CN103927490A - OS secure startup method and device - Google Patents

OS secure startup method and device Download PDF

Info

Publication number
CN103927490A
CN103927490A CN201410172838.9A CN201410172838A CN103927490A CN 103927490 A CN103927490 A CN 103927490A CN 201410172838 A CN201410172838 A CN 201410172838A CN 103927490 A CN103927490 A CN 103927490A
Authority
CN
China
Prior art keywords
operating system
tolerance result
hash algorithm
tolerance
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410172838.9A
Other languages
Chinese (zh)
Inventor
杨青
蒋小安
施迅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201410172838.9A priority Critical patent/CN103927490A/en
Publication of CN103927490A publication Critical patent/CN103927490A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

The embodiment of the invention provides an OS secure startup method and device. The method includes the steps that signature verification is conducted on the UEFI BIOS, and signature verification is conducted on guidance programs of an OS if the UEFI BIOS passes the signature verification; the guidance programs, passing the signature verification, of the OS are measured through a secure hash algorithm, and the obtained measurement result serves as a trust root; the trust root serves as an initial value, and multiple configuration files of the OS are sequentially measured; the obtained final measurement result is compared with an expected secure value, and whether the OS is safely started or not is verified. By means of the OS secure startup method and device, security is verified through the method that the guidance programs of the OS pass the digital signature verification, the guidance programs, measured to be secure, of the OS generate the trust root, the OS is measured level by level according to the trust root, a trusted chain extends to the OS from the BIOS, and the problem that in the prior art, security of programs started after the Boot Loader can not be ensured is solved.

Description

Operating system security starting method and device
Technical field
The embodiment of the present invention relates to field of computer technology, relates in particular to a kind of operating system security starting method and device.
Background technology
In the current information age, protection information safety, provides a reliable computing environment to become informationalized inevitable requirement.Along with the quick differentiation of Malware; Malware is by Basic Input or Output System (BIOS) (Basic Input Output System; be called for short BIOS) as first-selected target of attack; the more difficult defence of virus that bottom firmware and start-up routine are attacked, so the credible and security of protection calculation machine start-up course is particularly important.
BIOS is solidificated in a read-only memory (Read-Only Memory on computer motherboard, be called for short ROM) in chip, program, startup self-detection program and system self-triggered program, the editmenu of the most important basic input and output of its in store computing machine.Its major function provides the bottom, the most direct hardware setting, control and access for computing machine.Clean boot is the unified fixed interface expanded (Unified Extensible Firmware Interface, be called for short UEFI) a kind of firmware validation method of standard specification definition, specification description how Administrative Security certificate, firmware validation of platform firmware, and interface between firmware and operating system, object is the intrusion that prevents Malware.Clean boot adopts the authentication method of data signature and key.When mainboard dispatches from the factory, can more built-in reliable PKIs, anyly want the operating system or the hardware drive program that load on this piece mainboard, all must be by the certification of these keys, that is to say, these softwares must be signed with corresponding private key, otherwise mainboard refusal loads.
The start-up course of whole operating system roughly can be divided into BIOS startup, start-up loading device BootLoader startup, os starting.Boot Loader is operating system nucleus operation one section of small routine of operation before, be positioned at Main Boot Record (Master Boot Record, be called for short MBR) in, be booting operating system program, after BIOS has started, control transferred to the loading initiating task of BootLoader complete operation system.Clean boot can only ensure the credible of BIOS and BootLoader program in start-up course, cannot ensure the safety of start-up routine after BootLoader.
Summary of the invention
The embodiment of the present invention provides a kind of operating system security starting method and device, cannot ensure the BootLoader safety of start-up routine afterwards to overcome in prior art.
First aspect, the embodiment of the present invention provides a kind of operating system security starting method, comprising:
Unified Extensible Firmware Interface Basic Input or Output System (BIOS) UEFI BIOS is carried out to signature authentication, after passing through if authenticate, booting operating system program is carried out to signature authentication;
Use Secure Hash Algorithm to certification by after described booting operating system program measure, using the tolerance result drawing as trusted root;
Using described trusted root as initial value, measure successively multiple operating system configuration files;
Obtain final tolerance result and the safety value of expectation and compare, verify operating system described in whether clean boot.
In conjunction with first aspect, in the possible implementation of the first of first aspect, described using described trusted root as initial value, measure successively multiple operating system configuration files, comprising:
Use Secure Hash Algorithm to measure to described operating system configuration file, tolerance result and described initial value are measured again as the input value of Secure Hash Algorithm, using the value drawing as tolerance result, and using described tolerance result as new initial value, next operating system configuration file is measured, until all operations CONFIG.SYS has been measured.
In conjunction with the possible implementation of the first of first aspect, first aspect, in the possible implementation of the second of first aspect, describedly obtain final tolerance result and the safety value of expectation compares, verify operating system described in whether clean boot, comprising:
If final described tolerance result is consistent with the safety value of described expectation, operating system described in clean boot; If inconsistent, do not start described operating system.
In conjunction with the possible implementation of the second of first aspect, in the third possible implementation of first aspect, also comprise:
On credible platform module TPM, carry out the tolerance of Secure Hash Algorithm;
In platform configuration register PCR by described tolerance result store in described TPM.
Second aspect, the embodiment of the present invention provides a kind of operating system security starter gear, comprising:
Signature verification module, carries out signature authentication for the Extensible Firmware Interface Basic Input or Output System (BIOS) UEFI BIOS to unified, after passing through, booting operating system program is carried out to signature authentication if authenticate;
Metric module, for use Secure Hash Algorithm to certification by after described booting operating system program measure, using the tolerance result drawing as trusted root;
Described metric module, also, for using described trusted root as initial value, measures multiple operating system configuration files successively;
Authentication module, compares for obtaining final tolerance result and the safety value of expectation, verifies operating system described in whether clean boot.
In conjunction with second aspect, in the possible implementation of the first of second aspect, described metric module, specifically for:
Use Secure Hash Algorithm to measure to described operating system configuration file, tolerance result and described initial value are measured again as the input value of Secure Hash Algorithm, using the value drawing as tolerance result, and using described tolerance result as new initial value, next operating system configuration file is measured, until all operations CONFIG.SYS has been measured.
In conjunction with the possible implementation of the first of second aspect, second aspect, in the possible implementation of the second of second aspect, described authentication module, specifically for:
If final described tolerance result is consistent with the safety value of described expectation, operating system described in clean boot; If inconsistent, do not start described operating system.
In conjunction with the possible implementation of the second of second aspect, in the third possible implementation of second aspect, described metric module comprises credible platform module TPM, for carry out the tolerance of Secure Hash Algorithm on described TPM;
