CN106557700A - A kind of gauging system and method for trusted computer - Google Patents
A kind of gauging system and method for trusted computer Download PDFInfo
- Publication number
- CN106557700A CN106557700A CN201611058840.9A CN201611058840A CN106557700A CN 106557700 A CN106557700 A CN 106557700A CN 201611058840 A CN201611058840 A CN 201611058840A CN 106557700 A CN106557700 A CN 106557700A
- Authority
- CN
- China
- Prior art keywords
- oprom
- trusted computer
- check
- informations
- reading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of gauging system and method for trusted computer, the system includes:Credible tolerance portion and the OPROM calibration equipments being connected with trusted computer in trusted computer, OPROM calibration equipments are used for storage carries out the OPROM check informations of Hash verifications, and corresponding check results to the data in the mainboard SPI Flash of trusted computer;Credible tolerance portion is used to reading and replicating OPROM check informations, carries out Hash verifications according to the data in mainboard SPI Flash of the OPROM check informations to trusted computer, and corresponding check results are stored to OPROM calibration equipments.Using external OPROM calibration equipments storage OPROM check informations, to verify to the data in the SPI Flash in trust computing mainboard, and store corresponding check results, after trusted computer enters operating system, user can be directly viewable the check results of record, and without the need for modifying to mainboard BIOS without modifying to hardware during this, it is convenient to realize, reduces extra hardware cost.
Description
Technical field
The present invention relates to reliable computing technology field, more particularly to a kind of gauging system and side for trusted computer
Method.
Background technology
With the development of information technology, for the safety for ensureing to calculate and communication system is overall, in calculating and communication system
Trust computing is introduced in system, trust computing is being calculated and widely used in communication system based under hardware security module support
Credible calculating platform.
Since 20 century 70s, many trust computings have been proposed from application program, operating system and hardware view
Platform, but it is wherein most practical be credible calculating platform based on hardware platform.Trust computing purpose is to ensure row
For safety, and propose that one kind can surmount preset security rule, perform the run entity of special behavior.Due to computer network
Using continuous development, computer information safe problem emerges in an endless stream, and takes other technologies means all be difficult to make up due to meter
The hidden danger that the safety defect and insincere factor that calculation machine itself is present is brought to information security.Therefore, development is gone from hardware view
Trusted computer is really to realize the developing direction of trust computing at present.In existing trusted computer platform, in order to protect
The secure and trusted of card credible calculating platform, needs the BIOS to hardware system mainboard etc. to measure.But, in existing tolerance
In scheme, generally involve the modification of the BIOS to hardware system mainboard or be related to the modification to hardware to complete tolerance,
This improves the hardware cost of tolerance.
Thus, when how the hardware system in calculating and communication system carries out credible and secure tolerance, it is to avoid it is right to be related to
The BIOS or hardware of mainboard modifies, and to reduce extra hardware cost, is that those skilled in the art need to solve at present
Technical problem.
The content of the invention
It is an object of the invention to provide a kind of gauging system and method for trusted computer, can be to calculating and leading to
When hardware system in letter system carries out credible and secure tolerance, it is to avoid be related to the BIOS to mainboard or hardware is modified, with
Reduce extra hardware cost.
To solve above-mentioned technical problem, the invention provides following technical scheme:
A kind of gauging system for trusted computer, including:Credible tolerance portion in trusted computer and with institute
The OPROM calibration equipments of trusted computer connection are stated,
Wherein, the OPROM calibration equipments are used to store to enter the data in the mainboard SPI Flash of the trusted computer
The OPROM check informations of row Hash verifications, and corresponding check results;
The credible tolerance portion is used to reading and replicating the OPROM check informations, according to the OPROM check informations pair
Data in the mainboard SPI Flash of the trusted computer carry out Hash verifications, and corresponding check results are stored to described
OPROM calibration equipments.
Preferably, the OPROM calibration equipments are PCIe card, and the PCIe card is by PCIE buses and the trust computing
Machine connects.
Preferably, the credible tolerance portion includes:
BIOS module, for booting up self-inspection during electricity in the trusted computer, and scans the PCIE buses, reads
Take and replicate the OPROM check informations;
Internal memory portion, for storing the OPROM check informations that the BIOS module is replicated;
Performing module, for according to the OPROM check informations stored in the internal memory portion to the trusted computer
Mainboard SPI Flash in data carry out Hash verifications, and corresponding check results are stored into the PCIe card.
