CN102270288A - Method for performing trusted boot on operation system based on reverse integrity verification - Google Patents

Method for performing trusted boot on operation system based on reverse integrity verification Download PDF

Info

Publication number
CN102270288A
CN102270288A CN2011102616315A CN201110261631A CN102270288A CN 102270288 A CN102270288 A CN 102270288A CN 2011102616315 A CN2011102616315 A CN 2011102616315A CN 201110261631 A CN201110261631 A CN 201110261631A CN 102270288 A CN102270288 A CN 102270288A
Authority
CN
China
Prior art keywords
integrity verification
operating system
trusted
stage
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102616315A
Other languages
Chinese (zh)
Other versions
CN102270288B (en
Inventor
黄辰林
吴庆波
戴华东
何连跃
唐晓东
王蕾
孔金珠
付松龄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kirin Software Co Ltd
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN2011102616315A priority Critical patent/CN102270288B/en
Publication of CN102270288A publication Critical patent/CN102270288A/en
Application granted granted Critical
Publication of CN102270288B publication Critical patent/CN102270288B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for performing trusted boot on an operation system based on re verse integrity verification. The method comprises two steps of performing pre-measurement, namely, performing conventional boot by the operation system until the operation system starts to receive user input, and loading a pre-measurement program of the system, reading information of all system boot stages sequentially and performing first trusted measurement respectively by a system pre-measurement program and writing a result serving a trusted boot measurement value into a storage unit; and performing reverse integrity verification, namely, booting again by the operation system until the operation system starts to receive user input, and loading a reverse integrity verification module and the storage unit, reading trusted boot measurement values of all system boot stages by the reverse integrity verification module, reading information of all system boot stages sequentially and performing second trusted measurement, comparing the result and the trusted measurement values, and if the result is not equal to the trusted boot measurement values, setting the state of the system to be not trusted; and if the result is equal to the trusted boot measurement values, entering the next stage until the measurement is finished, and setting the operation system to be trusted. The method has the advantages of flexibility and usability.

Description

Operating system trusted bootstrap method based on reverse integrity verification
Technical field
The present invention relates to field of computer information security, relate in particular to a kind of trusted bootstrap method of operating system.
Background technology
Along with computer system, the becoming increasingly conspicuous of safety problem in the end system especially, the computer system under the network environment is faced with serious trust crisis.The main cause that infosystem produces safety problem is: main frame is soft, there is the design leak in hardware configuration; Legal users is not carried out strict authentication and authorization control, cause resource to be abused; Rogue program utilizes system vulnerability to destroy wantonly etc.To thoroughly address these problems, will solve the safety problem of end system after all from architecture, for system sets up believable computing environment.The credible calculating platform technology is exactly living therefrom.The credible calculating platform technology is by Trusted Computing tissue (Trusted Computing Group, TCG) propose, be intended to based on reliable hardware---credible platform module TPM(Trust Platform Module), and realize the transmission of trust chain making up believable computing environment by the continuous trust metrics in the system bootstrap process.
Trusted bootstrap is the core security function of credible calculating platform TPM, by trusted bootstrap, sets up the trusted computation environment of software application operation, guarantees the integrality of system hardware and software integral body.The trusted bootstrap process must guarantee following 3 points: the transmission successively that trust (1).When previous carry out entity measured and verified be credible and carry out after, it shifts control to next one and can carry out before the entity, must measure it earlier, verifies the transferable control in credible rear, is passed to next execution entity thereby trust.(2) all tolerance and the checking that relates in the process setting up of trust chain called and will finally be finished by the TPM authentication module.(3) trust chain is based upon and successively measures and verify on the basis, in proof procedure, is responsible for guaranteeing the integrality and the confidentiality of important secret data by TPM.All significant datas that relate in the chain-of-trust transmittance process, the identifying code that need prestore all must be preserved by TPM, can not use the Installed System Memory of memory storage movably or PC, and these data in use can not break away from TPM.TPM can not provide the external call interface of these data of visit, with the secret that guarantees these significant datas and credible.
At present, in based on the TPM computer system, trusted bootstrap mainly comprises two stages: the guiding of hardware platform and operating system the unloading phase.The guiding of hardware platform comprise from platform power up, BIOS runs to BIOS control given before the Boot.Mainly guarantee hardware environment credible during this.Operating system the unloading phase call in the operating system loading program until operating system nucleus operation finishes from master boot sector, and operation Init process.The start-up course of this stage principal security system and operating system nucleus credible.Based on the operating system of TPM the unloading phase in the trusted bootstrap process, basic step is as follows:
The first step: credible BIOS is according to the Boot program that is provided with in the operation boot sector; By the proving program among the TPM Boot program is carried out credible tolerance.If be proved to be successful, then Boot is read internal memory 0000:7C00h place, again control is handed to the CPU operation Boot program of hardware platform, enter the booting operating system stage.
Second step: by TPM verification operation system bootstrap routine Grub.If be proved to be successful, the Grub Stage1 guidance code that then will be positioned at Master boot sector is loaded into internal memory, and gives CPU operation Grub program with control, enters the operating system nucleus load phase.
The 3rd step: enter Grub Stage1 bootup process,,, then carry out the code in Stage1.5 stage, the load document system if be proved to be successful by the TPM code in checking Grub Stage1.5 stage.
The 4th step: enter Grub Stage2 bootup process,,, then carry out the code in Stage2 stage if be proved to be successful by the TPM code in checking Grub Stage2 stage.The code in Stage2 stage can read by the resident disk partition of the operating system of Grub guiding, kernel reflection and disk virtual RAM file initrd according to the information of configuration file/boot/Grub/Grub.conf configuration file.
The 5th step: open configuration file by Stage2, read operation system kernel reflection, by the integrality of TPM verification operation system kernel reflection, if be proved to be successful, then the load operation system kernel is videoed and transfers control.
The 6th step: operating system nucleus reflection loaded, by TPM checking Init process, after being proved to be successful, create the kernel key data structure, create and operation kernel Init process.
The 7th step: the Init process determines that according to system configuration needs load the finger daemon of kernel module and needs establishment, by its integrality of TPM module verification, and execution corresponding actions: load kernel module, create finger daemon, and beginning to receive user's input, entire machine enters normal executing state.
So far, the trusted bootstrap process of operating system finishes.Operating system trusted bootstrap process based on TPM realizes based on " forward integrity checking " process, i.e. " by realizing trusted bootstrap with the corresponding to integrity verification procedures of booting operating system process ".
The credible calculating platform technology has been introduced credible platform module TPM and relevant software as the trusted root of system, by the transmittance process of trusting, guarantees the trustworthiness of computing platform and application program, improves the security of terminal platform.But, seek out the various security features that TCG defines, special reliable hardware support just must be arranged, the major obstacle that this has become the technology popularization of restriction credible calculating platform to use.In whole trusted bootstrap process, the TPM chip is the basis that the Trusted Computing trust chain is transmitted.But the computing equipment that has disposed the TPM chip at present is also few, thereby has limited the range of application of reliable computing technology.
Summary of the invention
Technical matters to be solved by this invention is: at the problem of prior art existence, the invention provides a kind of integrity verification with data and executable file mirror image is main security means, with the stage integrity verification is main mode, the operating system trusted bootstrap that can replace TPM, and dirigibility and ease for use are better based on the operating system trusted bootstrap method of reverse integrity verification.
For solving the problems of the technologies described above, the present invention by the following technical solutions:
A kind of operating system trusted bootstrap method based on reverse integrity verification is characterized in that may further comprise the steps:
(1) pre-tolerance: operating system is carried out the routine guiding until beginning to receive user's input, loading system is measured program in advance, by system measure in advance program successively reading system guide the information in each stage, whenever read the information in a stage, just the information in described stage is carried out the credible tolerance first time, and for the first time the result of credible tolerance writes in the storage unit as the trusted bootstrap metric in described stage;
(2) reverse integrity verification: operating system guides once more until beginning to receive user's input, load reverse integrity verification module and described storage unit, guide the trusted bootstrap metric in each stage by described reverse integrity verification module reading system from described storage unit, and reading system guides the information in each stage successively, whenever read the information in a stage, just the information in described stage is carried out the credible tolerance second time, with the described second time credible tolerance the result and the trusted bootstrap metric in described stage compare, if the two is unequal, then is changed to system state insincere and activates corresponding trusted bootstrap failure handling procedure; Otherwise the second time that enters next stage, credible tolerance and comparison were finished until the tolerance in all stages of system bootstrap, and operating system is changed to trusted status, the success of operating system trusted bootstrap.
As a further improvement on the present invention:
In the above-mentioned method, the information in each stage of described system bootstrap comprises the fileinfo in following 9 stages that load successively:
1) BIOS information;
2) the Grub Stage1 data in the Master boot sector;
3) Grub Stage1.5 data;
4) data of Grub Stage2;
5) Grub configuration file;
6) kernel image file;
7) Init process data;
8) the Init process is according to the kernel module data of system configuration loading;
9) the Init process is according to the finger daemon data of system configuration loading;
Wherein, described BIOS information comprise the firmware layer of system platform hardware information information, realize system bootstrap initial period information and finish hardware and power up the feature operation information that booting operating system begins; The data of Grub Stage1 data in the described Master boot sector, Grub Stage1.5 data, Grub Stage2 and Init process belong to operating system nucleus according to the kernel module data that system configuration loads.
Described operating system is carried out routine guiding until beginning to receive user's input and described operating system guides once more until beginning to receive user's input, refers to successfully load up to the Init process from the BIOS loading.
Described system measures program in advance and described reverse integrity verification module is arranged in the operating system, and described storage unit is arranged among the USBKey.
Described loading system before the tolerance program, is carried out the PIN code checking to described USBKey earlier in advance, reloads described system after being proved to be successful and measures program in advance.
Described credible tolerance realizes that by the SHA1 algorithm SHA1 algoritic module defaults among the described USBKey.
Before the reverse integrity verification module of described loading, earlier described USBKey is carried out the PIN code checking,, then verify the legitimacy and the integrality of reverse integrity verification module, after being proved to be successful, load described reverse integrity verification module as if success.
When the legitimacy of verifying reverse integrity verification module and integrality, specific implementation is: adopt a customer digital certificate that described reverse integrity verification module is carried out Digest Authentication and signature authentication, described customer digital certificate is stored among the described USBKey, and the algoritic module of described Digest Authentication and signature verification also defaults among the described USBKey.
Compared with prior art, the invention has the advantages that:
1, the operating system trusted bootstrap method based on reverse integrity verification of the present invention, integrity verification with data and executable file mirror image is main security means, with the stage integrity verification is main mode, thereby insensitive, and can guarantee the integrality of software function code to the module loading in booting operating system process order; Compare with the operating system trusted bootstrap process based on TPM, the present invention has better dirigibility and ease for use.
2, the operating system trusted bootstrap method based on reverse integrity verification of the present invention on the computing machine that does not possess the TPM chip, has been realized the trusted bootstrap of operating system based on USBKey, has promoted the range of application of reliable computing technology greatly; Simplified the environment of trusted bootstrap, by the authenticate reverse method, the checking of the system integrity of any stage of back-up system bootup process.
Description of drawings
Fig. 1 is the synoptic diagram that concerns between USBKey in the specific embodiments of the invention and the operating system module that relates to;
Fig. 2 is the pre-metrology step schematic flow sheet in the specific embodiment of the invention;
Fig. 3 is the reverse integrity verification steps flow chart synoptic diagram in the specific embodiment of the invention.
Embodiment
Below with reference to Figure of description and specific embodiment the present invention is described in further detail.
As shown in Figure 1, the operating system trusted bootstrap method based on reverse integrity verification of the present invention is by operating system nucleus, BIOS(firmware), the USBKey(USB smart card) three parts cooperate to realize.Operating system nucleus is the basic environment of software systems operation, finishes the driving loading of system hardware and the structure of system's execution environment.In the system bootstrap process, operating system nucleus comprises Stage 1, Stage 1.5, the Stage 2 of system bootstrap and the kernel module that loads afterwards.BIOS has been contained the firmware layer of system platform hardware information, realizes the initial period of system bootstrap, finishes hardware and powers up the feature operation that booting operating system begins.In the present embodiment, the USBKey that uses is built-in CPU, storer and chip operating system (COS), and inside has secure data storage space (in the present embodiment, being storage unit), can store secret datas such as customer digital certificate, key.USBKey inside also is provided with a computing unit, supports " locked in " operations such as SHA1 algorithm, signature, authentication, data encrypting and deciphering, data summarization, can utilize the completeness check of its realization to data.
As Fig. 2, shown in Figure 3, the operating system trusted bootstrap method based on reverse integrity verification of the present invention may further comprise the steps:
1, pre-tolerance: operating system is carried out the routine guiding until beginning to receive user's input, loading system is measured program in advance, by system measure in advance program successively reading system guide the information in each stage, whenever read the information in a stage, just the information in this stage is carried out the credible tolerance first time, and for the first time the result of credible tolerance is written in the storage unit as the trusted bootstrap metric in this stage; As shown in Figure 2, its concrete steps are as follows:
1.1 operating system is carried out the routine guiding until beginning to receive user's input, promptly successfully loads up to the Init process from the BIOS loading, at this moment, inserts USBKey, carries out the PIN code checking, if successful then operational system is measured program in advance, otherwise tolerance failure in advance;
1.2 by system in advance the tolerance program read BIOS information, and adopt the SHA1 algoritic module be located among the USBKey to carry out credible tolerance, will measure the result as the BIOS metric, deposit in the storage unit of USBKey.
The SHA1 algorithm, promptly Secure Hash Algorithm (Secure Hash Algorithm) mainly is applicable to the Digital Signature Algorithm (Digital Signature Algorithm DSA) in the Digital Signature Standard (Digital Signature Standard DSS).For the message of length less than the 2^64 position, the SHA1 algorithm can produce one 160 eap-message digest; When receiving message, this eap-message digest can be used for the integrality (closed specification of SHA1 algorithm, can with reference to the standard FIPS 180-2:Secure Hash Standard (SHS) of NIST NSA website http://www.itl.nist.gov/fipspubs) of verification msg.
1.3 by system in advance the tolerance program read Grub Stage1 data in the Master boot sector, and adopt the SHA1 algoritic module of being located among the USBKey to carry out credible tolerance, will measure the result as Grub Stage1 metric, deposit in the storage unit of USBKey;
1.4 system's tolerance program in advance reads the code data of Grub Stage1.5, and adopts the SHA1 algoritic module of being located among the USBKey to carry out credible tolerance, will measure the result as Grub Stage1.5 metric, deposits in the storage unit of USBKey;
1.5 system's tolerance program in advance reads the code data of Grub Stage2, and adopts the SHA1 algoritic module of being located among the USBKey to carry out credible tolerance, will measure the result as Grub Stage2 metric, deposits in the storage unit of USBKey;
1.6 system's tolerance program in advance reads Grub configuration file :/boot/Grub/Grub.conf, and adopts the SHA1 algoritic module of being located among the USBKey to carry out credible tolerance, will measure the result as Grub configuration file metric, deposits in the storage unit of USBKey;
1.7 system measures program read operation system kernel image file in advance, and adopts the SHA1 algoritic module of being located among the USBKey to carry out credible tolerance, will measure the result as operating system nucleus mapping degree value, deposits in the storage unit of USBKey;
1.8 system's tolerance program in advance reads the Init process data, and carries out credible tolerance with USBKey, will measure the result as Init process metric, deposits in the storage unit of USBKey;
1.9 system's tolerance program in advance reads subsequent load kernel module data, and carries out credible tolerance with USBKey, will measure the result as the kernel module metric, deposits in the storage unit of USBKey;
1.10 system's tolerance program in advance reads subsequent load finger daemon data, and carries out credible tolerance with USBKey, will measure the result as the finger daemon metric, deposits in the storage unit of USBKey;
1.11 utilize the customer digital certificate among the USBKey, with USBKey reverse integrity verification module Rev_Verify_Mod is made a summary and signature verification, and with the result as digest value, deposit in the storage unit of USBKey;
1.12 the pre-metrics process of system finishes, and withdraws from pre-tolerance program.
2, reverse integrity verification: operating system guides once more until beginning to receive user's input, load reverse integrity verification module and described storage unit, guide the trusted bootstrap metric in each stage by described reverse integrity verification module reading system from described storage unit, and reading system guides the information in each stage successively, whenever read the information in a stage, just the information in described stage is carried out the credible tolerance second time, with the described second time credible tolerance the result and the trusted bootstrap metric in described stage compare, if the two is unequal, then is changed to system state insincere and activates corresponding trusted bootstrap failure handling procedure; Otherwise the second time that enters next stage, credible tolerance and comparison were finished until the tolerance in all stages of system bootstrap, and operating system is changed to trusted status, the success of operating system trusted bootstrap.As shown in Figure 3, its concrete steps are as follows:
2.1 insert USBKey, operating system guides once more until beginning to receive user's input, promptly loads until the Init process successfully loads from BIOS;
Drive 2.2 load USBKey, and carry out the PIN code checking of USBKey by the Init process;
2.3 if PIN code is proved to be successful, USBKey successfully loads, then verify that with USBKey the legitimacy of reverse integrity verification module Rev_Verify_Mod and integrality are (in the present embodiment, adopt customer digital certificate to make a summary and signature verification, this customer digital certificate is stored among the above-mentioned USBKey, and the algoritic module of Digest Authentication and signature verification also defaults among this USBKey), the digest value of storage in checking result and the step 1.11 is compared, if the two is identical, then be proved to be successful; Load reverse integrity verification module Rev_Verify_Mod by operating system nucleus, and give Rev_Verify_Mod module control;
2.4 read the trusted bootstrap metric in each stage of booting operating system of writing down the pre-metrics process by the Rev_Verify_Mod module from the USBKey secure storage section, comprise BIOS metric, Grub Stage1 metric, Grub Stage1.5 metric, Grub Stage2 metric, Grub configuration file metric, operating system nucleus mapping degree value, Init process metric, kernel module metric and finger daemon metric;
2.5 read BIOS information by the Rev_Verify_Mod module, and carry out credible tolerance,, then measure successfully if equate with the BIOS metric comparison of tolerance result and record with USBKey; Otherwise, system state is changed to insincere;
2.6 read the data of Grub Stage1 by the Rev_Verify_Mod module, and carry out credible tolerance with USBKey, will the tolerance result and the Grub Stage 1 metric comparison of record, if equal then tolerance successfully; Otherwise, system state is changed to insincere;
2.7 read the data of Grub Stage1.5 by the Rev_Verify_Mod module, and carry out credible tolerance with USBKey, will the tolerance result and the Grub Stage 1.5 metrics comparison of record, if equal then tolerance successfully; Otherwise, system state is changed to insincere;
2.8 read the data of Grub Stage2 by the Rev_Verify_Mod module, and carry out credible tolerance with USBKey, will the tolerance result and the Grub Stage 2 metrics comparison of record, if equal then tolerance successfully; Otherwise, system state is changed to insincere;
2.9 read the Grub configuration file by the Rev_Verify_Mod module, and carry out credible tolerance,, then measure successfully if equate with the Grub configuration file metric comparison of tolerance result and record with USBKey; Otherwise, system state is changed to insincere;
2.10 by Rev_Verify_Mod module read operation system kernel image file, and carry out credible tolerance with USBKey, will the tolerance result and the operating system nucleus mapping degree value comparison of record, if equal then tolerance successfully; Otherwise, system state is changed to insincere;
2.11 read Init process execute file by the Rev_Verify_Mod module, and carry out credible tolerance,, then measure successfully if equate with the Init process metric comparison of tolerance result and record with USBKey; Otherwise, system state is changed to insincere;
2.12 read the kernel module data of subsequent load by the Rev_Verify_Mod module, and carry out credible tolerance with USBKey, will measure the comparison of result and kernel module metric, then measure successfully if equate; Otherwise, system state is changed to insincere;
2.13 read finger daemon execute file data by the Rev_Verify_Mod module, and carry out credible tolerance with USBKey, will measure the comparison of result and finger daemon metric, if equate then to measure successfully, otherwise, system state is changed to insincere;
2.14 the booting operating system process is finished, in above-mentioned reverse integrity verification procedures, if insincere tolerance result appears in any link, then the system bootstrap state is changed to insincere, and activate corresponding trusted bootstrap failure handling procedure, as the suspension system bootup process or change insincere bootup process over to; If all integrity measurements are success all, then operating system is changed to trusted status, the trusted bootstrap success.
2.15 based on the operating system trusted bootstrap success of reverse integrity verification, system enters credible running environment.
In summary, the pre-metric module of system can realize the pre-metric function of operating system trusted bootstrap.Reverse integrity verification module Rev_Verify_Mod is used for realizing the integrity verification function based on each module of operating system trusted bootstrap process of USBKey.Pre-metric module of system and reverse integrity verification module all are located in the operating system.
As shown in Figure 1, in the present embodiment, the algoritic module of storage unit, SHA1 algoritic module, customer digital certificate, Digest Authentication and signature verification all defaults among the USBKey.USBKey has that cost is low, flexible function, safe, characteristics such as be easy to carry about with one, and compares with the TPM chip to have higher application flexibility, and the similar security function with TPM can be provided.USBKey has the secure data storage space, can store secret datas such as digital certificate, key, read-write operation to this storage space must be realized by program, the user can't directly read, wherein user key can not be derived, and has stopped to duplicate the possibility of customer digital certificate or identity information.USBKey is built-in CPU can realize various algorithms such as encryption and decryption and signature, and the encryption and decryption computing carries out in USBKey, has guaranteed that key can not appear in the calculator memory, thereby has stopped the possibility that user key is intercepted by the hacker.Thereby, realize the operating system trusted bootstrap method based on reverse integrity verification of the present invention with USBKey, not only security of system can be protected, and dirigibility and ease for use are better.
The above only is a preferred implementation of the present invention, and protection scope of the present invention also not only is confined to the foregoing description, and all technical schemes that belongs under the thinking of the present invention all belong to protection scope of the present invention.Should be pointed out that for those skilled in the art the some improvements and modifications not breaking away under the principle of the invention prerequisite should be considered as protection scope of the present invention.

Claims (8)

1. operating system trusted bootstrap method based on reverse integrity verification is characterized in that may further comprise the steps:
(1) pre-tolerance: operating system is carried out the routine guiding until beginning to receive user's input, and loading system is measured program in advance; By system measure in advance program successively reading system guide the information in each stage, whenever read the information in a stage, just the information in described stage is carried out the credible tolerance first time, and for the first time the result of credible tolerance writes in the storage unit as the trusted bootstrap metric in described stage;
(2) reverse integrity verification: operating system guides once more until beginning to receive user's input, load reverse integrity verification module and described storage unit, guide the trusted bootstrap metric in each stage by described reverse integrity verification module reading system from described storage unit, and reading system guides the information in each stage successively, whenever read the information in a stage, just the information in described stage is carried out the credible tolerance second time; With the described second time credible tolerance the result and the trusted bootstrap metric in described stage compare, if the two is unequal, then is changed to system state insincere and activates corresponding trusted bootstrap failure handling procedure; Otherwise the second time that enters next stage, credible tolerance and comparison were finished until the tolerance in all stages of system bootstrap, and operating system is changed to trusted status, the success of operating system trusted bootstrap.
2. the operating system trusted bootstrap method based on reverse integrity verification according to claim 1 is characterized in that, the information in each stage of described system bootstrap comprises the fileinfo in following 9 stages that load successively:
1) BIOS information;
2) the Grub Stage1 data in the Master boot sector;
3) Grub Stage1.5 data;
4) data of Grub Stage2;
5) Grub configuration file;
6) kernel image file;
7) Init process data;
8) the Init process is according to the kernel module data of system configuration loading;
9) the Init process is according to the finger daemon data of system configuration loading;
Wherein, described BIOS information comprise the firmware layer of system platform hardware information information, realize system bootstrap initial period information and finish hardware and power up the feature operation information that booting operating system begins; The data of Grub Stage1 data in the described Master boot sector, Grub Stage1.5 data, Grub Stage2 and Init process belong to operating system nucleus according to the kernel module data that system configuration loads.
3. the operating system trusted bootstrap method based on reverse integrity verification according to claim 2, it is characterized in that, described operating system is carried out routine guiding until beginning to receive user's input and described operating system guides once more until beginning to receive user's input, refers to successfully load up to the Init process from the BIOS loading.
4. according to claim 1 or 2 or 3 described operating system trusted bootstrap methods based on reverse integrity verification, it is characterized in that, described system measures program in advance and described reverse integrity verification module is arranged in the operating system, and described storage unit is arranged among the USBKey.
5. the operating system trusted bootstrap method based on reverse integrity verification according to claim 4, it is characterized in that, described loading system before the tolerance program, is carried out the PIN code checking to described USBKey earlier in advance, reloads described system after being proved to be successful and measures program in advance.
6. the operating system trusted bootstrap method based on reverse integrity verification according to claim 4 is characterized in that, described credible tolerance realizes that by the SHA1 algorithm SHA1 algoritic module defaults among the described USBKey.
7. the operating system trusted bootstrap method based on reverse integrity verification according to claim 4, it is characterized in that, before the reverse integrity verification module of described loading, earlier described USBKey is carried out the PIN code checking, if success, then verify the legitimacy and the integrality of reverse integrity verification module, after being proved to be successful, load described reverse integrity verification module.
8. the operating system trusted bootstrap method based on reverse integrity verification according to claim 7, it is characterized in that, when the legitimacy of verifying reverse integrity verification module and integrality, adopt a customer digital certificate that described reverse integrity verification module is carried out Digest Authentication and signature authentication, described customer digital certificate is stored among the described USBKey, and the algoritic module of described Digest Authentication and signature verification also defaults among the described USBKey.
CN2011102616315A 2011-09-06 2011-09-06 Method for performing trusted boot on operation system based on reverse integrity verification Active CN102270288B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011102616315A CN102270288B (en) 2011-09-06 2011-09-06 Method for performing trusted boot on operation system based on reverse integrity verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011102616315A CN102270288B (en) 2011-09-06 2011-09-06 Method for performing trusted boot on operation system based on reverse integrity verification

Publications (2)

Publication Number Publication Date
CN102270288A true CN102270288A (en) 2011-12-07
CN102270288B CN102270288B (en) 2013-04-03

Family

ID=45052591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011102616315A Active CN102270288B (en) 2011-09-06 2011-09-06 Method for performing trusted boot on operation system based on reverse integrity verification

Country Status (1)

Country Link
CN (1) CN102270288B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750471A (en) * 2012-05-22 2012-10-24 中国科学院计算技术研究所 Local verification type starting method based on trusted platform module (TPM)
CN104253813A (en) * 2014-09-05 2014-12-31 国电南瑞科技股份有限公司 Modulation integrated system remote maintenance-based safety protection method
CN104751063A (en) * 2014-12-31 2015-07-01 国家电网公司 Operation system trusted guide method based on real mode technology
CN104881345A (en) * 2015-05-25 2015-09-02 上海兆芯集成电路有限公司 Central processing unit and computer power-on self-test method
CN105678162A (en) * 2016-02-03 2016-06-15 浪潮电子信息产业股份有限公司 TPM-based control method for safe startup of operating system
CN107451479A (en) * 2017-07-31 2017-12-08 浪潮(北京)电子信息产业有限公司 The construction method and system of a kind of trust chain
CN107657170A (en) * 2016-07-25 2018-02-02 北京计算机技术及应用研究所 The Trusted Loading for supporting intelligently to repair starts control system and method
CN107679425A (en) * 2017-09-26 2018-02-09 天津麒麟信息技术有限公司 A kind of credible startup method of the joint full disk encryption based on firmware and USBkey
CN107944279A (en) * 2017-12-19 2018-04-20 郑州云海信息技术有限公司 BIOS vulnerability scanners and scan method based on UEFI
CN108021798A (en) * 2017-12-21 2018-05-11 鸿秦(北京)科技有限公司 A kind of trusted operating system based on USBkey
CN108241798A (en) * 2017-12-22 2018-07-03 北京车和家信息技术有限公司 Prevent the method, apparatus and system of brush machine
CN109492404A (en) * 2018-11-01 2019-03-19 北京京航计算通讯研究所 A kind of trusted booting system suitable for VxWorks environment
CN111159762A (en) * 2019-12-23 2020-05-15 北京工业大学 Method and system for verifying credibility of main body under mandatory access control
CN112163216A (en) * 2020-08-28 2021-01-01 中国电力科学研究院有限公司 Method and system for establishing safe computing environment of intelligent electric energy meter
CN112270010A (en) * 2020-11-17 2021-01-26 上海好连网络科技有限公司 Method for remotely and safely loading executable file
CN112329005A (en) * 2020-11-06 2021-02-05 中国电子信息产业集团有限公司 Boot measurement method, device, electronic equipment and medium for starting operating system
CN112445537A (en) * 2020-12-11 2021-03-05 中国科学院信息工程研究所 Trusted starting method and device of operating system, mobile terminal and storage medium
CN113051584A (en) * 2021-05-31 2021-06-29 武汉深之度科技有限公司 System secure starting method and device, computing equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1702590A (en) * 2004-12-02 2005-11-30 联想(北京)有限公司 Method for establishing trustable operational environment in a computer
CN101038556A (en) * 2007-04-30 2007-09-19 中国科学院软件研究所 Trusted bootstrap method and system thereof
US20100115625A1 (en) * 2008-10-31 2010-05-06 Graeme John Proudler Policy enforcement in trusted platforms

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1702590A (en) * 2004-12-02 2005-11-30 联想(北京)有限公司 Method for establishing trustable operational environment in a computer
CN101038556A (en) * 2007-04-30 2007-09-19 中国科学院软件研究所 Trusted bootstrap method and system thereof
US20100115625A1 (en) * 2008-10-31 2010-05-06 Graeme John Proudler Policy enforcement in trusted platforms

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750471A (en) * 2012-05-22 2012-10-24 中国科学院计算技术研究所 Local verification type starting method based on trusted platform module (TPM)
CN104253813A (en) * 2014-09-05 2014-12-31 国电南瑞科技股份有限公司 Modulation integrated system remote maintenance-based safety protection method
CN104751063B (en) * 2014-12-31 2018-08-14 国家电网公司 A kind of operating system trusted bootstrap method based on real pattern technology
CN104751063A (en) * 2014-12-31 2015-07-01 国家电网公司 Operation system trusted guide method based on real mode technology
CN104881345A (en) * 2015-05-25 2015-09-02 上海兆芯集成电路有限公司 Central processing unit and computer power-on self-test method
CN104881345B (en) * 2015-05-25 2018-10-23 上海兆芯集成电路有限公司 The method of central processing unit and computer booting self-test
CN105678162A (en) * 2016-02-03 2016-06-15 浪潮电子信息产业股份有限公司 TPM-based control method for safe startup of operating system
CN105678162B (en) * 2016-02-03 2018-09-04 浪潮电子信息产业股份有限公司 A kind of operating system security startup control method based on TPM
CN107657170A (en) * 2016-07-25 2018-02-02 北京计算机技术及应用研究所 The Trusted Loading for supporting intelligently to repair starts control system and method
CN107657170B (en) * 2016-07-25 2020-12-01 北京计算机技术及应用研究所 Trusted loading starting control system and method supporting intelligent repair
CN107451479A (en) * 2017-07-31 2017-12-08 浪潮(北京)电子信息产业有限公司 The construction method and system of a kind of trust chain
CN107679425A (en) * 2017-09-26 2018-02-09 天津麒麟信息技术有限公司 A kind of credible startup method of the joint full disk encryption based on firmware and USBkey
CN107679425B (en) * 2017-09-26 2020-09-04 麒麟软件有限公司 Trusted boot method based on firmware and USBKey combined full disk encryption
CN107944279A (en) * 2017-12-19 2018-04-20 郑州云海信息技术有限公司 BIOS vulnerability scanners and scan method based on UEFI
CN108021798A (en) * 2017-12-21 2018-05-11 鸿秦(北京)科技有限公司 A kind of trusted operating system based on USBkey
CN108241798A (en) * 2017-12-22 2018-07-03 北京车和家信息技术有限公司 Prevent the method, apparatus and system of brush machine
CN109492404A (en) * 2018-11-01 2019-03-19 北京京航计算通讯研究所 A kind of trusted booting system suitable for VxWorks environment
CN111159762A (en) * 2019-12-23 2020-05-15 北京工业大学 Method and system for verifying credibility of main body under mandatory access control
CN112163216A (en) * 2020-08-28 2021-01-01 中国电力科学研究院有限公司 Method and system for establishing safe computing environment of intelligent electric energy meter
CN112163216B (en) * 2020-08-28 2022-04-01 中国电力科学研究院有限公司 Method and system for establishing safe computing environment of intelligent electric energy meter
CN112329005A (en) * 2020-11-06 2021-02-05 中国电子信息产业集团有限公司 Boot measurement method, device, electronic equipment and medium for starting operating system
CN112270010A (en) * 2020-11-17 2021-01-26 上海好连网络科技有限公司 Method for remotely and safely loading executable file
CN112270010B (en) * 2020-11-17 2024-04-12 上海好连网络科技有限公司 Remote safe loading method for executable file
CN112445537A (en) * 2020-12-11 2021-03-05 中国科学院信息工程研究所 Trusted starting method and device of operating system, mobile terminal and storage medium
CN112445537B (en) * 2020-12-11 2022-04-15 中国科学院信息工程研究所 Trusted starting method and device of operating system, mobile terminal and storage medium
CN113051584A (en) * 2021-05-31 2021-06-29 武汉深之度科技有限公司 System secure starting method and device, computing equipment and readable storage medium

Also Published As

Publication number Publication date
CN102270288B (en) 2013-04-03

Similar Documents

Publication Publication Date Title
CN102270288B (en) Method for performing trusted boot on operation system based on reverse integrity verification
US7594124B2 (en) Cross validation of data using multiple subsystems
WO2020192406A1 (en) Method and apparatus for data storage and verification
EP3125149B1 (en) Systems and methods for securely booting a computer with a trusted processing module
US8560845B2 (en) System and method for tamper-resistant booting
US8332604B2 (en) Methods to securely bind an encryption key to a storage device
EP2727040B1 (en) A secure hosted execution architecture
EP3458999A1 (en) Self-contained cryptographic boot policy validation
US20110280402A1 (en) Methods and systems for utilizing cryptographic functions of a cryptographic co-processor
US20110093693A1 (en) Binding a cryptographic module to a platform
CN104951701B (en) A kind of method of the terminal device booting operating system based on USB controller
US8909929B2 (en) Stored public key validity registers for cryptographic devices and systems
EP3757838B1 (en) Warm boot attack mitigations for non-volatile memory modules
US8108905B2 (en) System and method for an isolated process to control address translation
CN101908115B (en) Method for realizing software trusted execution based on trusted platform module
CN109583197B (en) Trusted overlay file encryption and decryption method
US8844024B1 (en) Systems and methods for using tiered signing certificates to manage the behavior of executables
CN102542698B (en) Safety protective method of electric power mobile payment terminal
CN109583196A (en) A kind of key generation method
Huang et al. Research on Linux trusted boot method based on reverse integrity verification
CN117786667A (en) Process authority management method, system and storage medium for controllable computation
CN109598150A (en) A kind of key application method
Drennan Secure Block Storage
RU2007148810A (en) METHOD FOR TRUSTED DOWNLOAD OF OPERATING SYSTEM OF SOFTWARE AND HARDWARE COMPLEX

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20170608

Address after: 300459, No. 399, Xiang Xiang Road, Tanggu hi tech Zone, Tianjin Binhai New Area

Patentee after: Tianjin Binhai New Area Civil and Military Integration Innovation Research Institute

Address before: Zheng Jie in Hunan province 410073 city Changsha Yan w pool No. 47 Chinese PLA National Defense University of science and technology of Computer Science

Patentee before: National University of Defense Technology of People's Liberation Army of China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180320

Address after: 300459 Tianjin city of Tanggu Binhai New Area of marine science and Technology Park principal business square No. 3

Patentee after: Tianjin kylin Information Technology Co., Ltd.

Address before: 300459, No. 399, Xiang Xiang Road, Tanggu hi tech Zone, Tianjin Binhai New Area

Patentee before: Tianjin Binhai New Area Civil and Military Integration Innovation Research Institute

TR01 Transfer of patent right
CP03 Change of name, title or address

Address after: 300450 6-8 / F, building 3, Xin'an venture Plaza, Tanggu Marine Science Park, Binhai high tech Zone, Binhai New Area, Tianjin

Patentee after: Kirin Software Co., Ltd

Address before: 300459 Tianjin city of Tanggu Binhai New Area of marine science and Technology Park principal business square No. 3

Patentee before: TIANJIN KYLIN INFORMATION TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address