CN109784061A - The method and device for starting that control server is credible - Google Patents

The method and device for starting that control server is credible Download PDF

Info

Publication number
CN109784061A
CN109784061A CN201811545202.9A CN201811545202A CN109784061A CN 109784061 A CN109784061 A CN 109784061A CN 201811545202 A CN201811545202 A CN 201811545202A CN 109784061 A CN109784061 A CN 109784061A
Authority
CN
China
Prior art keywords
reference value
bios
code block
bmc
destination server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811545202.9A
Other languages
Chinese (zh)
Inventor
王海洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TEAMSUN INFORMATION CO LTD
Original Assignee
BEIJING TEAMSUN INFORMATION CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TEAMSUN INFORMATION CO LTD filed Critical BEIJING TEAMSUN INFORMATION CO LTD
Priority to CN201811545202.9A priority Critical patent/CN109784061A/en
Publication of CN109784061A publication Critical patent/CN109784061A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the present invention provides a kind of method and device of credible starting of control server, the described method includes: if there are the BIOS integrality a reference values of destination server in the BMC Flash of destination server, operation is then decrypted to a reference value in BMC Flash based on SM4 symmetric cryptographic algorithm, a reference value after obtaining decryption;Wherein, integrality a reference value carries out measurement acquisition by the complete code block in advance to BIOS;Operation is carried out based on current execution code block of the SM3 hash algorithm to BIOS in destination server, obtains the current metric for executing code block;If the metric for currently executing code block is identical as a reference value after decryption, started using the BMC guidance BIOS in destination server.Present invention method is simple, can effective guarantee BIOS starting when it is credible, without increasing any hardware spending just, it is constant to be able to maintain the original hardware configuration of BIOS, has universal adaptability.

Description

The method and device for starting that control server is credible
Technical field
The embodiment of the present invention belongs to computer security technical field, opens more particularly, to a kind of control server is credible Dynamic method and device.
Background technique
Nowadays computer system is widely used in daily life.The start-up course of computer is to run first BIOS (Basic Input Output System, basic input output system), detects computer system and is configured, Then loading operation system and bottom firmware is run.BIOS in computer, which is generally stored inside this non-volatile memories of flash memory, to be held In device, and BIOS is often the object of virus, hacker attack.At the same time, server is as a kind of mainframe computer, BIOS It is faced with safety problem, with the arrival of big data and cloud computing, the safety problem of BIOS is especially prominent.
The security threat of BIOS is divided into inside threat and outside threat.Inside threat such as BIOS dysfunction, configuration loophole, Information leakage etc..Outside threat such as BIOS physical attacks, BIOS malicious code insertion etc., attack pattern are by executing code BIOS is modified, so that BIOS or operating system be caused to be destroyed.The inside threats such as BIOS functional fault, information leakage belong to normally Defect existing for program or software module, and outside threat is by destroying bios code or data integrity to BIOS system and meter Calculation machine system is attacked and is destroyed then as abnormal defect.
The mode for being currently typically based on credible measurement detects BIOS integrity failure.Protection based on credible measurement to BIOS It is broadly divided into based on TPM (Trusted Platform Module, credible platform module), TCM (Trusted Cryptography Module, credible password module) or the hardware such as other trusted firmwares protection, in BIOS start-up course By calling the cryptographic algorithm inside hardware to verify the code inside BIOS, such method depends in use Additional hardware module needs to increase additional reliable hardware module, this will will increase hardware spending and cost, or even needs to repair Change server bottom architecture, increases development difficulty.
Summary of the invention
To overcome the problems, such as that the credible starting of above-mentioned existing control server needs to rely on additional hardware module or at least It partly solves the above problems, the embodiment of the present invention provides a kind of method and device of credible starting of control server.
According to a first aspect of the embodiments of the present invention, a kind of method of credible starting of control server is provided, comprising:
If being based in the BMC Flash of destination server there are the BIOS integrality a reference value of the destination server Operation is decrypted to a reference value in the BMC Flash in SM4 symmetric cryptographic algorithm, a reference value after obtaining decryption;Wherein, Integrality a reference value in the BMC Flash passes through the complete code block degree of progress in advance to BIOS in the destination server Amount obtains;
Operation is carried out based on current execution code block of the SM3 hash algorithm to BIOS in the destination server, obtains institute State the current metric for executing code block;
If the current metric for executing code block is identical as a reference value after the decryption, taken using the target The BMC being engaged in device guides the BIOS starting.
Second aspect according to embodiments of the present invention provides a kind of device of credible starting of control server, comprising:
Crypto module, for the BIOS integrality in the BMC Flash of destination server there are the destination server When a reference value, operation is decrypted to a reference value in the BMC Flash based on SM4 symmetric cryptographic algorithm, after obtaining decryption A reference value;Wherein, the integrality a reference value in the BMC Flash by advance in the destination server BIOS it is complete Whole code block carries out measurement acquisition;
Metric module, for based on SM3 hash algorithm to the current execution code block of BIOS in the destination server into Row operation obtains the current metric for executing code block;
Correction verification module, if identical as a reference value after the decryption for the current metric for executing code block, The BIOS is guided to start using the BMC in the destination server.
In terms of third according to an embodiment of the present invention, a kind of electronic equipment is also provided, comprising:
At least one processor;And
At least one processor being connect with the processor communication, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to refer to Order is able to carry out in the various possible implementations of first aspect control service provided by any possible implementation The method for starting that device is credible.
4th aspect according to an embodiment of the present invention, also provides a kind of non-transient computer readable storage medium, described Non-transient computer readable storage medium stores computer instruction, and the computer instruction makes the computer execute first aspect Various possible implementations in the credible starting of control server provided by any possible implementation method.
The embodiment of the present invention provides a kind of method and device of credible starting of control server, and this method is by making BMC For the root of trust of credible starting chain, the trust chain of BMC to BIOS starting is established using integrity verification and symmetric cryptosystem, Call SM4 symmetric cryptographic algorithm that fortune is decrypted to the BIOS integrality a reference value in BMC Flash before BMC starting BIOS It calculates, then carries out operation using current execution code block of the SM3 hash algorithm to BIOS, BIOS is currently executed to the measurement of code Value is compared with a reference value after decryption, compare it is consistent after start BIOS, thus realize BIOS is currently executed code block into Row integrality and authenticity verification, on the one hand, ensure to be the integrality of BIOS and be not implanted malicious code, effective guarantee It is credible when BIOS starts, it ensure that the credible of system platform performing environment, help to improve security of system;On the other hand, Method is simple, can be effectively protected expected metric without increasing any hardware spending, be able to maintain the original hardware of BIOS Structure is constant, has universal adaptability.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the method overall flow schematic diagram of the credible starting of control server provided in an embodiment of the present invention;
Fig. 2 is the method flow schematic diagram for the credible starting of control server that further embodiment of this invention provides;
Fig. 3 is the apparatus structure schematic diagram of the credible starting of control server provided in an embodiment of the present invention;
Fig. 4 is electronic equipment overall structure diagram provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
A kind of method of credible starting of control server is provided in one embodiment of the invention, and Fig. 1 is that the present invention is real The method overall flow schematic diagram of the credible starting of control server of example offer is provided, this method comprises: S101, if destination server BMC Flash in there are the BIOS integrality a reference values of the destination server, then based on SM4 symmetric cryptographic algorithm to described Operation is decrypted in a reference value in BMC Flash, a reference value after obtaining decryption;Wherein, complete in the BMC Flash Property a reference value carries out measurement acquisition by the complete code block in advance to BIOS in the destination server;S102 is miscellaneous based on SM3 The algorithm that gathers carries out operation to the current execution code block of BIOS in the destination server, obtains the current execution code block Metric;S103 uses the mesh if the current metric for executing code block is identical as a reference value after the decryption It marks the BMC in server and guides the BIOS starting.
Wherein, destination server is the server for needing to carry out credible starting.As shown in Fig. 2, to destination server into When row starting, first to the BMC of destination server (Baseboard Management Controller, substrate management control Device) it is powered on, completeness check is equipped with inside BMC, so that it is guaranteed that BMC is believable.In the flash memory Flash for reading BMC BIOS a reference value.BIOS integrality a reference value is the encryption obtained after being measured and encrypted by the complete code block to BIOS Metric.If the BIOS a reference value in Flash is sky, illustrate that BMC starts BIOS for the first time, needs to calculate BMC starting BIOS process A reference value.If the BIOS a reference value in Flash is not sky, BMC guidance BIOS normally starts.
When BMC is during guiding BIOS load, i.e., when BIOS a reference value is not sky in BMC Flash, need pair BIOS currently executes code block and is measured and carry out integrity verification.Detailed process is to call SM4 symmetric cryptographic algorithm to depositing Operation is decrypted in the BIOS a reference value stored up in Flash, a reference value after being decrypted, and then calls SM3 hash algorithm pair The current execution code block of BIOS carries out that metric is calculated.Finally the current metric for executing code block is obtained with decryption The a reference value of BIOS complete code block is compared, and compares complete, the current BIOS that unanimously illustrates that BIOS currently executes code block State is credible, and BMC guides BIOS starting;Otherwise illustrate that current BIOS is insincere, do not start BIOS, return abnormal.Wherein SM3 is miscellaneous It gathers algorithm and SM4 symmetric cryptographic algorithm is the commercial cipher algorithm in China, system can be guaranteed using the combination of two kinds of algorithms Safety.
The present embodiment is by utilizing integrity verification and symmetric cryptosystem using BMC as the root of trust of credible starting chain The trust chain for establishing BMC to BIOS starting calls SM4 symmetric cryptographic algorithm in BMC Flash before BMC starts BIOS Operation is decrypted in BIOS integrality a reference value, is then transported using current execution code block of the SM3 hash algorithm to BIOS It calculates, the metric that BIOS is currently executed to code is compared with a reference value after decryption, consistent rear starting BIOS is compared, thus Realization currently executes code block to BIOS and carries out integrality and authenticity verification, on the one hand, ensures to be the integrality of BIOS and do not have It is implanted malicious code, it is credible when effective guarantee BIOS starts, it ensure that the credible of system platform performing environment, facilitate Improve security of system;On the other hand, method is simple, can be effectively protected expected measurement without increasing any hardware spending Value, it is constant to be able to maintain the original hardware configuration of BIOS, has universal adaptability.
On the basis of the above embodiments, if there are the targets in the BMC Flash of destination server in the present embodiment The BIOS a reference value of server is then decrypted the BIOS a reference value in the BMC Flash based on SM4 symmetric cryptographic algorithm The step of operation, a reference value after being decrypted further include: if the BIOS a reference value is not present in the BMC Flash, Operation is carried out based on backup code block of the SM3 hash algorithm to BIOS in the destination server, obtains the BIOS's The metric of backup code block, using the metric of the backup code block as a reference value of the BIOS;Based on described SM4 pairs Claim cryptographic algorithm to carry out cryptographic calculation to a reference value, obtains encrypted a reference value;The encrypted a reference value is deposited It stores up in the BMC Flash.
Wherein, the backup code block of BIOS is the complete code block of BIOS backup, is not altered, and is had very high complete Property.Start BIOS for the first time, needs to collect a reference value of BMC starting BIOS process, call SM3 hash algorithm to back up BIOS at this time Code block carries out hash operation, obtains 256 a reference values.SM4 symmetric cryptographic algorithm is called to carry out cryptographic calculation to a reference value, Obtain encrypted a reference value.By the storage of encrypted a reference value into BMC Flash, so as to when starting after server, A reference value is obtained directly from BMC Flash carries out credible judgement.
On the basis of the above embodiments, in the present embodiment based on the SM4 symmetric cryptographic algorithm to a reference value into Row cryptographic calculation, the step of obtaining encrypted a reference value, specifically include:
SM4 encryption key and SM4 decruption key are generated based on the SM4 symmetric cryptographic algorithm;According to administrator's input The SM4 encryption key carries out cryptographic calculation to a reference value using the SM4 symmetric cryptographic algorithm, obtains encrypted A reference value;Correspondingly, operation is decrypted to a reference value in the BMC Flash based on SM4 symmetric cryptographic algorithm, obtains solution The step of a reference value after close, specifically includes: the SM4 decruption key inputted according to administrator, symmetrically close using the SM4 Operation is decrypted to the BIOS a reference value in the BMC Flash in code algorithm, a reference value after obtaining decryption.
Specifically, it is in advance based on SM4 symmetric cryptographic algorithm and generates a pair of secret keys, is i.e. SM4 encryption key and SM4 decryption is close Key.When collecting a reference value of BMC starting BIOS process, administrator is needed to input SM4 encryption key.SM3 hash is being called to calculate After method obtains a reference value to the progress hash operation of BIOS backup code block.SM4 symmetric cryptographic algorithm is called to use SM4 encryption key Cryptographic calculation is carried out to a reference value, obtains encrypted a reference value.Need administrator defeated during BMC guidance BIOS starting Enter SM4 decruption key, calls SM4 symmetric cryptographic algorithm that operation is decrypted to a reference value using SM4 decruption key, obtain decryption A reference value afterwards, the metric that a reference value after decryption is currently executed to code block with BIOS are compared, so that it is determined that BIOS currently executes whether code block is complete, and whether BIOS is credible, is determined whether to start BIOS according to definitive result.
A kind of device of credible starting of control server is provided in another embodiment of the present invention, and the device is for real Method in existing foregoing embodiments.Therefore, the description in each embodiment of the method for the credible starting of aforementioned control server And definition, it can be used for the understanding of each execution module in the embodiment of the present invention.Fig. 3 is control provided in an embodiment of the present invention clothes The device overall structure diagram of the business credible starting of device, which includes crypto module 301, metric module 302 and correction verification module 303;Wherein:
Crypto module 301 is for there are the BIOS of the destination server is complete in the BMC Flash of destination server Property a reference value when, operation is decrypted to a reference value in the BMC Flash based on SM4 symmetric cryptographic algorithm, obtains decryption A reference value afterwards;Wherein, the integrality a reference value in the BMC Flash passes through in advance to BIOS in the destination server Complete code block carries out measurement acquisition;Metric module 302 is used for based on SM3 hash algorithm to BIOS in the destination server The current code block that executes carries out operation, obtains the current metric for executing code block;If correction verification module 303 is worked as described The preceding metric for executing code block is identical as a reference value after the decryption, then is guided using the BMC in the destination server The BIOS starting.
Wherein, destination server is the server for needing to carry out credible starting.As shown in Fig. 2, to destination server into When row starting, first to the BMC of destination server (Baseboard Management Controller, substrate management control Device) it is powered on, completeness check is equipped with inside BMC, so that it is guaranteed that BMC is believable.In the flash memory Flash for reading BMC BIOS a reference value.BIOS integrality a reference value is the encryption obtained after being measured and encrypted by the complete code block to BIOS Metric.If the BIOS a reference value in Flash is sky, illustrate that BMC starts BIOS for the first time, needs to calculate BMC starting BIOS process A reference value.If the BIOS a reference value in Flash is not sky, BMC guidance BIOS normally starts.
When BMC is during guiding BIOS load, i.e., when BIOS a reference value is not sky in BMC Flash, need pair BIOS currently executes code block and is measured and carry out integrity verification.Detailed process is that crypto module 301 calls SM4 symmetrically close Operation is decrypted to the BIOS a reference value being stored in Flash in code algorithm, a reference value after being decrypted, then metric module 302 calling SM3 hash algorithms to the current execution code block of BIOS carry out that metric is calculated.Terminal check module 303 will The current metric for executing code block is compared with a reference value that decryption obtains BIOS complete code block, compares consistent explanation BIOS currently executes that code block is complete, and current BIOS state is credible, and BMC guides BIOS starting;Otherwise illustrate current BIOS not It is credible, do not start BIOS, returns abnormal.Wherein SM3 hash algorithm and SM4 symmetric cryptographic algorithm are that the commercial cipher in China is calculated Method can guarantee the safety of system using the combination of two kinds of algorithms.
The present embodiment is by utilizing integrity verification and symmetric cryptosystem using BMC as the root of trust of credible starting chain The trust chain for establishing BMC to BIOS starting calls SM4 symmetric cryptographic algorithm in BMC Flash before BMC starts BIOS Operation is decrypted in BIOS integrality a reference value, is then transported using current execution code block of the SM3 hash algorithm to BIOS It calculates, the metric that BIOS is currently executed to code is compared with a reference value after decryption, consistent rear starting BIOS is compared, thus Realization currently executes code block to BIOS and carries out integrality and authenticity verification, on the one hand, ensures to be the integrality of BIOS and do not have It is implanted malicious code, it is credible when effective guarantee BIOS starts, it ensure that the credible of system platform performing environment, facilitate Improve security of system;On the other hand, method is simple, can be effectively protected expected measurement without increasing any hardware spending Value, it is constant to be able to maintain the original hardware configuration of BIOS, has universal adaptability.
It on the basis of the above embodiments, further include a reference value generation module in the present embodiment, in the BMC When the BIOS a reference value being not present in Flash, the backup based on the SM3 hash algorithm to BIOS in the destination server Code block carry out operation, obtain the metric of the backup code block of the BIOS, using the metric of the backup code block as The a reference value of the BIOS;Cryptographic calculation is carried out to a reference value based on the SM4 symmetric cryptographic algorithm, is obtained encrypted A reference value;By the encrypted a reference value storage into the BMC Flash.
On the basis of the above embodiments, crypto module is specifically used in the present embodiment: being calculated based on the SM4 symmetric cryptography Method generates SM4 encryption key and SM4 decruption key;According to the SM4 encryption key that administrator inputs, described SM4 pairs is used Claim cryptographic algorithm to carry out cryptographic calculation to the BIOS a reference value in the BMC Flash, obtains encrypted a reference value;According to pipe Reason person input the SM4 decruption key, using the SM4 symmetric cryptographic algorithm to a reference value in the BMC Flash into Row decryption operation, a reference value after obtaining decryption.
On the basis of the various embodiments described above, correction verification module is also used in the present embodiment: in the current execution code block Metric and the decryption after a reference value it is not identical when, show the incredible information of presently described BIOS, and described in stopping The starting of destination server.
The present embodiment provides a kind of electronic equipment, Fig. 4 is electronic equipment overall structure provided in an embodiment of the present invention signal Figure, which includes: at least one processor 401, at least one processor 402 and bus 403;Wherein,
Processor 401 and memory 402 pass through bus 403 and complete mutual communication;
Memory 402 is stored with the program instruction that can be executed by processor 401, and the instruction of processor caller is able to carry out Method provided by above-mentioned each method embodiment, for example, if there are target clothes in the BMC Flash of destination server The BIOS integrality a reference value of business device, then be decrypted a reference value in the BMC Flash based on SM4 symmetric cryptographic algorithm Operation, a reference value after obtaining decryption;Based on SM3 hash algorithm to the current execution code block of BIOS in the destination server Operation is carried out, the current metric for executing code block is obtained;If the current metric for executing code block and the solution A reference value after close is identical, then guides the BIOS to start using the BMC in the destination server.
The present embodiment provides a kind of non-transient computer readable storage medium, non-transient computer readable storage medium storages Computer instruction, computer instruction make computer execute method provided by above-mentioned each method embodiment, for example, if target There are the BIOS integrality a reference values of the destination server in the BMC Flash of server, then are based on SM4 symmetric cryptographic algorithm Operation is decrypted to a reference value in the BMC Flash, a reference value after obtaining decryption;Based on SM3 hash algorithm to institute The current execution code block for stating BIOS in destination server carries out operation, obtains the current metric for executing code block;If The current metric for executing code block is identical as a reference value after the decryption, then using in the destination server BMC guides the BIOS starting.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer readable storage medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: ROM, RAM, magnetic disk or light The various media that can store program code such as disk.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member It is physically separated with being or may not be, component shown as a unit may or may not be physics list Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of method of the credible starting of control server characterized by comprising
If there are the BIOS integrality a reference values of the destination server in the BMC Flash of destination server, it is based on SM4 pairs Claim cryptographic algorithm that operation is decrypted to a reference value in the BMC Flash, a reference value after obtaining decryption;Wherein, described Integrality a reference value in BMC Flash carries out measurement by the complete code block in advance to BIOS in the destination server and obtains It takes;
Operation is carried out based on current execution code block of the SM3 hash algorithm to BIOS in the destination server, is worked as described in acquisition The preceding metric for executing code block;
If the current metric for executing code block is identical as a reference value after the decryption, the destination server is used In BMC guide BIOS starting.
2. the method according to claim 1, wherein if there are the mesh in the BMC Flash of destination server The BIOS a reference value for marking server, then solve the BIOS a reference value in the BMC Flash based on SM4 symmetric cryptographic algorithm The step of close operation, a reference value after being decrypted further include:
If the BIOS a reference value is not present in the BMC Flash, based on the SM3 hash algorithm to the destination service The backup code block of BIOS carries out operation in device, the metric of the backup code block of the BIOS is obtained, by the backup code A reference value of the metric of block as the BIOS;
Cryptographic calculation is carried out to a reference value based on the SM4 symmetric cryptographic algorithm, obtains encrypted a reference value;
By the encrypted a reference value storage into the BMC Flash.
3. according to the method described in claim 2, it is characterized in that, based on the SM4 symmetric cryptographic algorithm to a reference value The step of carrying out cryptographic calculation, obtaining encrypted a reference value specifically includes:
SM4 encryption key and SM4 decruption key are generated based on the SM4 symmetric cryptographic algorithm;
According to the SM4 encryption key that administrator inputs, using the SM4 symmetric cryptographic algorithm in the BMC Flash BIOS a reference value carry out cryptographic calculation, obtain encrypted a reference value;
Correspondingly, operation is decrypted to a reference value in the BMC Flash based on SM4 symmetric cryptographic algorithm, obtains decryption The step of rear a reference value, specifically includes:
According to the SM4 decruption key that administrator inputs, using the SM4 symmetric cryptographic algorithm in the BMC Flash A reference value be decrypted operation, a reference value after obtaining decryption.
4. method according to claim 1 to 3, which is characterized in that if it is described it is current execute code block metric with The step of a reference value after the decryption is identical, then guides the BIOS to start using the BMC in the destination server is also wrapped It includes:
If the current metric for executing code block and a reference value after the decryption be not identical, presently described BIOS is shown Incredible information, and stop the starting of the destination server.
5. a kind of device of the credible starting of control server characterized by comprising
Crypto module, for the BIOS integrality benchmark in the BMC Flash of destination server there are the destination server When value, operation is decrypted to a reference value in the BMC Flash based on SM4 symmetric cryptographic algorithm, the base after obtaining decryption Quasi- value;Wherein, the integrality a reference value in the BMC Flash passes through in advance to the complete generation of BIOS in the destination server Code block carries out measurement acquisition;
Metric module, for being transported based on current execution code block of the SM3 hash algorithm to BIOS in the destination server It calculates, obtains the current metric for executing code block;
Correction verification module uses if identical as a reference value after the decryption for the current metric for executing code block BMC in the destination server guides the BIOS starting.
6. device according to claim 5, which is characterized in that further include a reference value generation module, be used for:
When the BIOS a reference value being not present in the BMC Flash, based on the SM3 hash algorithm to the destination service The backup code block of BIOS carries out operation in device, the metric of the backup code block of the BIOS is obtained, by the backup code A reference value of the metric of block as the BIOS;
Cryptographic calculation is carried out to a reference value based on the SM4 symmetric cryptographic algorithm, obtains encrypted a reference value;
By the encrypted a reference value storage into the BMC Flash.
7. device according to claim 6, which is characterized in that crypto module is specifically used for:
SM4 encryption key and SM4 decruption key are generated based on the SM4 symmetric cryptographic algorithm;
According to the SM4 encryption key that administrator inputs, using the SM4 symmetric cryptographic algorithm in the BMC Flash BIOS a reference value carry out cryptographic calculation, obtain encrypted a reference value;
According to the SM4 decruption key that administrator inputs, using the SM4 symmetric cryptographic algorithm in the BMC Flash A reference value be decrypted operation, a reference value after obtaining decryption.
8. according to any device of claim 5-7, which is characterized in that correction verification module is also used to: in the current execution When a reference value after the metric of code block and the decryption is not identical, the incredible information of presently described BIOS is shown, and stop The only starting of the destination server.
9. a kind of electronic equipment characterized by comprising
At least one processor, at least one processor and bus;Wherein,
The processor and memory complete mutual communication by the bus;
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy Enough methods executed as described in Claims 1-4 is any.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer instruction is stored up, the computer instruction makes the computer execute the method as described in Claims 1-4 is any.
CN201811545202.9A 2018-12-17 2018-12-17 The method and device for starting that control server is credible Pending CN109784061A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811545202.9A CN109784061A (en) 2018-12-17 2018-12-17 The method and device for starting that control server is credible

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811545202.9A CN109784061A (en) 2018-12-17 2018-12-17 The method and device for starting that control server is credible

Publications (1)

Publication Number Publication Date
CN109784061A true CN109784061A (en) 2019-05-21

Family

ID=66498150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811545202.9A Pending CN109784061A (en) 2018-12-17 2018-12-17 The method and device for starting that control server is credible

Country Status (1)

Country Link
CN (1) CN109784061A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111046392A (en) * 2019-11-26 2020-04-21 深圳中电长城信息安全系统有限公司 BIOS (basic input output System) credibility measuring method and device and terminal equipment
CN111258805A (en) * 2020-01-10 2020-06-09 苏州浪潮智能科技有限公司 Hard disk state monitoring method and device for server and computer device
CN114546745A (en) * 2022-03-02 2022-05-27 北京工业大学 Method for distinguishing fault program section in trusted starting process
CN114595097A (en) * 2022-03-04 2022-06-07 北京工业大学 Method for identifying fault starting program in trusted starting process

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850792A (en) * 2015-05-20 2015-08-19 浪潮电子信息产业股份有限公司 Establishment method and apparatus of trust chain of server
CN106127056A (en) * 2016-06-20 2016-11-16 浪潮电子信息产业股份有限公司 A kind of method for designing of domestic BMC chip trusted firmware
CN106384052A (en) * 2016-08-26 2017-02-08 浪潮电子信息产业股份有限公司 BMC U-boot trusted starting control method
CN107145802A (en) * 2017-05-09 2017-09-08 郑州云海信息技术有限公司 A kind of BIOS integrity measurement methods, baseboard management controller and system
CN107169379A (en) * 2017-05-19 2017-09-15 郑州云海信息技术有限公司 A kind of method and server that integrity measurement is carried out based on BMC and TCM

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850792A (en) * 2015-05-20 2015-08-19 浪潮电子信息产业股份有限公司 Establishment method and apparatus of trust chain of server
CN106127056A (en) * 2016-06-20 2016-11-16 浪潮电子信息产业股份有限公司 A kind of method for designing of domestic BMC chip trusted firmware
CN106384052A (en) * 2016-08-26 2017-02-08 浪潮电子信息产业股份有限公司 BMC U-boot trusted starting control method
CN107145802A (en) * 2017-05-09 2017-09-08 郑州云海信息技术有限公司 A kind of BIOS integrity measurement methods, baseboard management controller and system
CN107169379A (en) * 2017-05-19 2017-09-15 郑州云海信息技术有限公司 A kind of method and server that integrity measurement is carried out based on BMC and TCM

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张焕国 等著: "《可信计算》", 31 August 2011, 武汉大学出版社 *
陈泽茂 等著: "《信息系统安全》", 30 April 2014, 武汉大学出版社 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111046392A (en) * 2019-11-26 2020-04-21 深圳中电长城信息安全系统有限公司 BIOS (basic input output System) credibility measuring method and device and terminal equipment
CN111258805A (en) * 2020-01-10 2020-06-09 苏州浪潮智能科技有限公司 Hard disk state monitoring method and device for server and computer device
CN114546745A (en) * 2022-03-02 2022-05-27 北京工业大学 Method for distinguishing fault program section in trusted starting process
CN114546745B (en) * 2022-03-02 2024-03-22 北京工业大学 Method for distinguishing fault program section in trusted starting process
CN114595097A (en) * 2022-03-04 2022-06-07 北京工业大学 Method for identifying fault starting program in trusted starting process
CN114595097B (en) * 2022-03-04 2024-03-26 北京工业大学 Method for identifying fault starting program in trusted starting process

Similar Documents

Publication Publication Date Title
US10601807B2 (en) Systems and methods for providing container security
US10484185B2 (en) Method and system for distributing attestation key and certificate in trusted computing
CN109784061A (en) The method and device for starting that control server is credible
Pereida García et al. Make sure DSA signing exponentiations really are constant-time
Xiao et al. Security and privacy in cloud computing
US20190146778A1 (en) Device-driven auto-recovery using multiple recovery sources
CN107111713B (en) Automatic validation of software systems
Brengel et al. Identifying key leakage of bitcoin users
Mavroudis et al. A touch of evil: High-assurance cryptographic hardware from untrusted components
CN103888251A (en) Virtual machine credibility guaranteeing method in cloud environment
EP3937045B1 (en) Hash updating methods and apparatuses of blockchain integrated station
US11489823B2 (en) Network enclave attestation for network and compute devices
US20120311341A1 (en) Centralized kernal module loading
EP3333747A1 (en) Methods and systems for detecting rollback attacks
US20200074122A1 (en) Cryptographic operation processing method, apparatus, and system, and method for building measurement for trust chain
Koutroumpouchos et al. Secure edge computing with lightweight control-flow property-based attestation
US10073980B1 (en) System for assuring security of sensitive data on a host
Kreutz et al. ANCHOR: Logically centralized security for software-defined networks
CN109889477A (en) Server based on trusted cryptography's engine starts method and device
Jayaraman et al. Decentralized certificate authorities
Ma et al. CARAF: crypto agility risk assessment framework
Dauterman et al. {SafetyPin}: Encrypted backups with {Human-Memorable} secrets
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN111859379B (en) Processing method and device for protecting data model
Crowther et al. Securing Over-the-Air Firmware Updates (FOTA) for Industrial Internet of Things (IIOT) Devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 101121 3rd floor, 12 Yunjing South Street, Tongzhou District, Beijing

Applicant after: Beijing Xiding Zhonghe Technology Co., Ltd

Address before: 100036 room 1129, building 5, lianhuayuan, Haidian District, Beijing

Applicant before: BEIJING TEAMSUN INFORMATION TECHNOLOGY DEVELOPMENT Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20190521

RJ01 Rejection of invention patent application after publication