Preferably, the BIOS module includes:
Self-test unit, for booting up self-inspection during electricity in the trusted computer;
Whether detector unit, for scanning the PCIE buses, believe comprising OPROM verifications in detecting the PCIe card
Breath, when including the OPROM check informations in the PCIe card, writes to the OPROM base address registers of the PCIe card
Free address in the system address space of one trusted computer;
Reading unit, for reading the content at OPROM base address, judges that whether two bytes of reading value are
0x55AA;
Copied cells, during for two bytes of the reading value are judged in the reading unit as 0x55AA, replicates
OPROM check informations in the PCIe card are to the internal memory portion.
A kind of measure for trusted computer, including:
Reading be arranged in the OPROM calibration equipments in trusted computer for the mainboard to the trusted computer
Data in SPI Flash carry out the OPROM check informations of Hash verifications;
Replicate in the internal memory of the OPROM check informations to the trusted computer;
Hash schools are carried out according to the data in mainboard SPI Flash of the OPROM check informations to the trusted computer
Test;
The Hash is verified corresponding check results to store into the OPROM calibration equipments.
Preferably, read be arranged in the OPROM calibration equipments in trusted computer for the trusted computer
Mainboard SPI Flash in data carry out the OPROM check informations of Hash verifications, including:
Obtain the power on signal of the trusted computer;
The PCIE buses in the trusted computer are scanned, the OPROM calibration equipments in the PCIE buses are detected;
Whether the OPROM check informations are included in judging the OPROM calibration equipments;
If so, a trusted computer is write to the OPROM base address registers of the OPROM calibration equipments then
Free address in system address space;
Content at the OPROM base address of the base address register for reading the OPROM calibration equipments;
Whether the byte for judging the predeterminated position of reading value is preset value;
If so, the OPROM check informations are then extracted;
If it is not, then send to the operating system of the trusted computer starting triggering command.
Preferably, whether the byte of the predeterminated position for judging reading value is preset value, is:
Whether two bytes for judging the reading value are 0x55AA.
Compared with prior art, above-mentioned technical proposal has advantages below:
The gauging system for trusted computer provided by the embodiment of the present invention, including:In trusted computer
Credible tolerance portion and the OPROM calibration equipments being connected with trusted computer, OPROM calibration equipments are used for storage to trusted computer
Mainboard SPI Flash in data carry out the OPROM check informations of Hash verifications, and corresponding check results;Credible tolerance
Portion is used to reading and replicating OPROM check informations, according in mainboard SPI Flash of the OPROM check informations to trusted computer
Data carry out Hash verifications, and corresponding check results are stored to OPROM calibration equipments.Employ trusted computer external
OPROM calibration equipments store OPROM check informations, for carrying out to the data in the SPI Flash in trust computing mainboard
Verification, and corresponding check results are stored, so after trusted computer enters operating system, user can be directly viewable
The check results recorded in OPROM calibration equipments, complete the purpose of OPROM metric computers, and without the need for mainboard during this
BIOS modifies without modifying to hardware, and it is convenient to realize, reduces extra hardware cost.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can be with basis
These accompanying drawings obtain other accompanying drawings.
The gauging system structural representation for trusted computer that Fig. 1 is provided by a kind of specific embodiment of the invention
Figure;
The measure flow chart for trusted computer that Fig. 2 is provided by a kind of specific embodiment of the invention.
Specific embodiment
The core of the present invention is to provide a kind of gauging system and method for trusted computer, can be to calculating and leading to
When hardware system in letter system carries out credible and secure tolerance, it is to avoid be related to the BIOS to mainboard or hardware is modified, with
Reduce extra hardware cost.
In order that the above objects, features and advantages of the present invention can become apparent from it is understandable, below in conjunction with the accompanying drawings to this
Bright specific embodiment is described in detail.
Elaborate detail in order to fully understand the present invention in the following description.But the present invention can with it is various not
It is same as alternate manner described here to implement, those skilled in the art can do class in the case of without prejudice to intension of the present invention
Like popularization.Therefore the present invention is not limited by following public specific embodiment.
Refer to Fig. 1, the gauging system for trusted computer that Fig. 1 is provided by a kind of specific embodiment of the invention
Structural representation.
A kind of specific embodiment of the present invention provides a kind of gauging system for trusted computer, including:It is located at
Credible tolerance portion 1 and the OPROM calibration equipments 2 being connected with trusted computer in trusted computer, wherein, OPROM verifications set
Standby 2 are used for storage carries out the OPROM check informations of Hash verifications to the data in the mainboard SPI Flash of trusted computer, and
Corresponding check results;Credible tolerance portion 1 is used to reading and replicating OPROM check informations, according to OPROM check informations to credible
Data in the mainboard SPI Flash of computer carry out Hash verifications, and corresponding check results are stored to OPROM calibration equipments
2.In the present embodiment, OPROM calibration equipments 2 are preferably PCIe card, and PCIe card passes through PCIE buses and trusted computer connects
Connect.
In the present embodiment, using OPROM calibration equipments being loaded in the SPI internal memories of the mainboard to trusted computer
The check information verified by data, the space that can break away from trusted computer ROM are limited.It is credible when carrying out to trusted computer
During tolerance, it is only necessary to read and replicate OPROM verifications by the credible tolerance portion in trusted computer from OPROM calibration equipments
Information, and Hash verifications are carried out according to the data in mainboard SPI Flash of the OPROM check informations to trusted computer, in school
Corresponding check results are stored to OPROM calibration equipments after the completion of testing.So, when the os starting of trusted computer
Afterwards, only trusted computer need to be operated to view the check results by checking OPROM calibration equipment internal memories.This programme passes through
OPROM is measured to computer, and it is convenient to realize, and without the need for modify to mainboard BIOS without modifying to hardware,
Reduce extra hardware cost.
It should be noted that so-called OPROM refers to expansion ROM, i.e., one group being stored in PCIE device card internal memory
Firmware program, this group of program can be called during startup self-detection by the system bios of main frame.
On the basis of above-mentioned embodiment, in one embodiment of the invention, credible tolerance portion includes:
BIOS module, for booting up self-inspection during electricity in trusted computer, and scans PCIE buses, reads and replicates
OPROM check informations;
Internal memory portion, for storing the OPROM check informations of BIOS module duplication;
Performing module, for the mainboard SPI Flash according to the OPROM check informations stored in internal memory portion to trusted computer
In data carry out Hash verifications, and corresponding check results are stored into PCIe card.
Wherein, BIOS module includes:
Self-test unit, for booting up self-inspection during electricity in trusted computer;
Whether detector unit, for scanning PCIE buses, include OPROM check informations in detection PCIe card, in PCIe card
In comprising OPROM check informations when, the system address of a trusted computer is write to the OPROM base address registers of PCIe card
Free address in space;
Reading unit, for reading the content at OPROM base address, judges that whether two bytes of reading value are
0x55AA;
Copied cells, during for two bytes of reading value are judged in reading unit as 0x55AA, replicates in PCIe card
OPROM check informations to internal memory portion.
In the present embodiment, BIOS module is the basic input output system in computer, and which is one group and is cured to meter
The program on a rom chip of mainboard is calculated, this group of program includes the program of the most important basic input and output of computer, opens
Machine self-check program and system self-triggered program.The major function of BIOS is to provide the bottom, most direct hardware for computer
It is set and controlled.
The electricity when starting in trusted computer, the self-test unit in BIOS module starts startup self-detection;Then detect single
Unit scans PCIE buses to check the PCIe card in bus;Whether OPROM check informations are included in detection PCIe card, in this enforcement
In mode, OPROM check informations include OPROM programs and Hash checking algorithms, and configuration address to the OPROM bases of PCIe card
Location depositor;Then reading unit reads the content at OPROM base address, judges that whether two bytes of reading value are
0x55AA;If two bytes of reading value are not 0x55AA, the inspection to OPROM is skipped, and then continue to start credible meter
The operating system of calculation machine;If two bytes of reading value are 0x55AA, copied cells replicates the OPROM verifications in PCIe card
Information to internal memory portion, will OPROM check informations copy in the free memory inside trusted computer, then in trust computing
OPROM programs are performed in the internal memory of machine, OPROM programs are according to default Hash checking algorithms in computer motherboard SPI Flash
Data carry out Hash verifications, and corresponding check results are stored in the internal memory of PCIe card, now, BIOS module will be credible
The control of computer gives the operating system of computer, and the operating system of computer starts to start, enters in computer and operate
After system, the operation for responding user can check the internal memory of PCIe card, so as to obtain check results.
Refer to Fig. 2, the measure for trusted computer that Fig. 2 is provided by a kind of specific embodiment of the invention
Flow chart.
Correspondingly, one embodiment of the present invention additionally provides a kind of measure for trusted computer, including:
S11:Reading be arranged in the OPROM calibration equipments in trusted computer for the mainboard to trusted computer
Data in SPI Flash carry out the OPROM check informations of Hash verifications.
Wherein, read be arranged in the OPROM calibration equipments in trusted computer for the mainboard to trusted computer
Data in SPI Flash carry out the OPROM check informations of Hash verifications, including:
The power on signal of trusted computer is obtained, and self-inspection is booted up to control trusted computer;
PCIE buses in scanning trusted computer, detect the OPROM calibration equipments in PCIE buses;
Whether OPROM check informations are included in judging OPROM calibration equipments;
If so, the system address of a trusted computer is write to the OPROM base address registers of OPROM calibration equipments then
Free address in space;
Content at the OPROM base address of the base address register for reading OPROM calibration equipments;
Whether the byte for judging the predeterminated position of reading value is preset value, and preferably the preset value is 0x55AA;
If so, OPROM check informations are then extracted;
If it is not, then send to the operating system of trusted computer starting triggering command.
S12:Replicate in the internal memory of OPROM check informations to trusted computer.
S13:Hash verifications are carried out according to the data in mainboard SPI Flash of the OPROM check informations to trusted computer.
S14:Hash is verified corresponding check results to store into OPROM calibration equipments.
In the present embodiment, in the computer booting self-inspection stage, by the OPROM verification letters in OPROM calibration equipments
Breath is verified to the data in SPI Flash on computer motherboard, and check results are stored on OPROM calibration equipments,
The record that computer can be checked in OPROM calibration equipments into after operating system completes OPROM tolerance obtaining check results
The purpose of computer, is measured to computer by OPROM, and it is convenient to realize, and without the need for mainboard BIOS is modified also without
Hardware need to be modified, reduce extra hardware cost.
In sum, the gauging system and method for trusted computer provided by the present invention, is set by OPROM verifications
OPROM check informations in standby are verified to the data in SPI Flash on computer motherboard, and check results are stored in
On OPROM calibration equipments, the record in computer can check OPROM calibration equipments into after operating system is being verified
As a result, computer is measured by OPROM, it is convenient to realize, and without the need for modifying mainboard BIOS without to hardware
Modify, reduce extra hardware cost.
Above a kind of gauging system and method for trusted computer provided by the present invention is described in detail.This
Apply specific case to be set forth the principle and embodiment of the present invention in text, the explanation of above example is only intended to
Help understands the present invention and its core concept.It should be pointed out that for those skilled in the art, without departing from
On the premise of the principle of the invention, some improvement and modification can also be carried out to the present invention, these improve and modification also falls into this
In bright scope of the claims.
Claims (7)
1. a kind of gauging system for trusted computer, it is characterised in that include:Credible tolerance in trusted computer
Portion and the OPROM calibration equipments being connected with the trusted computer,
Wherein, the OPROM calibration equipments are used for storage is carried out to the data in the mainboard SPI Flash of the trusted computer
The OPROM check informations of Hash verifications, and corresponding check results;
The credible tolerance portion is used to reading and replicating the OPROM check informations, according to the OPROM check informations to described
Data in the mainboard SPI Flash of trusted computer carry out Hash verifications, and corresponding check results are stored to the OPROM
Calibration equipment.
2. system according to claim 1, it is characterised in that the OPROM calibration equipments are PCIe card, the PCIe card
Connected by PCIE buses and the trusted computer.
3. system according to claim 2, it is characterised in that the credible tolerance portion includes:
BIOS module, for booting up self-inspection during electricity in the trusted computer, and scans the PCIE buses, read and
Replicate the OPROM check informations;
Internal memory portion, for storing the OPROM check informations that the BIOS module is replicated;
Performing module, for the master according to the OPROM check informations stored in the internal memory portion to the trusted computer
Data in plate SPI Flash carry out Hash verifications, and corresponding check results are stored into the PCIe card.
4. system according to claim 3, it is characterised in that the BIOS module includes:
Self-test unit, for booting up self-inspection during electricity in the trusted computer;
Whether detector unit, for scanning the PCIE buses, include the OPROM check informations in detecting the PCIe card,
When the OPROM check informations are included in the PCIe card, one is write to the OPROM base address registers of the PCIe card
Free address in the system address space of the trusted computer;
Reading unit, for reading the content at OPROM base address, judges whether two bytes of reading value are 0x55AA;
Copied cells, during for two bytes of the reading value are judged in the reading unit as 0x55AA, replicates described
OPROM check informations in PCIe card are to the internal memory portion.
5. a kind of measure for trusted computer, it is characterised in that include:
Reading is arranged on dodging for the mainboard SPI to the trusted computer in the OPROM calibration equipments in trusted computer
Data in depositing carry out the OPROM check informations of Hash verifications;
Replicate in the internal memory of the OPROM check informations to the trusted computer;
Hash verifications are carried out according to the data in mainboard SPI Flash of the OPROM check informations to the trusted computer;
The Hash is verified corresponding check results to store into the OPROM calibration equipments.
6. method according to claim 5, it is characterised in that the OPROM verifications that reading is arranged in trusted computer set
The OPROM check informations that Hash verifications are carried out for the data in the mainboard SPI Flash to the trusted computer in standby, bag
Include:
Obtain the power on signal of the trusted computer;
The PCIE buses in the trusted computer are scanned, the OPROM calibration equipments in the PCIE buses are detected;
Whether the OPROM check informations are included in judging the OPROM calibration equipments;
If so, the system for a trusted computer being write to the OPROM base address registers of the OPROM calibration equipments then
Free address in address space;
Content at the OPROM base address of the base address register for reading the OPROM calibration equipments;
Whether the byte for judging the predeterminated position of reading value is preset value;
If so, the OPROM check informations are then extracted;
If it is not, then send to the operating system of the trusted computer starting triggering command.
7. method according to claim 6, it is characterised in that whether the byte of the predeterminated position for judging reading value be
Preset value, be:
Whether two bytes for judging the reading value are 0x55AA.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611058840.9A CN106557700B (en) | 2016-11-24 | 2016-11-24 | A kind of gauging system and method for trusted computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611058840.9A CN106557700B (en) | 2016-11-24 | 2016-11-24 | A kind of gauging system and method for trusted computer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106557700A true CN106557700A (en) | 2017-04-05 |
CN106557700B CN106557700B (en) | 2019-11-26 |
Family
ID=58445065
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611058840.9A Active CN106557700B (en) | 2016-11-24 | 2016-11-24 | A kind of gauging system and method for trusted computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106557700B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107729354A (en) * | 2017-08-30 | 2018-02-23 | 晶晨半导体(上海)股份有限公司 | A kind of picture sort method and system |
CN110245495A (en) * | 2018-03-09 | 2019-09-17 | 阿里巴巴集团控股有限公司 | BIOS method of calibration, configuration method, equipment and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101515316A (en) * | 2008-02-19 | 2009-08-26 | 北京工业大学 | Trusted computing terminal and trusted computing method |
CN102063591A (en) * | 2011-01-07 | 2011-05-18 | 北京工业大学 | Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform |
CN202362788U (en) * | 2011-11-21 | 2012-08-01 | 国民技术股份有限公司 | Dependable computing device with USB (Universal Serial Bus) interfaces |
CN102693385A (en) * | 2012-05-28 | 2012-09-26 | 山东神思电子技术股份有限公司 | Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof |
CN104331666A (en) * | 2014-11-10 | 2015-02-04 | 成都卫士通信息产业股份有限公司 | Trusted measurement method for computer systems |
CN105160255A (en) * | 2015-08-06 | 2015-12-16 | 浪潮电子信息产业股份有限公司 | Trustworthy measurement apparatus and method |
CN105303094A (en) * | 2015-05-07 | 2016-02-03 | 同方计算机有限公司 | Safety self-verification system of USB main control chip and safety self-verification method of USB main control chip |
CN106127057A (en) * | 2016-06-23 | 2016-11-16 | 浪潮电子信息产业股份有限公司 | Method for constructing trusted boot control based on TPM |
-
2016
- 2016-11-24 CN CN201611058840.9A patent/CN106557700B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101515316A (en) * | 2008-02-19 | 2009-08-26 | 北京工业大学 | Trusted computing terminal and trusted computing method |
CN102063591A (en) * | 2011-01-07 | 2011-05-18 | 北京工业大学 | Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform |
CN202362788U (en) * | 2011-11-21 | 2012-08-01 | 国民技术股份有限公司 | Dependable computing device with USB (Universal Serial Bus) interfaces |
CN102693385A (en) * | 2012-05-28 | 2012-09-26 | 山东神思电子技术股份有限公司 | Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof |
CN104331666A (en) * | 2014-11-10 | 2015-02-04 | 成都卫士通信息产业股份有限公司 | Trusted measurement method for computer systems |
CN105303094A (en) * | 2015-05-07 | 2016-02-03 | 同方计算机有限公司 | Safety self-verification system of USB main control chip and safety self-verification method of USB main control chip |
CN105160255A (en) * | 2015-08-06 | 2015-12-16 | 浪潮电子信息产业股份有限公司 | Trustworthy measurement apparatus and method |
CN106127057A (en) * | 2016-06-23 | 2016-11-16 | 浪潮电子信息产业股份有限公司 | Method for constructing trusted boot control based on TPM |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107729354A (en) * | 2017-08-30 | 2018-02-23 | 晶晨半导体(上海)股份有限公司 | A kind of picture sort method and system |
CN107729354B (en) * | 2017-08-30 | 2021-08-10 | 晶晨半导体(上海)股份有限公司 | Picture ordering method and system |
CN110245495A (en) * | 2018-03-09 | 2019-09-17 | 阿里巴巴集团控股有限公司 | BIOS method of calibration, configuration method, equipment and system |
Also Published As
Publication number | Publication date |
---|---|
CN106557700B (en) | 2019-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8099718B2 (en) | Method and system for whitelisting software components | |
EP1754126B1 (en) | Enhancing trusted platform module performance | |
US10204698B2 (en) | Method to dynamically inject errors in a repairable memory on silicon and a method to validate built-in-self-repair logic | |
EP2754085B1 (en) | Verifying firmware integrity of a device | |
CN111638936B (en) | Virtual machine static measurement method and device based on built-in security architecture | |
US7293204B2 (en) | Computer peripheral connecting interface system configuration debugging method and system | |
US20090328022A1 (en) | Systems and methods for maintaining crtm code | |
CN108280351A (en) | A kind of credible startup method of the electricity consumption acquisition terminal based on TPM | |
CN102012979A (en) | Embedded credible computing terminal | |
US20130173899A1 (en) | Method for Secure Self-Booting of an Electronic Device | |
CN106557700B (en) | A kind of gauging system and method for trusted computer | |
CN112925524A (en) | Method and device for detecting unsafe direct memory access in driver | |
US11347582B2 (en) | Method and apparatus for self-diagnosis of ram error detection logic of powertrain controller | |
JP2005149501A (en) | System and method for testing memory with expansion card using dma | |
CN115599618A (en) | Register dynamic relocation verification method and device, storage medium and processor | |
JP3171325B2 (en) | Memory test apparatus and method and recording medium | |
JP2013257711A (en) | Information processing device and information processing method | |
WO2012008319A1 (en) | Emulator verification system, emulator verification method | |
CN112765021A (en) | Debugging and checking method, device, equipment and storage medium of boot program | |
JP2003271694A (en) | Simulation method and device for verifying logic circuit including processor and error detecting program for verifying logic circuit | |
CN112486747A (en) | Memory abnormity detection method and device, electronic equipment and readable storage medium | |
CN112069009A (en) | Method and device for pressure test in Recovery mode and terminal equipment | |
EP3387535B1 (en) | Apparatus and method for software self test | |
CN110399726A (en) | TPM phy chip detection method, device, equipment and readable storage medium storing program for executing | |
US20230155840A1 (en) | Information processing apparatus and control method for information processing apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province Applicant after: Suzhou Guoxin Technology Co., Ltd. Address before: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province Applicant before: C*Core Technology (Suzhou) Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |