CN109784063A - Information processing method, device and electronic equipment - Google Patents

Information processing method, device and electronic equipment Download PDF

Info

Publication number
CN109784063A
CN109784063A CN201811644630.7A CN201811644630A CN109784063A CN 109784063 A CN109784063 A CN 109784063A CN 201811644630 A CN201811644630 A CN 201811644630A CN 109784063 A CN109784063 A CN 109784063A
Authority
CN
China
Prior art keywords
storage region
memory
information
destroyed
tampered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811644630.7A
Other languages
Chinese (zh)
Inventor
王瑞扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201811644630.7A priority Critical patent/CN109784063A/en
Publication of CN109784063A publication Critical patent/CN109784063A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the present application discloses a kind of information processing method, device and electronic equipment, system initialisation phase, information reading is carried out in the first storage region in the memory for being stored with basic input output system, obtains the area attribute information of check information and the memory;Protected field is determined according to area attribute information;Protected field is verified using check information, to judge whether protected field is destroyed or is tampered;If judging result is that protected field is destroyed or be tampered, basic input output system is repaired, basic input output system is avoided to damage the adverse effect being switched on to electronic equipment.

Description

Information processing method, device and electronic equipment
Technical field
This application involves technical field of electronic equipment, more specifically to a kind of information processing method, device and electronics Equipment.
Background technique
During electronic equipment starting up, basic input output system (Basic Input Output System, BIOS) main function is that the bottom, most direct hardware setting and control are provided for electronic equipment, if BIOS is damaged It ruins, then electronic equipment cannot be started up, and need to repair BIOS at this time.
Summary of the invention
The purpose of the application is to provide a kind of information processing method, device and electronic equipment, with it is at least part of overcome it is existing There is technical problem present in technology.
To achieve the above object, this application provides following technical solutions:
A kind of information processing method, comprising:
System initialisation phase carries out in the first storage region in the memory for being stored with basic input output system Information is read, and obtains the area attribute information of check information and the memory;Is determined according to the area attribute information Two storage regions;Wherein, second storage region is protected field;
Second storage region is verified using the check information, whether to judge second storage region It is destroyed or be tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is carried out It repairs.
The above method, it is preferred that baseboard management controller in preset duration do not determine described in be stored with input substantially it is defeated When whether the memory of system is destroyed out or is tampered, information reading is carried out in first storage region, is verified The area attribute information of information and the memory.
The above method, it is preferred that the check information includes: the characteristic value and key of second storage region;Institute It states that second storage region verify using the check information and includes:
Calculate the first cryptographic Hash of second storage region;
It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;
If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters Change.
The above method, it is preferred that if first cryptographic Hash is different from second cryptographic Hash, determine second storage Region is destroyed or is tampered.
The above method, it is preferred that before being verified using the check information to second storage region, also wrap It includes:
The key is compared with pre-stored key;
If the two is identical, determine that the memory is legal memory, using the check information to second storage Region is verified;Otherwise, it determines the memory is illegal memory.
The above method, it is preferred that the key is the public key in rivest, shamir, adelman;By using it is described it is asymmetric plus Private key in close algorithm encrypts to obtain the characteristic value to the cryptographic Hash of second storage region.
A kind of information processing unit, comprising:
Read module, be used for system initialisation phase, first in the memory for being stored with basic input output system Information reading is carried out in storage region, obtains the area attribute information of check information and the memory;According to the region Attribute information determines the second storage region;Wherein, second storage region is protected field;
Correction verification module, for being verified using the check information to second storage region, to judge described Whether two storage regions are destroyed or are tampered;
Repair module, if being that second storage region is destroyed or be tampered for judging result, to described substantially defeated Enter output system to be repaired.
A kind of electronic equipment, comprising:
First memory, for storing basic input output system;
Second memory, at least storing one group of instruction set;
Baseboard management controller, for calling and executing the described instruction collection in the second memory, by executing institute Instruction set is stated to perform the following operation:
System initialisation phase carries out information reading in the first storage region in the first memory, obtains school Test the area attribute information of information and the memory;The second storage region is determined according to the area attribute information;Wherein, Second storage region is protected field;
Second storage region is verified using the check information, whether to judge second storage region It is destroyed or be tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is carried out It repairs.
Above-mentioned electronic equipment, it is preferred that system initialisation phase, the baseboard management controller be not true in preset duration When whether the fixed first memory is destroyed or is tampered, information reading is carried out in first storage region, obtains school Test the area attribute information of information and the memory.
Above-mentioned electronic equipment, it is preferred that the check information includes: the characteristic value of second storage region, Yi Jimi Key;When the baseboard management controller verifies second storage region using the check information, for calculating State the first cryptographic Hash of the second storage region;It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;If First cryptographic Hash is identical as second cryptographic Hash, determines that second storage region is not destroyed and alters.
