CN105160258A - 一种防止用户非法修改os的方法 - Google Patents

一种防止用户非法修改os的方法 Download PDF

Info

Publication number
CN105160258A
CN105160258A CN201510604438.5A CN201510604438A CN105160258A CN 105160258 A CN105160258 A CN 105160258A CN 201510604438 A CN201510604438 A CN 201510604438A CN 105160258 A CN105160258 A CN 105160258A
Authority
CN
China
Prior art keywords
osfw
instruction
usb connector
bmc
cpu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510604438.5A
Other languages
English (en)
Other versions
CN105160258B (zh
Inventor
王雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Zoom Server Co Ltd
Original Assignee
Wuxi Zoom Server Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Zoom Server Co Ltd filed Critical Wuxi Zoom Server Co Ltd
Priority to CN201510604438.5A priority Critical patent/CN105160258B/zh
Publication of CN105160258A publication Critical patent/CN105160258A/zh
Application granted granted Critical
Publication of CN105160258B publication Critical patent/CN105160258B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种防止用户非法修改OS的方法,包括下述步骤:(1)当BIOS启动完毕后,CPU向BMC发出请求给连接OS?FW的USB连接器供电的指令;(2)BMC接收所述指令并给连接OS?FW的USB连接器供电;(3)CPU读取OS?FW在内存中解压,并启动解压后的OS,同时CPU向BMC发出终止给连接OS?FW的USB连接器供电的指令;(4)BMC收到该指令后终止给所述USB连接器供电。本发明通过在服务器的BIOS中内置OS,使得用户只能使用内置的OS,不能使用其他的OS,从而防止用户非法修改OS;有效的阻止了非授权操作对OS?FW的访问和纂改。

Description

一种防止用户非法修改OS的方法
技术领域
本发明属于服务器产品技术领域,更具体地,涉及一种防止用户非法修改OS的方法。
背景技术
现有技术的做法是BIOS(BasicInputOutputSystem,基本输入输出系统)中并不内置OS(OperatingSystem,操作系统),BIOSFW(Firmware,固件)存放在Flash中,OSFW存放在外部存储设备(如硬盘、U盘等)中,BIOS启动完毕后扫描外部存储设备,列举所有已安装的OS供用户选择,然后启动用户选定的OS或者在等待超时后启动默认的OS。
现有技术的缺点是OS存放在外部存储设备中,用户可以任意安装、修改。现有技术无法满足云服务器厂商等的需求,后者希望可以在服务器中部署安全可靠的OS,且该OS不会被非法修改。
发明内容
针对现有技术的缺陷,本发明的目的在于提供一种防止用户非法修改OS的方法,旨在解决现有技术中由于将OS存放在外部存储设备中导致用户可以任意安装或修改的技术问题。
本发明提供了一种防止用户非法修改OS的方法,包括下述步骤:
(1)当BIOS启动完毕后,CPU向BMC发出请求给连接OSFW的USB连接器供电的指令;
(2)BMC接收所述指令并给连接OSFW的USB连接器供电;
(3)CPU读取OSFW在内存中解压,并启动解压后的OS,同时CPU向BMC发出终止给连接OSFW的USB连接器供电的指令;
(4)BMC收到该指令后终止给所述USB连接器供电。
更进一步地,所述CPU与OSFW之间的数据通道不限于USB链路,也可以是其他快速链路。
更进一步地,通过将OSFW挂载在USB连接器下,并在不使用时进行下电,从而阻止了非授权操作对OSFW的访问和纂改。
本发明通过在服务器的BIOS中内置OS,使得用户只能使用内置的OS,不能使用其他的OS,从而防止用户非法修改OS;有效的阻止了非授权操作对OSFW的访问和纂改。
附图说明
图1是本发明实施例提供的防止用户非法修改OS的方法所基于的系统原理框图。
具体实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明提供的一种防止用户非法修改OS的方法主要应用领域为服务器产品;具体地,通过在服务器的BIOS中内置OS,使得用户只能使用内置的OS,不能使用其他的OS,从而防止用户非法修改OS。
BIOSFW一般存储在SPIFlash中,这个Flash的大小一般是有限制的,如不能超过256M。而OSFW一般比较大,比如可能达到1-2G。因此BIOSFW和OSFW需要分开存储。为了防止OSFW被非法的替换或修改,需要将OSFW存储在一个比较隐蔽的位置,以保证既可以被BIOS访问到,又很难被非授权的操作访问到。为了做到这一点,OSFW存储在USB连接器下挂的USB存储设备中(即OSFW与USB连接器连接),而该USB连接器挂在CPU下(即USB连接器与CPU连接)。
如图1所示,当BIOS启动完毕后,CPU向BMC发出请求给连接OSFW的USB连接器供电的指令;BMC收到该指令后给连接OSFW的USB连接器供电;CPU读取OSFW在内存中(内存就是CPU使用的内存,相对而言,USB存储设备是外存)解压并启动解压后的OS(计算机系统要工作必须有OS,一般的系统OS都放在外存上,这里是将压缩打包后的OS作为一个文件放在外存,使用时解压到内存),同时CPU向BMC发出终止给连接OSFW的USB连接器供电的指令,BMC收到该指令后终止给所述USB连接器供电。
BMC与OSFW之间的数据通道不限于USB链路,也可以是其他快速链路。
通过将OSFW挂载在USB连接器下,并在不使用时进行下电,有效的阻止了非授权操作对OSFW的访问和纂改。
在本发明实施例中,BIOS只能启动其内置的OS,不能启动其他外部存储设备上的OS。存放OSFW的存储设备在不使用时进行下电。
本发明将OS内置到BIOS中,从而防止用户任意安装、修改OS,满足云服务器厂商等部署安全可靠且不会被非法修改的OS的需求。
本领域的技术人员容易理解,以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。

Claims (3)

1.一种防止用户非法修改OS的方法,其特征在于,包括下述步骤:
(1)当BIOS启动完毕后,CPU向BMC发出请求给连接OSFW的USB连接器供电的指令;
(2)BMC接收所述指令并给连接OSFW的USB连接器供电;
(3)CPU读取OSFW在内存中解压,并启动解压后的OS,同时CPU向BMC发出终止给连接OSFW的USB连接器供电的指令;
(4)BMC收到该指令后终止给所述USB连接器供电。
2.如权利要求1所述的方法,其特征在于,所述CPU与OSFW之间的数据通道不限于USB链路,也可以是其他快速链路。
3.如权利要求1所述的方法,其特征在于,通过将OSFW挂载在USB连接器下,并在不使用时进行下电,从而阻止了非授权操作对OSFW的访问和纂改。
CN201510604438.5A 2015-09-21 2015-09-21 一种防止用户非法修改os的方法 Active CN105160258B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510604438.5A CN105160258B (zh) 2015-09-21 2015-09-21 一种防止用户非法修改os的方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510604438.5A CN105160258B (zh) 2015-09-21 2015-09-21 一种防止用户非法修改os的方法

Publications (2)

Publication Number Publication Date
CN105160258A true CN105160258A (zh) 2015-12-16
CN105160258B CN105160258B (zh) 2018-10-02

Family

ID=54801110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510604438.5A Active CN105160258B (zh) 2015-09-21 2015-09-21 一种防止用户非法修改os的方法

Country Status (1)

Country Link
CN (1) CN105160258B (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11775667B2 (en) 2020-11-04 2023-10-03 Hewlett Packard Enterprise Development Lp Virtualizing secure storage of a baseboard management controller to a host computing device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1072975A2 (en) * 1999-07-27 2001-01-31 Compaq Computer Corporation Virus resistant and hardware independent method of flashing computer system bios
US20080005446A1 (en) * 2006-06-28 2008-01-03 Christopher Frantz Emulating a USB host controller
CN101303719A (zh) * 2008-07-08 2008-11-12 李大东 涉密计算机内外网数据安全交换系统
CN103119560A (zh) * 2010-09-30 2013-05-22 英特尔公司 用于服务处理器复合体中的数据存储的基于需求的usb代理
CN104866768A (zh) * 2015-05-15 2015-08-26 深圳怡化电脑股份有限公司 自动柜员机操作系统启动控制方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1072975A2 (en) * 1999-07-27 2001-01-31 Compaq Computer Corporation Virus resistant and hardware independent method of flashing computer system bios
US20080005446A1 (en) * 2006-06-28 2008-01-03 Christopher Frantz Emulating a USB host controller
CN101303719A (zh) * 2008-07-08 2008-11-12 李大东 涉密计算机内外网数据安全交换系统
CN103119560A (zh) * 2010-09-30 2013-05-22 英特尔公司 用于服务处理器复合体中的数据存储的基于需求的usb代理
CN104866768A (zh) * 2015-05-15 2015-08-26 深圳怡化电脑股份有限公司 自动柜员机操作系统启动控制方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11775667B2 (en) 2020-11-04 2023-10-03 Hewlett Packard Enterprise Development Lp Virtualizing secure storage of a baseboard management controller to a host computing device

Also Published As

Publication number Publication date
CN105160258B (zh) 2018-10-02

Similar Documents

Publication Publication Date Title
US8972966B2 (en) Updating firmware in a hybrid computing environment
US9747094B2 (en) Component update using management engine
US11221838B2 (en) Hot update method, operating system, terminal device, system, and computer-readable storage medium for a system process
US9223326B2 (en) Distributed thermal management system for servers
CN106648724B (zh) 应用程序的热修复方法及终端
CN103154922A (zh) 虚拟usb复合装置枚举
KR20130141939A (ko) 모바일 기기 연동 디바이스의 단독 사용을 위한 보안 방법과, 그 방법을 사용하는 모바일 호스트 및 디바이스 장치
US11341246B2 (en) Secure firmware update for device with low computing power
US10430366B2 (en) Systems and methods for configuration of hot-inserted device prior to operating system control of device
US10460111B2 (en) System and method to isolate host and system management in an information handling system
CN104392152A (zh) 一种嵌入式设备的启动方法、嵌入式设备、服务器及系统
US20150154029A1 (en) Electronic apparatus and operational method thereof
CN104486383A (zh) 智能移动设备上安装应用程序的方法
CN104732165A (zh) 一种应用的管理方法和终端
CN104978378A (zh) 一种网页访问方法和装置
CN105160258A (zh) 一种防止用户非法修改os的方法
CN104281462A (zh) 固件升级配置保存系统及方法
US9819646B2 (en) Secure device and proxy for secure operation of a host data processing system
CN104778144A (zh) 基于otg的智能终端操作控制方法及装置
TWI411921B (zh) 電子系統、互連電子系統與週邊裝置之電腦可讀儲存媒體及其互連方法
US20210279046A1 (en) Intelligent device updating
CN104516752A (zh) 一种信息处理方法及电子设备
US9280666B2 (en) Method and electronic device for protecting data
US20160085709A1 (en) Data Card, and Data Card Switching Method and Apparatus
US10394289B1 (en) Card riser

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Suzhou City, Jiangsu province 215000 high-tech zones in Suzhou city of science and technology science sanroad No. 9

Applicant after: Suzhou Zhongtai server Co. Ltd.

Address before: 518057, No. 302, block A, Tsinghua information harbor, North Zone, hi tech Zone, Guangdong, Shenzhen

Applicant before: WUXI ZOOM SERVER CO., LTD.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant