<\/figure>\n\n\n\nThe Secure boot flow begins with the first boot code, which is typically stored in the SoCs ROM. This procedure allows the verification of the first boot code from within the chip, removing the need for any key injection and establishing an inborn root key. This can be used for decryption purposes during the following stage in the protocol.<\/p>\n\n\n\n
The next phase of the Secure Boot Flow usually stores the boot code in OTP non-volatile memory, allowing the programming to be completed separately from the chip\u2019s fabrication. This phased procedure of key generation, followed by decryption and verification, extends from hardware to firmware to the operating system and then, in turn, through the installation of each application.<\/p>\n\n\n\n
Phasing the Secure Boot Flow procedure allows each stage\u2019s authentication to be verified in a chain through each of the previous steps, with the chain of trust extending right back to the initial Hardware Root key.<\/p>\n","protected":false},"excerpt":{"rendered":"
The development of the boot process The booting of a ch […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"subjects":[228],"tech-tag":[],"class_list":["post-3142","technology","type-technology","status-publish","hentry","subjects-applications"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/technology\/3142"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/technology"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/types\/technology"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=3142"}],"version-history":[{"count":8,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/technology\/3142\/revisions"}],"predecessor-version":[{"id":4372,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/technology\/3142\/revisions\/4372"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=3142"}],"wp:term":[{"taxonomy":"subjects","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/subjects?post=3142"},{"taxonomy":"tech-tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/tech-tag?post=3142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}