By above scheme it is found that a kind of information processing method, device and electronic equipment provided by the present application, system are initial The change stage carries out information reading in the first storage region in the memory for being stored with basic input output system, obtains school Test the area attribute information of information and the memory;Protected field is determined according to area attribute information;Believed using verification Breath verifies protected field, to judge whether protected field is destroyed or is tampered;If judging result is protected Region is destroyed or is tampered, and repairs to basic input output system, avoids basic input output system damage to electronics The adverse effect of device power-up.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of implementation flow chart of information processing method provided by the embodiments of the present application;
Fig. 2 is a kind of structural schematic diagram of information processing unit provided by the embodiments of the present application;
Fig. 3 is a kind of structural schematic diagram of electronic equipment provided by the embodiments of the present application.
Specification and claims and term " first " in above-mentioned attached drawing, " second ", " third " " the 4th " etc. (if In the presence of) it is part for distinguishing similar, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so that embodiments herein described herein can be in addition to illustrating herein Sequence in addition is implemented.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under that premise of not paying creative labor Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is a kind of implementation flow chart of information processing method provided by the embodiments of the present application, can wrap It includes:
Step S11: system initialisation phase, the first memory block in the memory for being stored with basic input output system Information reading is carried out in domain, obtains the area attribute information of check information and memory;Is determined according to area attribute information Two storage regions;Wherein, the second storage region is protected field.
In the embodiment of the present application, it is stored with and will record the storage for storing the BIOS in the memory of basic input output system The area attribute information of device, i.e. which region are protected field (being denoted as the second storage region), which region is not protected Region, wherein protected field is the region that should not be tampered or change.In addition, also using Encryption Algorithm to protected field It is encrypted, generates the check information of the protected field, and the check information and above-mentioned zone attribute information are written In the one piece of region reserved in the memory of BIOS.That is, also specially being set other than storing BIOS in the memory of BIOS Region (being denoted as the first storage region) has been counted to store above-mentioned check information and area attribute information.Protected field can be with It is entire BIOS storage region, is also possible to a part of BIOS storage region.
Optionally, output output system substantially can be based on UEFI ((Unified Extensible Firmware Interface) the basic input output system of same Extensible Firmware Interface.System initialisation phase can refer to substantially defeated Enter PEI (Pre-EFIInitialization) initial stage of the memory of output system after system boot.
Step S12: verifying the second storage region using the check information of reading, to judge that the second storage region is It is no destroyed or be tampered.
In the embodiment of the present application, the second storage region, which does not verify, to be passed through, then it is assumed that the second storage region is destroyed or is altered Change.
Step S13: if judging result is that the second storage region is destroyed or be tampered, basic input output system is carried out It repairs.
In the embodiment of the present application, as long as judging that protected field is destroyed or is tampered, to basic input and output system System is repaired.
Information processing method provided by the present application, system initialisation phase are being stored with depositing for basic input output system Information reading is carried out in the first storage region in reservoir, obtains the area attribute information of check information and the memory; Protected field is determined according to area attribute information;Protected field is verified using check information, it is protected to judge Whether region is destroyed or is tampered;If judging result is that protected field is destroyed or be tampered, to basic input and output system System is repaired, and basic input output system is avoided to damage the adverse effect being switched on to electronic equipment.
In an optional embodiment, the above method can be by baseboard management controller (Baseboard Management Controller, BMC) it executes, specifically, system initialisation phase, baseboard management controller in preset duration do not deposit by determination Whether the memory for containing basic input output system is destroyed or when being tampered, and information reading is carried out in the first storage region It takes, obtains the area attribute information of check information and memory.
In the prior art, basic input output system and baseboard management controller are by ABR (Automatic BIOS Recovery, automatic BIOS are repaired) mechanism realizes the reparation of BIOS.The principle of ABR mechanism is: system initialisation phase, BMC It can start timing, when BIOS does not transmit halt instruction to the change of BMC in 6 minutes, BMC can restart system, if situation is continuous again Occur 2 times, then assert that the memory of storage BIOS is destroyed or alters, then BIOS is repaired.That is, existing skill In art, need just to can confirm that for 18 minutes whether the memory of storage BIOS is damaged or altered in total.
And in the application, determination is not stored with basic input to baseboard management controller (in such as 6 minutes) in preset duration When whether the memory of output system is destroyed or is tampered, information reading is carried out in the first storage region, directly according to reading The information got judges whether the memory for storing BIOS is destroyed or is tampered.It can fast and accurately determine storage BIOS Memory it is whether destroyed or be tampered.
It may include: the characteristic value of the second storage region, Yi Jimi in an optional embodiment, in above-mentioned check information Key;A kind of above-mentioned implementation verified using check information to the second storage region can be with are as follows:
Calculate the first cryptographic Hash of the second storage region;
It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;That is, the second storage region The characteristic value of storage is the cryptographic Hash of encryption.
If the first cryptographic Hash is identical as the second cryptographic Hash, determine that the second storage region is not destroyed and alters.
If the first cryptographic Hash is different from the second cryptographic Hash, determine that the second storage region is destroyed or alters.
Optionally, the key for including in check information can be the public key in rivest, shamir, adelman;Second storage region Characteristic value be to be added by using cryptographic Hash of the private key in the rivest, shamir, adelman to second storage region It is close to obtain.Further ensure the safety of BIOS.
In an optional embodiment, before being verified using check information to the second storage region, it can also wrap It includes:
Key in check information is compared with pre-stored key.
If the two is identical, determines that the memory of storage basic input output system is legal memory, then utilize verification letter Breath verifies second storage region;If the two is different, determine that the memory of storage basic input output system is non- Method memory can determine that the memory of storage basic input output system is destroyed or alters, no longer need to deposit to second at this time Storage area domain is verified.
In the embodiment of the present application, first judge whether hardware (i.e. memory) is legal, only legal in hardware situation Under, just the second storage region is verified, otherwise just the second storage region is not verified, is avoided illegal in memory In the case of unnecessary verification is carried out to the second storage region.
Corresponding with embodiment of the method, the application also provides a kind of information processing unit, information processing provided by the present application A kind of structural schematic diagram of device is as shown in Fig. 2, may include:
Read module 21, correction verification module 22 and repair module 23;Wherein,
Read module 21 be used for system initialisation phase, first in the memory for being stored with basic input output system Information reading is carried out in storage region, obtains the area attribute information of check information and memory;According to area attribute information Determine the second storage region;Wherein, the second storage region is protected field;
Correction verification module 22 is for verifying the second storage region using check information, to judge that the second storage region is It is no destroyed or be tampered;
If repair module 23 is that the second storage region is destroyed or be tampered for judging result, to basic input and output system System is repaired.
Information processing unit provided by the present application, system initialisation phase are being stored with depositing for basic input output system Information reading is carried out in the first storage region in reservoir, obtains the area attribute information of check information and the memory; Protected field is determined according to area attribute information;Protected field is verified using check information, it is protected to judge Whether region is destroyed or is tampered;If judging result is that protected field is destroyed or be tampered, to basic input and output system System is repaired, and basic input output system is avoided to damage the adverse effect being switched on to electronic equipment.
In an optional embodiment, read module 21 specifically can be used for: system initialisation phase, in preset duration Whether the memory that basic input output system is stored with described in not determining is destroyed or when being tampered, and is being stored with basic input Information reading is carried out in the first storage region in the memory of output system
In an optional embodiment, the check information includes: the characteristic value of second storage region, Yi Jimi Key;Correction verification module 22 specifically can be used for:
Calculate the first cryptographic Hash of second storage region;
It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;
If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters Change.
If first cryptographic Hash is different from second cryptographic Hash, determine that second storage region is destroyed or is altered Change.
In an optional embodiment, correction verification module 22 be can be also used for:
Before being verified using the check information to second storage region, by the key be pre-stored it is close Key is compared;
If the two is identical, determine that the memory is legal memory, using the check information to second storage Region is verified;Otherwise, it determines the memory is illegal memory.
In an optional embodiment, the key is the public key in rivest, shamir, adelman;By using described non-right The private key in Encryption Algorithm is claimed to encrypt to obtain the characteristic value to the cryptographic Hash of second storage region.
Corresponding with embodiment of the method, the application also provides a kind of electronic equipment, a kind of structural representation of the electronic equipment Figure is as shown in figure 3, may include:
First memory 31, second memory 32 and baseboard management controller 33;Wherein,
First memory 31 is for storing basic input output system;
Second memory 32 is at least storing one group of instruction set;
Baseboard management controller 33 for calling and execute the instruction set in second memory 32, by execute instruction collect into The following operation of row:
System initialisation phase carries out information reading in the first storage region in the first memory, obtains school Test the area attribute information of information and the memory;The second storage region is determined according to the area attribute information;Wherein, Second storage region is protected field;
Second storage region is verified using the check information, whether to judge second storage region It is destroyed or be tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is carried out It repairs.
Electronic equipment provided by the present application, system initialisation phase, in the memory for being stored with basic input output system In the first storage region in carry out information reading, obtain the area attribute information of check information and the memory;According to Area attribute information determines protected field;Protected field is verified using check information, to judge protected field It is whether destroyed or be tampered;If judging result is that protected field is destroyed or be tampered, to basic input output system into Row is repaired, and basic input output system is avoided to damage the adverse effect being switched on to electronic equipment.
In an optional embodiment, system initialisation phase, baseboard management controller 33 does not determine in preset duration When whether first memory destroyed or is tampered, in the first storage region carry out information reading, obtain check information and The area attribute information of memory.
