CN105160258B - 一种防止用户非法修改os的方法 - Google Patents

一种防止用户非法修改os的方法 Download PDF

Info

Publication number
CN105160258B
CN105160258B CN201510604438.5A CN201510604438A CN105160258B CN 105160258 B CN105160258 B CN 105160258B CN 201510604438 A CN201510604438 A CN 201510604438A CN 105160258 B CN105160258 B CN 105160258B
Authority
CN
China
Prior art keywords
usb connector
instruction
bmc
cpu
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510604438.5A
Other languages
English (en)
Other versions
CN105160258A (zh
Inventor
王雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Zhongtai Server Co Ltd
Original Assignee
Suzhou Zhongtai Server Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Zhongtai Server Co Ltd filed Critical Suzhou Zhongtai Server Co Ltd
Priority to CN201510604438.5A priority Critical patent/CN105160258B/zh
Publication of CN105160258A publication Critical patent/CN105160258A/zh
Application granted granted Critical
Publication of CN105160258B publication Critical patent/CN105160258B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种防止用户非法修改OS的方法,包括下述步骤:(1)当BIOS启动完毕后,CPU向BMC发出请求给连接OS FW的USB连接器供电的指令;(2)BMC接收所述指令并给连接OS FW的USB连接器供电;(3)CPU读取OS FW在内存中解压,并启动解压后的OS,同时CPU向BMC发出终止给连接OS FW的USB连接器供电的指令;(4)BMC收到该指令后终止给所述USB连接器供电。本发明通过在服务器的BIOS中内置OS,使得用户只能使用内置的OS,不能使用其他的OS,从而防止用户非法修改OS;有效的阻止了非授权操作对OS FW的访问和纂改。

Description

一种防止用户非法修改OS的方法
技术领域
本发明属于服务器产品技术领域,更具体地,涉及一种防止用户非法修改OS的方法。
背景技术
现有技术的做法是BIOS(Basic Input Output System,基本输入输出系统)中并不内置OS(Operating System,操作系统),BIOS FW(Firmware,固件)存放在Flash中,OS FW存放在外部存储设备(如硬盘、U盘等)中,BIOS启动完毕后扫描外部存储设备,列举所有已安装的OS供用户选择,然后启动用户选定的OS或者在等待超时后启动默认的OS。
现有技术的缺点是OS存放在外部存储设备中,用户可以任意安装、修改。现有技术无法满足云服务器厂商等的需求,后者希望可以在服务器中部署安全可靠的OS,且该OS不会被非法修改。
发明内容
针对现有技术的缺陷,本发明的目的在于提供一种防止用户非法修改OS的方法,旨在解决现有技术中由于将OS存放在外部存储设备中导致用户可以任意安装或修改的技术问题。
本发明提供了一种防止用户非法修改OS的方法,包括下述步骤:
(1)当BIOS启动完毕后,CPU向BMC发出请求给连接OS FW的USB连接器供电的指令;
(2)BMC接收所述指令并给连接OS FW的USB连接器供电;
(3)CPU读取OS FW在内存中解压,并启动解压后的OS,同时CPU向BMC发出终止给连接OS FW的USB连接器供电的指令;
(4)BMC收到该指令后终止给所述USB连接器供电。
更进一步地,所述CPU与OS FW之间的数据通道不限于USB链路,也可以是其他快速链路。
更进一步地,通过将OS FW挂载在USB连接器下,并在不使用时进行下电,从而阻止了非授权操作对OS FW的访问和纂改。
本发明通过在服务器的BIOS中内置OS,使得用户只能使用内置的OS,不能使用其他的OS,从而防止用户非法修改OS;有效的阻止了非授权操作对OS FW的访问和纂改。
附图说明
图1是本发明实施例提供的防止用户非法修改OS的方法所基于的系统原理框图。
具体实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明提供的一种防止用户非法修改OS的方法主要应用领域为服务器产品;具体地,通过在服务器的BIOS中内置OS,使得用户只能使用内置的OS,不能使用其他的OS,从而防止用户非法修改OS。
BIOS FW一般存储在SPI Flash中,这个Flash的大小一般是有限制的,如不能超过256M。而OS FW一般比较大,比如可能达到1-2G。因此BIOS FW和OS FW需要分开存储。为了防止OS FW被非法的替换或修改,需要将OS FW存储在一个比较隐蔽的位置,以保证既可以被BIOS访问到,又很难被非授权的操作访问到。为了做到这一点,OS FW存储在USB连接器下挂的USB存储设备中(即OS FW与USB连接器连接),而该USB连接器挂在CPU下(即USB连接器与CPU连接)。
如图1所示,当BIOS启动完毕后,CPU向BMC发出请求给连接OS FW的USB连接器供电的指令;BMC收到该指令后给连接OS FW的USB连接器供电;CPU读取OS FW在内存中(内存就是CPU使用的内存,相对而言,USB存储设备是外存)解压并启动解压后的OS(计算机系统要工作必须有OS,一般的系统OS都放在外存上,这里是将压缩打包后的OS作为一个文件放在外存,使用时解压到内存),同时CPU向BMC发出终止给连接OS FW的USB连接器供电的指令,BMC收到该指令后终止给所述USB连接器供电。
BMC与OS FW之间的数据通道不限于USB链路,也可以是其他快速链路。
通过将OS FW挂载在USB连接器下,并在不使用时进行下电,有效的阻止了非授权操作对OS FW的访问和纂改。
在本发明实施例中,BIOS只能启动其内置的OS,不能启动其他外部存储设备上的OS。存放OS FW的存储设备在不使用时进行下电。
本发明将OS内置到BIOS中,从而防止用户任意安装、修改OS,满足云服务器厂商等部署安全可靠且不会被非法修改的OS的需求。
本领域的技术人员容易理解,以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。

Claims (3)

1.一种防止用户非法修改OS的方法,其特征在于,包括下述步骤:
(1)当BIOS启动完毕后,CPU向BMC发出请求给连接OS FW的USB连接器供电的指令,其中,OS FW存储在USB连接器下挂的USB存储设备中;
(2)BMC接收所述指令并给连接OS FW的USB连接器供电;
(3)CPU读取OS FW在内存中解压,并启动解压后的OS,同时CPU向BMC发出终止给连接OSFW的USB连接器供电的指令;
(4)BMC收到该指令后终止给所述USB连接器供电。
2.如权利要求1所述的方法,其特征在于,所述CPU与OS FW之间的数据通道不限于USB链路,也可以是其他快速链路。
3.如权利要求1所述的方法,其特征在于,通过将OS FW挂载在USB连接器下,并在不使用时进行下电,从而阻止了非授权操作对OS FW的访问和纂改。
CN201510604438.5A 2015-09-21 2015-09-21 一种防止用户非法修改os的方法 Active CN105160258B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510604438.5A CN105160258B (zh) 2015-09-21 2015-09-21 一种防止用户非法修改os的方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510604438.5A CN105160258B (zh) 2015-09-21 2015-09-21 一种防止用户非法修改os的方法

Publications (2)

Publication Number Publication Date
CN105160258A CN105160258A (zh) 2015-12-16
CN105160258B true CN105160258B (zh) 2018-10-02

Family

ID=54801110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510604438.5A Active CN105160258B (zh) 2015-09-21 2015-09-21 一种防止用户非法修改os的方法

Country Status (1)

Country Link
CN (1) CN105160258B (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11775667B2 (en) 2020-11-04 2023-10-03 Hewlett Packard Enterprise Development Lp Virtualizing secure storage of a baseboard management controller to a host computing device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1072975A2 (en) * 1999-07-27 2001-01-31 Compaq Computer Corporation Virus resistant and hardware independent method of flashing computer system bios
CN101303719A (zh) * 2008-07-08 2008-11-12 李大东 涉密计算机内外网数据安全交换系统
CN103119560A (zh) * 2010-09-30 2013-05-22 英特尔公司 用于服务处理器复合体中的数据存储的基于需求的usb代理
CN104866768A (zh) * 2015-05-15 2015-08-26 深圳怡化电脑股份有限公司 自动柜员机操作系统启动控制方法及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7660937B2 (en) * 2006-06-28 2010-02-09 Hewlett-Packard Development Company, L.P. Emulating a USB host controller

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1072975A2 (en) * 1999-07-27 2001-01-31 Compaq Computer Corporation Virus resistant and hardware independent method of flashing computer system bios
CN101303719A (zh) * 2008-07-08 2008-11-12 李大东 涉密计算机内外网数据安全交换系统
CN103119560A (zh) * 2010-09-30 2013-05-22 英特尔公司 用于服务处理器复合体中的数据存储的基于需求的usb代理
CN104866768A (zh) * 2015-05-15 2015-08-26 深圳怡化电脑股份有限公司 自动柜员机操作系统启动控制方法及装置

Also Published As

Publication number Publication date
CN105160258A (zh) 2015-12-16

Similar Documents

Publication Publication Date Title
EP2962241B1 (en) Continuation of trust for platform boot firmware
ZA200806133B (en) A method for booting a host device from an MMC/SD device, a host device bootable from an MMC/SD device and an MMC/SD device method host device may be booted from
CN105556494B (zh) 通过物理地连接或断开可热插拔设备来向受信平台模块确立物理存在
KR20130141939A (ko) 모바일 기기 연동 디바이스의 단독 사용을 위한 보안 방법과, 그 방법을 사용하는 모바일 호스트 및 디바이스 장치
CN105980956B (zh) 电缆错误信号
US20210056208A1 (en) Secure firmware update for device with low computing power
CN104572564A (zh) 一种实现android移动设备与USB OTG主机通讯的方法
KR20150023845A (ko) 컴퓨팅 시스템의 저장 디바이스에 대한 효율적인 작업 경로를 용이하게 하는 메커니즘
WO2010024534A3 (ko) 위젯 실행을 위한 사용자 단말기와 스마트 카드 간 연동 시스템 및 그 방법
CN103955647A (zh) 一种系统漏洞扫描方法
GB2478878A (en) System and method for booting a computer system using preboot data
US10148444B2 (en) Systems and methods for storing administrator secrets in management controller-owned cryptoprocessor
US20170185361A1 (en) Electronic apparatus and method
US20120144084A1 (en) Data management device and method thereof
CN105160258B (zh) 一种防止用户非法修改os的方法
US20150186684A1 (en) Power supply and electronic device with power supply
KR20120058801A (ko) 안티 멀 웨어 스캐닝 시스템 및 그 방법
WO2014038342A1 (ja) デバイスペアリング方法及びデバイス
US10003463B2 (en) Systems and methods for revoking and replacing signing keys
US10049070B2 (en) Data card, and data card switching method and apparatus
CN109358875B (zh) 基于Ubuntu系统的硬件钱包离线升级装置和方法
US20200372159A1 (en) Methods of decrypting disk images, and decryption-enabling devices
CN111143841A (zh) 终端恶意程序研判平台
US20170061135A1 (en) Electronic apparatus and method
EP3142398A1 (en) Mobile terminal apparatus and control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Suzhou City, Jiangsu province 215000 high-tech zones in Suzhou city of science and technology science sanroad No. 9

Applicant after: Suzhou Zhongtai server Co. Ltd.

Address before: 518057, No. 302, block A, Tsinghua information harbor, North Zone, hi tech Zone, Guangdong, Shenzhen

Applicant before: WUXI ZOOM SERVER CO., LTD.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant