METHOD AND APPARATUS FOR CHECKING INTEGRITY OF FIRMWARE
First Claim
Patent Images
1. A method of checking integrity of firmware, the method comprising:
- storing a first hash function value of unhacked firmware for determining whether firmware of an external processor has been hacked;
reading the firmware via a bus;
calculating a second hash function value of the firmware;
comparing the first hash function value with the second hash function value; and
sharing a bus key with the external processor, based on a result of the comparing.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are a method and apparatus for checking the integrity of firmware. The method includes storing a first hash function value of unhacked firmware for determining whether actual firmware of an external processor has been hacked; reading the actual firmware via a bus; calculating a second hash function value of the actual firmware; comparing the first hash function value with the second hash function value; and sharing a bus key with the external processor, based on the comparison result.
-
Citations
22 Claims
-
1. A method of checking integrity of firmware, the method comprising:
-
storing a first hash function value of unhacked firmware for determining whether firmware of an external processor has been hacked; reading the firmware via a bus; calculating a second hash function value of the firmware; comparing the first hash function value with the second hash function value; and sharing a bus key with the external processor, based on a result of the comparing. - View Dependent Claims (2, 3, 4)
-
-
5. A method of checking integrity of firmware, the method comprising:
-
storing an offset location and a data size of a part of unhacked firmware for determining whether firmware of an external processor has been hacked; storing a first hash function value of the part of the unhacked firmware; reading data corresponding to the offset location and the data size from the external processor; calculating a second hash function value of the read data; comparing the first hash function value with the second hash function value; and sharing a bus key with the external processor, based on a result of the comparing. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. A method of checking integrity of firmware, the method comprising:
-
performing an integrity check on firmware stored in an external processor; sharing a bus key with the external processor, based on a result of the performing the integrity check; and establishing enciphered data communication with the external processor, using the bus key.
-
-
13. An apparatus for checking integrity of firmware, the apparatus comprising:
-
a storage unit which stores a first hash function value of unhacked firmware for determining whether firmware of an external processor has been hacked; a firmware reading unit which reads the firmware via a bus; a hash value calculation unit which calculates a second hash function value of the firmware; a comparison unit which compares the first hash function value with the second hash function value; and a bus key sharing unit which shares a bus key with the external processor, based on a comparison result of the comparison unit. - View Dependent Claims (14, 15, 16)
-
-
17. An apparatus for checking integrity of firmware, the apparatus comprising:
-
a storage unit which stores an offset location, a data size, and a first hash function value of a part of unhacked firmware for determining whether firmware of an external processor has been hacked; a firmware reading unit which reads data corresponding to the offset location and the data size from the external processor; a hash value calculation unit which calculates a second hash function value of the read data; a comparison unit which compares the first hash function value with the second hash function value; and a bus key sharing unit which shares a bus key with the external processor, based on a comparison result received from the comparison unit. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A computer readable medium having recorded thereon a program for executing a method of checking integrity of firmware, the method comprising:
-
storing a first hash function value of unhacked firmware for determining whether firmware of an external processor has been hacked; reading the firmware via a bus; calculating a second hash function value of the firmware; comparing the first hash function value with the second hash function value; and sharing a bus key with the external processor, based on a result of the comparing.
-
Specification