In an optional embodiment, the check information includes: the characteristic value of second storage region, Yi Jimi Key;When baseboard management controller 33 verifies second storage region using the check information, specifically it can be used for: Calculate the first cryptographic Hash of second storage region;It is decrypted using characteristic value described in the key pair, obtains the second Kazakhstan Uncommon value;If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters. If first cryptographic Hash is different from second cryptographic Hash, determine that second storage region is destroyed or is tampered.
In an optional embodiment, baseboard management controller 33 be can be also used for:
Before being verified using the check information to second storage region, by the key be pre-stored it is close Key is compared;
If the two is identical, determine that the memory is legal memory, using the check information to second storage Region is verified;Otherwise, it determines the memory is illegal memory.
In an optional embodiment, the key is the public key in rivest, shamir, adelman;By using described non-right The private key in Encryption Algorithm is claimed to encrypt to obtain the characteristic value to the cryptographic Hash of second storage region.
In the embodiment of the present application, electronic equipment can be computer.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.Another point, shown or discussed mutual coupling, direct-coupling or communication connection can To be the indirect coupling or communication connection of device or unit through some interfaces, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It should be appreciated that can be combined with each other combination in the embodiment of the present application from power, each embodiment, feature, can realize Solve aforementioned technical problem.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of information processing method, comprising:
System initialisation phase carries out information in the first storage region in the memory for being stored with basic input output system It reads, obtains the area attribute information of check information and the memory;Determine that second deposits according to the area attribute information Storage area domain;Wherein, second storage region is protected field;
Second storage region is verified using the check information, to judge whether second storage region is damaged It ruins or is tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is repaired It is multiple.
2. according to the method described in claim 1, system initialisation phase, baseboard management controller does not determine in preset duration When whether the memory for being stored with basic input output system destroyed or is tampered, in first storage region into Row information is read, and obtains the area attribute information of check information and the memory.
3. according to the method described in claim 1, the check information includes: the characteristic value of second storage region, and Key;It is described using the check information to second storage region carry out verification include:
Calculate the first cryptographic Hash of second storage region;
It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;
If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters.
4., if first cryptographic Hash is different from second cryptographic Hash, determining that described second deposits according to method described in right 3 Storage area domain is destroyed or is tampered.
5. according to the method described in claim 3, carrying out verifying it to second storage region using the check information Before, further includes:
The key is compared with pre-stored key;
If the two is identical, determine that the memory is legal memory, using the check information to second storage region It is verified;Otherwise, it determines the memory is illegal memory.
6. according to the method described in claim 3, the key is the public key in rivest, shamir, adelman;By using described non- Private key in symmetric encipherment algorithm encrypts to obtain the characteristic value to the cryptographic Hash of second storage region.
7. a kind of information processing unit, comprising:
Read module is used for system initialisation phase, the first storage in the memory for being stored with basic input output system Information reading is carried out in region, obtains the area attribute information of check information and the memory;According to the area attribute Information determines the second storage region;Wherein, second storage region is protected field;
Correction verification module, for being verified using the check information to second storage region, to judge that described second deposits Whether storage area domain is destroyed or is tampered;
Repair module, if being that second storage region is destroyed or be tampered for judging result, to it is described input substantially it is defeated System is repaired out.
8. a kind of electronic equipment, comprising:
First memory, for storing basic input output system;
Second memory, at least storing one group of instruction set;
Baseboard management controller, for calling and executing the described instruction collection in the second memory, by executing the finger Collection is enabled to perform the following operation:
System initialisation phase carries out information reading in the first storage region in the first memory, obtains verification letter The area attribute information of breath and the memory;The second storage region is determined according to the area attribute information;Wherein, described Second storage region is protected field;
Second storage region is verified using the check information, to judge whether second storage region is damaged It ruins or is tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is repaired It is multiple.
9. electronic equipment according to claim 8, system initialisation phase, the baseboard management controller is in preset duration When not determining whether the first memory is destroyed or is tampered inside, information reading is carried out in first storage region, Obtain the area attribute information of check information and the memory.
10. electronic equipment according to claim 8, the check information includes: the characteristic value of second storage region, And key;When the baseboard management controller verifies second storage region using the check information, it is used for Calculate the first cryptographic Hash of second storage region;It is decrypted using characteristic value described in the key pair, obtains the second Kazakhstan Uncommon value;If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters.
CN201811644630.7A 2018-12-30 2018-12-30 Information processing method, device and electronic equipment Pending CN109784063A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811644630.7A CN109784063A (en) 2018-12-30 2018-12-30 Information processing method, device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811644630.7A CN109784063A (en) 2018-12-30 2018-12-30 Information processing method, device and electronic equipment

Publications (1)

Publication Number Publication Date
CN109784063A true CN109784063A (en) 2019-05-21

Family

ID=66499594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811644630.7A Pending CN109784063A (en) 2018-12-30 2018-12-30 Information processing method, device and electronic equipment

Country Status (1)

Country Link
CN (1) CN109784063A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1760838A (en) * 2004-10-16 2006-04-19 鸿富锦精密工业(深圳)有限公司 ROM of BIOS data detection system and method
CN1841348A (en) * 2005-03-29 2006-10-04 株式会社东芝 Processor, storage device, computer system, LSI system and method for transferring data
CN101140535A (en) * 2006-09-08 2008-03-12 鸿富锦精密工业(深圳)有限公司 Method for preventing BIOS chip data from missing
CN101364193A (en) * 2007-08-06 2009-02-11 英业达股份有限公司 BIOS automatic recovery method and computer and system using the method
CN101667128A (en) * 2008-09-05 2010-03-10 华硕电脑股份有限公司 Method for updating and repairing basic input and output system
US20120254630A1 (en) * 2011-04-04 2012-10-04 Samsung Electronics Co., Ltd. Method, host, storage, and machine-readable storage medium for protecting content
US20130117566A1 (en) * 2011-11-08 2013-05-09 Samsung Electronics Co., Ltd. Memory system
CN103226505A (en) * 2013-04-22 2013-07-31 华为技术有限公司 Method and equipment for checking basic input output system (BIOS)
CN105786404A (en) * 2016-02-22 2016-07-20 深圳市共进电子股份有限公司 Protective method and device for Flash storage
CN107015878A (en) * 2017-03-24 2017-08-04 联想(北京)有限公司 For system for computer restorative procedure and system
US20180144135A1 (en) * 2016-11-21 2018-05-24 Facebook, Inc. Systems and methods for mitigation of permanent denial of service attacks
US20180165455A1 (en) * 2016-12-13 2018-06-14 Amazon Technologies, Inc. Secure execution environment on a server
CN108256333A (en) * 2018-01-24 2018-07-06 郑州云海信息技术有限公司 Execution method, system, equipment and the readable storage medium storing program for executing of BIOS/firmware
CN108345805A (en) * 2017-05-05 2018-07-31 清华大学 Verify the method and device of firmware