Described device also comprises: platform configuration register PCR, and for storing described tolerance result.
Embodiment of the present invention operating system security starting method and device, by UEFI BIOS is carried out to signature authentication, after passing through, carry out signature authentication to booting operating system program if authenticate; Use Secure Hash Algorithm to certification by after described booting operating system program measure, using the tolerance result drawing as trusted root; Using described trusted root as initial value, measure successively multiple operating system configuration files; Obtaining final tolerance result and the safety value of expectation compares, verify operating system described in whether clean boot, realize booting operating system program by the method verification security of digital signature identification, measure safe booting operating system program and produce trusted root, according to trusted root metric operations system OS step by step, chain-of-trust is extended to OS by BIOS, solve and cannot ensure after BootLoader that start-up routine is the safety of OS start-up routine in prior art.
Brief description of the drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the process flow diagram of operating system security starting method embodiment mono-of the present invention;
Figure 1A is the implementation schematic diagram of operating system security starting method embodiment mono-of the present invention;
Fig. 2 is the structural representation of operating system security starter gear embodiment mono-of the present invention;
Fig. 3 is the structural representation of operating system security starting outfit embodiment mono-of the present invention.
Embodiment
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Fig. 1 is the process flow diagram of operating system security starting method embodiment mono-of the present invention.Figure 1A is the implementation schematic diagram of operating system security starting method embodiment mono-of the present invention.The executive agent of the present embodiment is operating system security starter gear, and this device can be realized by software and/or hardware.As shown in Figure 1, the method for the present embodiment can comprise:
Step 101, unified Extensible Firmware Interface Basic Input or Output System (BIOS) UEFI BIOS is carried out to signature authentication, if after certification passes through, booting operating system program is carried out to signature authentication.
Particularly, as shown in Figure 1A, when os starting, first UEFI BIOS is carried out to signature authentication, after certification is passed through, the booting operating system program in reading disk, carries out signature authentication.Signature authentication can adopt CA digital signature identification.Use the security of the method guarantee BIOS of clean boot, signature authentication transparent procedures, user's acceptance is high.
Multiple operating system start-up routine (GRand Unified Bootloader is called for short GRUB) is a kind of booting operating system program.Be used for guiding different system, as windows, linux etc.GRUB is the realizations that start specification more, and it allows user can in computing machine, have multiple operating system simultaneously, and in the time of computer starting, selects to wish the operating system of operation.GRUB can be used for selecting the different kernels on operating system partition, also can be used for transmitting start-up parameter to these kernels.
In the time of UEFI BIOS signature authentication, can authenticate Option Rom signature simultaneously, hardware single board can compatible third party's network interface card and Redundant Array of Independent Disks (RAID) (Redundant Array of Independent Disks, be called for short RAID) peripheral hardware such as card grade, and the manufacturer of add-on card all can provide traditional Option Rom binary file or Extensible Firmware Interface (Extensible Firmware Interface is called for short EFI) driver to operating system UEFI BIOS, in os starting process, UEFI BIOS can complete by calling Option Rom code the initialization of add-on card.
Step 102, use Secure Hash Algorithm to certification by after booting operating system program measure, using the tolerance result drawing as trusted root.
Particularly, Secure Hash Algorithm (Secure Hash Algorithm, be called for short SHA) thought be receive one section of plaintext, then convert it to one section of (conventionally less) ciphertext in the irreversible mode of one, also can simply be interpreted as and get a string input code (being called preliminary mapping or information), and they are converted into the output sequence that length is shorter, figure place is fixing is the process of hashed value (also referred to as informative abstract or message authentication codes).
Use Secure Hash Algorithm to certification by after booting operating system program measure, show that informative abstract measure result, as trusted root, further operating system nucleus file etc. is measured.
Step 103, using trusted root as initial value, measure successively multiple operating system configuration files.
Alternatively, using trusted root as initial value, measure successively multiple operating system configuration files, comprising:
Use Secure Hash Algorithm to measure to operating system configuration file, tolerance result and initial value are measured again as the input value of Secure Hash Algorithm, using the value drawing as tolerance result, and tolerance result is measured next operating system configuration file as new initial value, until all operations CONFIG.SYS has been measured.
Particularly, as shown in Figure 1A, operating system configuration file comprises virtual machine monitor Xen, operating system nucleus file is as linux Kernel, root file system Initrd, module Module, critical system file etc., multiple operating system configuration files are measured and can be adopted with the following method: using trusted root as initial value N0, use Secure Hash Algorithm to measure to first operating system configuration file, tolerance result VALUE and initial value N0 are measured again as the input value of Secure Hash Algorithm, using the value drawing as tolerance result N1, and store this tolerance result, can adopt formula N1=SHA (N0+VALUE), and tolerance result is measured next operating system configuration file as new initial value, even N0=N1, carry out said process, until all operations CONFIG.SYS has been measured, and preserve the tolerance result of all operations CONFIG.SYS tolerance.
Step 104, obtain final tolerance result and the safety value of expectation compares, verify whether clean boot operating system.
Alternatively, obtain final tolerance result and the safety value of expectation and compare, verify and comprise whether clean boot operating system:
If final tolerance result is consistent with the safety value of expectation, clean boot operating system; If inconsistent, do not start the operating system.
Particularly, in obtaining step 103, the final tolerance result of storage and the safety value of predefined expectation compare, if consistent, clean boot operating system; If inconsistent, do not start the operating system.
Alternatively, the method for the present embodiment, can also comprise:
On credible platform module TPM, carry out the tolerance of Secure Hash Algorithm;
In platform configuration register PCR by tolerance result store in TPM.
Particularly, can adopt creditable calculation modules (Trusted Platform Module, be called for short TPM) 2.0 carry out the tolerance of Secure Hash Algorithm, TPM2.0 chip meets the TPM standard criterion of credible computation organization (Trusted Computing Group is called for short TCG) definition.Tolerance result in metrics process can be stored in the platform configuration register (Platform Configuration Registers is called for short PCR) in TPM.
The present embodiment, by basic input-output system BIOS is carried out to signature authentication, after passing through, carries out signature authentication to booting operating system program if authenticate; Use Secure Hash Algorithm to certification by after described booting operating system program measure, using the tolerance result drawing as trusted root; Using described trusted root as initial value, measure successively multiple operating system configuration files; Obtaining final tolerance result and the safety value of expectation compares, verify operating system described in whether clean boot, realize booting operating system program by the method verification security of digital signature identification, measure safe booting operating system program and produce trusted root, according to trusted root metric operations system OS step by step, chain-of-trust is extended to OS by BIOS, solve and cannot ensure after BootLoader that start-up routine is the safety of OS start-up routine in prior art.
Fig. 2 is the structural representation of operating system security starter gear embodiment mono-of the present invention, as shown in Figure 2, the operating system security starter gear 20 of the present embodiment can comprise: signature verification module 201, metric module 202, authentication module 203, wherein, signature verification module 201, for unified Extensible Firmware Interface Basic Input or Output System (BIOS) UEFI BIOS is carried out to signature authentication, after passing through if authenticate, booting operating system program is carried out to signature authentication; Metric module 202, for use Secure Hash Algorithm to certification by after described booting operating system program measure, using the tolerance result drawing as trusted root; Metric module 202, also, for using described trusted root as initial value, measures multiple operating system configuration files successively; Authentication module 203, compares for obtaining final tolerance result and the safety value of expectation, verifies operating system described in whether clean boot.
Alternatively, metric module 202, specifically for:
Use Secure Hash Algorithm to measure to described operating system configuration file, tolerance result and described initial value are measured again as the input value of Secure Hash Algorithm, using the value drawing as tolerance result, and using described tolerance result as new initial value, next operating system configuration file is measured, until all operations CONFIG.SYS has been measured.
Alternatively, authentication module 203, specifically for:
If final described tolerance result is consistent with the safety value of described expectation, operating system described in clean boot; If inconsistent, do not start described operating system.
Alternatively, metric module 202 can comprise credible platform module TPM2020, for carry out the tolerance of Secure Hash Algorithm on described TPM;
Operating system security starter gear 20 can also comprise: platform configuration register PCR204, and for storing described tolerance result.
The device of the present embodiment, can be for the technical scheme of embodiment of the method shown in execution graph 1, and it realizes principle and technique effect is similar, repeats no more herein.
Fig. 3 is the structural representation of operating system security starting outfit embodiment mono-of the present invention.As shown in Figure 3, the operating system security starting outfit 30 that the present embodiment provides comprises processor 301 and storer 302.Operating system security starting outfit 30 can also comprise transmitter 303, receiver 304.Transmitter 303 can be connected with processor 301 with receiver 304.On hardware is realized, transmitter, receiver, processor can be closed to a chip, or realize with a chip respectively.Wherein, transmitter 303 is for sending data or information, receiver 304 is for receiving data or information, instruction is carried out in storer 302 storages, in the time that operating system security starting outfit 30 moves, between processor 301 and storer 302, communicates by letter, processor 301 calls the execution instruction in storer 302, for the technical scheme described in manner of execution embodiment mono-, it realizes principle and technique effect is similar, repeats no more herein.
In the several embodiment that provide in the application, should be understood that disclosed equipment and method can realize by another way.For example, apparatus embodiments described above is only schematic, for example, the division of described unit or module, be only that a kind of logic function is divided, when actual realization, can have other dividing mode, for example multiple unit or module can in conjunction with or can be integrated into another system, or some features can ignore, or do not carry out.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, the indirect coupling of equipment or module or communication connection can be electrically, machinery or other form.
The described module as separating component explanation can or can not be also physically to separate, and the parts that show as module can be or can not be also physical modules, can be positioned at a place, or also can be distributed in multiple network element.Can select according to the actual needs some or all of module wherein to realize the object of the present embodiment scheme.
One of ordinary skill in the art will appreciate that: all or part of step that realizes above-mentioned each embodiment of the method can complete by the relevant hardware of programmed instruction.Aforesaid program can be stored in a computer read/write memory medium.This program, in the time carrying out, is carried out the step that comprises above-mentioned each embodiment of the method; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
Finally it should be noted that: above each embodiment, only in order to technical scheme of the present invention to be described, is not intended to limit; Although the present invention is had been described in detail with reference to aforementioned each embodiment, those of ordinary skill in the art is to be understood that: its technical scheme that still can record aforementioned each embodiment is modified, or some or all of technical characterictic is wherein equal to replacement; And these amendments or replacement do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (8)

1. an operating system security starting method, is characterized in that, comprising:
Unified Extensible Firmware Interface Basic Input or Output System (BIOS) UEFI BIOS is carried out to signature authentication, after passing through if authenticate, booting operating system program is carried out to signature authentication;
Use Secure Hash Algorithm to certification by after described booting operating system program measure, using the tolerance result drawing as trusted root;
Using described trusted root as initial value, measure successively multiple operating system configuration files;
Obtain final tolerance result and the safety value of expectation and compare, verify operating system described in whether clean boot.
2. method according to claim 1, is characterized in that, described using described trusted root as initial value, measures successively multiple operating system configuration files, comprising:
Use Secure Hash Algorithm to measure to described operating system configuration file, tolerance result and described initial value are measured again as the input value of Secure Hash Algorithm, using the value drawing as tolerance result, and using described tolerance result as new initial value, next operating system configuration file is measured, until all operations CONFIG.SYS has been measured.
3. method according to claim 1 and 2, is characterized in that, described in obtain final tolerance result and the safety value of expectation compares, verify operating system described in whether clean boot, comprising:
If final described tolerance result is consistent with the safety value of described expectation, operating system described in clean boot; If inconsistent, do not start described operating system.
4. method according to claim 3, is characterized in that, also comprises:
On credible platform module TPM, carry out the tolerance of Secure Hash Algorithm;
In platform configuration register PCR by described tolerance result store in described TPM.
5. an operating system security starter gear, is characterized in that, comprising:
Signature verification module, carries out signature authentication for the Extensible Firmware Interface Basic Input or Output System (BIOS) UEFIBIOS to unified, after passing through, booting operating system program is carried out to signature authentication if authenticate;
Metric module, for use Secure Hash Algorithm to certification by after described booting operating system program measure, using the tolerance result drawing as trusted root;
Described metric module, also, for using described trusted root as initial value, measures multiple operating system configuration files successively;
Authentication module, compares for obtaining final tolerance result and the safety value of expectation, verifies operating system described in whether clean boot.
6. device according to claim 5, is characterized in that, described metric module, specifically for:
Use Secure Hash Algorithm to measure to described operating system configuration file, tolerance result and described initial value are measured again as the input value of Secure Hash Algorithm, using the value drawing as tolerance result, and using described tolerance result as new initial value, next operating system configuration file is measured, until all operations CONFIG.SYS has been measured.
7. according to the device described in claim 5 or 6, it is characterized in that, described authentication module, specifically for:
If final described tolerance result is consistent with the safety value of described expectation, operating system described in clean boot; If inconsistent, do not start described operating system.
8. device according to claim 7, is characterized in that, described metric module comprises credible platform module TPM, for carry out the tolerance of Secure Hash Algorithm on described TPM;
Described device also comprises: platform configuration register PCR, and for storing described tolerance result.
CN201410172838.9A 2014-04-25 2014-04-25 OS secure startup method and device Pending CN103927490A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410172838.9A CN103927490A (en) 2014-04-25 2014-04-25 OS secure startup method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410172838.9A CN103927490A (en) 2014-04-25 2014-04-25 OS secure startup method and device

Publications (1)

Publication Number Publication Date
CN103927490A true CN103927490A (en) 2014-07-16

Family

ID=51145708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410172838.9A Pending CN103927490A (en) 2014-04-25 2014-04-25 OS secure startup method and device

Country Status (1)

Country Link
CN (1) CN103927490A (en)

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331666A (en) * 2014-11-10 2015-02-04 成都卫士通信息产业股份有限公司 Trusted measurement method for computer systems
CN104809398A (en) * 2015-04-21 2015-07-29 深圳怡化电脑股份有限公司 Tamper-proof method and tamper-proof device for bootstrap firmware of password keyboard
CN104866768A (en) * 2015-05-15 2015-08-26 深圳怡化电脑股份有限公司 Startup control method and device for ATM (Automatic Teller Machine) operating system
CN104866392A (en) * 2015-05-20 2015-08-26 浪潮电子信息产业股份有限公司 Virtual machine security protection method and apparatus
CN104966022A (en) * 2015-06-12 2015-10-07 浪潮电子信息产业股份有限公司 Chain-of-trust construction method and device based on chip
CN105447391A (en) * 2015-12-09 2016-03-30 浪潮电子信息产业股份有限公司 Operating system secure startup method, startup manager and operating system secure startup system
CN106095468A (en) * 2016-07-20 2016-11-09 杭州华澜微电子股份有限公司 A kind of computer starting method and device
CN106250760A (en) * 2016-07-26 2016-12-21 浪潮电子信息产业股份有限公司 A kind of U Boot based on TPM2.0 chip credible startup method
CN106341224A (en) * 2016-07-20 2017-01-18 国网安徽省电力公司信息通信分公司 Customized server-based TCM application system and system guidance method
CN106506166A (en) * 2016-10-26 2017-03-15 泰山医学院 Trusted end-user plateform system under cloud computing environment
CN106548063A (en) * 2016-11-01 2017-03-29 广东浪潮大数据研究有限公司 A kind of credible tolerance methods, devices and systems
CN106845243A (en) * 2016-12-13 2017-06-13 北京元心科技有限公司 Improve the method and system for starting safety
CN106886473A (en) * 2017-04-24 2017-06-23 郑州云海信息技术有限公司 A kind of startup method of server, device and server
WO2017133559A1 (en) * 2016-02-05 2017-08-10 中兴通讯股份有限公司 Secure boot method and device
CN107357908A (en) * 2017-07-17 2017-11-17 浪潮(北京)电子信息产业有限公司 A kind of detection method and device of dummy machine system file
CN107870788A (en) * 2016-09-26 2018-04-03 展讯通信(上海)有限公司 The startup method and terminal device of terminal device under more credible performing environment
WO2018090823A1 (en) * 2016-11-21 2018-05-24 惠州Tcl移动通信有限公司 Method and system for protecting system partition key data, and terminal
CN108256330A (en) * 2016-12-29 2018-07-06 联想(上海)信息技术有限公司 Facility information safeguard method and device
WO2018176125A1 (en) * 2017-03-28 2018-10-04 Sierra Wireless, Inc. Method and apparatus for secure computing device start up
CN108804325A (en) * 2018-06-08 2018-11-13 郑州云海信息技术有限公司 A kind of test method to Secure Boot
CN109508535A (en) * 2018-10-30 2019-03-22 百富计算机技术(深圳)有限公司 Firmware safety certifying method, device and payment terminal
CN109598126A (en) * 2018-12-03 2019-04-09 贵州华芯通半导体技术有限公司 A kind of safety startup of system methods, devices and systems based on national secret algorithm
CN109684849A (en) * 2017-10-18 2019-04-26 佳能株式会社 Information processing unit, its control method and storage medium
CN109997140A (en) * 2018-09-10 2019-07-09 深圳市汇顶科技股份有限公司 Accelerate the low-power-consumption embedded equipment of clean boot from the sleep state of equipment using write-once register
CN110543769A (en) * 2019-08-29 2019-12-06 武汉大学 Trusted starting method based on encrypted TF card
CN111046392A (en) * 2019-11-26 2020-04-21 深圳中电长城信息安全系统有限公司 BIOS (basic input output System) credibility measuring method and device and terminal equipment
CN111045743A (en) * 2019-12-12 2020-04-21 海光信息技术有限公司 Safe starting method, management method, device and equipment of operating system
CN111241548A (en) * 2020-01-07 2020-06-05 天津飞腾信息技术有限公司 Computer starting method
CN112016090A (en) * 2019-05-30 2020-12-01 阿里巴巴集团控股有限公司 Secure computing card, and measurement method and system based on secure computing card
CN112464271A (en) * 2021-01-27 2021-03-09 信联科技(南京)有限公司 Method and system for constructing high-reliability execution environment of power Internet of things edge Internet of things agent
CN112487435A (en) * 2020-11-06 2021-03-12 麒麟软件有限公司 Secure starting method based on X86 architecture
CN112560011A (en) * 2021-02-07 2021-03-26 浙江地芯引力科技有限公司 External adapter equipment safety authentication system and method based on encryption chip
CN112636928A (en) * 2020-12-29 2021-04-09 广东国腾量子科技有限公司 Decentralized trusted authentication method based on block chain, storage device and mobile terminal
CN112800429A (en) * 2021-01-28 2021-05-14 北京工业大学 Method for protecting driver in UEFI BIOS firmware system based on foundation
CN113051584A (en) * 2021-05-31 2021-06-29 武汉深之度科技有限公司 System secure starting method and device, computing equipment and readable storage medium
CN113190853A (en) * 2021-03-24 2021-07-30 中国电力科学研究院有限公司 Computer credibility authentication system, method, equipment and readable storage medium
CN113420299A (en) * 2021-04-15 2021-09-21 麒麟软件有限公司 Computer system safe starting and guiding method based on SM3 cryptographic algorithm
CN113553108A (en) * 2021-07-12 2021-10-26 华东师范大学 System for checking front software of operating system
CN113553109A (en) * 2021-07-12 2021-10-26 华东师范大学 Method for checking front software of operating system
CN114201747A (en) * 2021-11-29 2022-03-18 海光信息技术股份有限公司 Dynamic measurement root implementation method, device, system and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101038556A (en) * 2007-04-30 2007-09-19 中国科学院软件研究所 Trusted bootstrap method and system thereof
CN101576944A (en) * 2008-11-20 2009-11-11 武汉大学 Computer secure startup system based on trusted platform module
CN101599025A (en) * 2009-07-07 2009-12-09 武汉大学 Safety virtualization method of trusted crypto module
US20120151223A1 (en) * 2010-09-20 2012-06-14 Conde Marques Ricardo Nuno De Pinho Coelho Method for securing a computing device with a trusted platform module-tpm

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101038556A (en) * 2007-04-30 2007-09-19 中国科学院软件研究所 Trusted bootstrap method and system thereof
CN101576944A (en) * 2008-11-20 2009-11-11 武汉大学 Computer secure startup system based on trusted platform module
CN101599025A (en) * 2009-07-07 2009-12-09 武汉大学 Safety virtualization method of trusted crypto module
US20120151223A1 (en) * 2010-09-20 2012-06-14 Conde Marques Ricardo Nuno De Pinho Coelho Method for securing a computing device with a trusted platform module-tpm

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
刘东丽: ""基于UEFI的信任链设计及TPM驱动程序实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
师俊芳,李小将,李新明: ""基于TPM的安全操作系统的设计研究"", 《装备指挥技术学院学报》 *
韦荣,鞠磊,方勇,杨波: ""可信计算度量机制在信任链中的应用"", 《网络安全技术与应用》 *
黄海彬: ""基于EFI固件文件系统的平台安全策略研究与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
黄涛,沈昌祥: ""一种基于可信服务器的可信引导方案"", 《武汉大学学报(理学版)》 *

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331666A (en) * 2014-11-10 2015-02-04 成都卫士通信息产业股份有限公司 Trusted measurement method for computer systems
CN104809398A (en) * 2015-04-21 2015-07-29 深圳怡化电脑股份有限公司 Tamper-proof method and tamper-proof device for bootstrap firmware of password keyboard
CN104866768A (en) * 2015-05-15 2015-08-26 深圳怡化电脑股份有限公司 Startup control method and device for ATM (Automatic Teller Machine) operating system
CN104866392A (en) * 2015-05-20 2015-08-26 浪潮电子信息产业股份有限公司 Virtual machine security protection method and apparatus
CN104966022A (en) * 2015-06-12 2015-10-07 浪潮电子信息产业股份有限公司 Chain-of-trust construction method and device based on chip
CN105447391A (en) * 2015-12-09 2016-03-30 浪潮电子信息产业股份有限公司 Operating system secure startup method, startup manager and operating system secure startup system
WO2017133559A1 (en) * 2016-02-05 2017-08-10 中兴通讯股份有限公司 Secure boot method and device
CN106095468B (en) * 2016-07-20 2019-07-19 杭州华澜微电子股份有限公司 A kind of computer starting method and device
CN106095468A (en) * 2016-07-20 2016-11-09 杭州华澜微电子股份有限公司 A kind of computer starting method and device
CN106341224A (en) * 2016-07-20 2017-01-18 国网安徽省电力公司信息通信分公司 Customized server-based TCM application system and system guidance method
CN106250760A (en) * 2016-07-26 2016-12-21 浪潮电子信息产业股份有限公司 A kind of U Boot based on TPM2.0 chip credible startup method
CN107870788B (en) * 2016-09-26 2020-10-02 展讯通信(上海)有限公司 Starting method of terminal equipment under multiple trusted execution environments and terminal equipment
CN107870788A (en) * 2016-09-26 2018-04-03 展讯通信(上海)有限公司 The startup method and terminal device of terminal device under more credible performing environment
CN106506166A (en) * 2016-10-26 2017-03-15 泰山医学院 Trusted end-user plateform system under cloud computing environment
CN106506166B (en) * 2016-10-26 2020-02-11 泰山医学院 Terminal trusted platform system under cloud computing environment
CN106548063A (en) * 2016-11-01 2017-03-29 广东浪潮大数据研究有限公司 A kind of credible tolerance methods, devices and systems
WO2018090823A1 (en) * 2016-11-21 2018-05-24 惠州Tcl移动通信有限公司 Method and system for protecting system partition key data, and terminal
US11057216B2 (en) 2016-11-21 2021-07-06 Huizhou Tcl Mobile Communication Co., Ltd. Protection method and protection system of system partition key data and terminal
CN106845243A (en) * 2016-12-13 2017-06-13 北京元心科技有限公司 Improve the method and system for starting safety
CN108256330A (en) * 2016-12-29 2018-07-06 联想(上海)信息技术有限公司 Facility information safeguard method and device
WO2018176125A1 (en) * 2017-03-28 2018-10-04 Sierra Wireless, Inc. Method and apparatus for secure computing device start up
US11048801B2 (en) 2017-03-28 2021-06-29 Sierra Wireless, Inc. Method and apparatus for secure computing device start up
CN106886473A (en) * 2017-04-24 2017-06-23 郑州云海信息技术有限公司 A kind of startup method of server, device and server
CN107357908A (en) * 2017-07-17 2017-11-17 浪潮(北京)电子信息产业有限公司 A kind of detection method and device of dummy machine system file
CN107357908B (en) * 2017-07-17 2020-07-03 浪潮(北京)电子信息产业有限公司 Method and device for detecting system file of virtual machine
CN109684849A (en) * 2017-10-18 2019-04-26 佳能株式会社 Information processing unit, its control method and storage medium
CN108804325A (en) * 2018-06-08 2018-11-13 郑州云海信息技术有限公司 A kind of test method to Secure Boot
CN109997140A (en) * 2018-09-10 2019-07-09 深圳市汇顶科技股份有限公司 Accelerate the low-power-consumption embedded equipment of clean boot from the sleep state of equipment using write-once register
CN109508535A (en) * 2018-10-30 2019-03-22 百富计算机技术(深圳)有限公司 Firmware safety certifying method, device and payment terminal
CN109598126A (en) * 2018-12-03 2019-04-09 贵州华芯通半导体技术有限公司 A kind of safety startup of system methods, devices and systems based on national secret algorithm
CN112016090A (en) * 2019-05-30 2020-12-01 阿里巴巴集团控股有限公司 Secure computing card, and measurement method and system based on secure computing card
CN112016090B (en) * 2019-05-30 2024-01-23 阿里巴巴集团控股有限公司 Secure computing card, and measuring method and system based on secure computing card
CN110543769A (en) * 2019-08-29 2019-12-06 武汉大学 Trusted starting method based on encrypted TF card
CN110543769B (en) * 2019-08-29 2023-09-15 武汉大学 Trusted starting method based on encrypted TF card
CN111046392A (en) * 2019-11-26 2020-04-21 深圳中电长城信息安全系统有限公司 BIOS (basic input output System) credibility measuring method and device and terminal equipment
CN111045743B (en) * 2019-12-12 2024-02-13 海光信息技术股份有限公司 Operating system safe starting method, management method, device and equipment
CN111045743A (en) * 2019-12-12 2020-04-21 海光信息技术有限公司 Safe starting method, management method, device and equipment of operating system
CN111241548B (en) * 2020-01-07 2022-09-09 飞腾信息技术有限公司 Computer starting method
CN111241548A (en) * 2020-01-07 2020-06-05 天津飞腾信息技术有限公司 Computer starting method
CN112487435A (en) * 2020-11-06 2021-03-12 麒麟软件有限公司 Secure starting method based on X86 architecture
CN112636928A (en) * 2020-12-29 2021-04-09 广东国腾量子科技有限公司 Decentralized trusted authentication method based on block chain, storage device and mobile terminal
CN112636928B (en) * 2020-12-29 2023-01-17 广东国腾量子科技有限公司 Decentralized trusted authentication method based on block chain, storage device and mobile terminal
CN112464271A (en) * 2021-01-27 2021-03-09 信联科技(南京)有限公司 Method and system for constructing high-reliability execution environment of power Internet of things edge Internet of things agent
CN112800429A (en) * 2021-01-28 2021-05-14 北京工业大学 Method for protecting driver in UEFI BIOS firmware system based on foundation
CN112560011B (en) * 2021-02-07 2021-06-01 浙江地芯引力科技有限公司 External adapter equipment safety authentication system and method based on encryption chip
CN112560011A (en) * 2021-02-07 2021-03-26 浙江地芯引力科技有限公司 External adapter equipment safety authentication system and method based on encryption chip
CN113190853A (en) * 2021-03-24 2021-07-30 中国电力科学研究院有限公司 Computer credibility authentication system, method, equipment and readable storage medium
CN113420299A (en) * 2021-04-15 2021-09-21 麒麟软件有限公司 Computer system safe starting and guiding method based on SM3 cryptographic algorithm
CN113051584A (en) * 2021-05-31 2021-06-29 武汉深之度科技有限公司 System secure starting method and device, computing equipment and readable storage medium
CN113553108A (en) * 2021-07-12 2021-10-26 华东师范大学 System for checking front software of operating system
CN113553109A (en) * 2021-07-12 2021-10-26 华东师范大学 Method for checking front software of operating system
CN114201747A (en) * 2021-11-29 2022-03-18 海光信息技术股份有限公司 Dynamic measurement root implementation method, device, system and storage medium

Similar Documents

Publication Publication Date Title
CN103927490A (en) OS secure startup method and device
US8892858B2 (en) Methods and apparatus for trusted boot optimization
CN107025406B (en) Motherboard, computer-readable storage device, and firmware verification method
EP2962241B1 (en) Continuation of trust for platform boot firmware
US8904162B2 (en) Methods and apparatus for performing secure BIOS upgrade
US11579893B2 (en) Systems and methods for separate storage and use of system BIOS components
US11281768B1 (en) Firmware security vulnerability verification service
US20090210456A1 (en) Methods, Systems and Media for TPM Recovery Key Backup and Restoration
US10592661B2 (en) Package processing
US20190138730A1 (en) System and Method to Support Boot Guard for Original Development Manufacturer BIOS Development
US11755739B2 (en) Update signals
US11675908B2 (en) Unattended deployment of information handling systems
US11416607B2 (en) Security risk indicator and method therefor
US11803454B2 (en) Chained loading with static and dynamic root of trust measurements
US11809876B2 (en) Trusted platform module protection for non-volatile memory express (NVMe) recovery
US11657158B2 (en) Systems and methods for extending boot security trust chaining to state changes between boot sessions
US11907375B2 (en) System and method for signing and interlocking a boot information file to a host computing system
CN115906046A (en) Trusted computing system and measurement method based on trusted computing system
CN114692159A (en) Computer system, trusted functional component and operation method
CN115130106A (en) Method and related device for realizing trusted boot through fTPM
Jyothi et al. TPM based Secure Boot in Embedded Systems
US11960372B2 (en) Verified callback chain for bios security in an information handling system
US11748485B2 (en) System and method for booting using HSM integrated chain of trust certificates
US11669618B2 (en) Systems and methods for securing and loading bios drivers and dependencies in a predefined and measured load order
US20230401316A1 (en) Pre-authorized virtualization engine for dynamic firmware measurement

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140716

RJ01 Rejection of invention patent application after publication