared with the software program, so the hardware logic circuit first checks the startup program implemented by the software to ensure that the startup program has not been tampered with by the attacker. Then start the program or hardware logi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure software downloading and starting method. The method comprises the following steps of 1, checking a startup program realized by software by adopting a hardware logic circuit; 2, reading a downloading flag field by the startup program or the hardware logic circuit; and 3, if the downloading flag field displays that an existing device is in an application downloadable stage, checking a downloading instruction processing program by the startup program, and then executing the downloading instruction processing program; and if the downloading flag field displays that the existing device is in an application non-downloadable stage, checking an application by the startup program, and then executing the application. According to the method, attacks performed on the device by attackers through adopting different means can be resisted, so that the device security is improved.

Description

technical field [0001] The invention relates to the technical field of security chip design, in particular to a safe software download and startup method. Background technique [0002] An attacker can rewrite the program in the memory by means of physical attack to achieve illegal purposes. This attack is generally carried out when the device is turned off. [0003] In addition, after the equipment is produced, it is generally necessary to use different application programs according to the individual needs of each user. These applications are stored in the device's non-volatile memory. This means that after the device is produced, there will be a download channel for users to download applications. [0004] This download channel is also used by attackers to download illegal programs and destroy the security of the device. [0005] How to prevent these attack means and make the equipment more secure is the problem to be solved by the present invention. Contents of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445G06F21/60H04L29/08
CPCG06F9/44505G06F21/606H04L67/06
Inventor 王吉健
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products