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1760838A (en) * 2004-10-16 2006-04-19 鸿富锦精密工业(深圳)有限公司 ROM of BIOS data detection system and method
CN1841348A (en) * 2005-03-29 2006-10-04 株式会社东芝 Processor, storage device, computer system, LSI system and method for transferring data
CN101140535A (en) * 2006-09-08 2008-03-12 鸿富锦精密工业(深圳)有限公司 Method for preventing BIOS chip data from missing
CN101364193A (en) * 2007-08-06 2009-02-11 英业达股份有限公司 BIOS automatic recovery method and computer and system using the method
CN101667128A (en) * 2008-09-05 2010-03-10 华硕电脑股份有限公司 Method for updating and repairing basic input and output system
US20120254630A1 (en) * 2011-04-04 2012-10-04 Samsung Electronics Co., Ltd. Method, host, storage, and machine-readable storage medium for protecting content
US20130117566A1 (en) * 2011-11-08 2013-05-09 Samsung Electronics Co., Ltd. Memory system
CN103226505A (en) * 2013-04-22 2013-07-31 华为技术有限公司 Method and equipment for checking basic input output system (BIOS)
CN105786404A (en) * 2016-02-22 2016-07-20 深圳市共进电子股份有限公司 Protective method and device for Flash storage
US20180144135A1 (en) * 2016-11-21 2018-05-24 Facebook, Inc. Systems and methods for mitigation of permanent denial of service attacks
US20180165455A1 (en) * 2016-12-13 2018-06-14 Amazon Technologies, Inc. Secure execution environment on a server
CN107015878A (en) * 2017-03-24 2017-08-04 联想(北京)有限公司 For system for computer restorative procedure and system
CN108345805A (en) * 2017-05-05 2018-07-31 清华大学 Verify the method and device of firmware
CN108256333A (en) * 2018-01-24 2018-07-06 郑州云海信息技术有限公司 Execution method, system, equipment and the readable storage medium storing program for executing of BIOS/firmware

Similar Documents

Publication Publication Date Title
US10790976B1 (en) System and method of blockchain wallet recovery
US8874922B2 (en) Systems and methods for multi-layered authentication/verification of trusted platform updates
CN111723383B (en) Data storage and verification method and device
CN104462965B (en) Application integrity verification method and the network equipment
US6993648B2 (en) Proving BIOS trust in a TCPA compliant system
CN106656502A (en) Computer systems and safe execution method
TWI460607B (en) Securing device environment for trust provisioning
US10771264B2 (en) Securing firmware
CN103955648B (en) Method and device for verifying legality of system image
US20050021968A1 (en) Method for performing a trusted firmware/bios update
CN110737897B (en) Method and system for starting measurement based on trusted card
TW201109969A (en) Method and system for securely updating field upgradeable units
TW201939922A (en) Policy Deployment Method, Apparatus, System and Computing System of Trusted Server
TW201516733A (en) System and method for verifying changes to UEFI authenticated variables
GB2450869A (en) A property based attestation system uses a zero knowledge proof to attest to the integrity of a TPM equipped computing device without disclosing configuration
CN111160879B (en) Hardware wallet and security improving method and device thereof
CN110008689A (en) A kind of BMC starting method, apparatus, equipment and computer readable storage medium
CN104715183A (en) Trusted verifying method and equipment used in running process of virtual machine
CN110768791A (en) Zero-knowledge proof data interaction method, node and equipment
CN105426734B (en) A kind of identity identifying method and device based on trust computing
CN109474420A (en) A kind of private key backup method and relevant device
CN107801059A (en) A kind of method for authenticating and server
EP2503482A1 (en) Electronic device with flash memory component
CN106878009A (en) Key updating method and system
US6983364B2 (en) System and method for restoring a secured terminal to default status

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination