CN109784063A - Information processing method, device and electronic equipment - Google Patents
Information processing method, device and electronic equipment Download PDFInfo
- Publication number
- CN109784063A CN109784063A CN201811644630.7A CN201811644630A CN109784063A CN 109784063 A CN109784063 A CN 109784063A CN 201811644630 A CN201811644630 A CN 201811644630A CN 109784063 A CN109784063 A CN 109784063A
- Authority
- CN
- China
- Prior art keywords
- storage region
- memory
- information
- destroyed
- tampered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The embodiment of the present application discloses a kind of information processing method, device and electronic equipment, system initialisation phase, information reading is carried out in the first storage region in the memory for being stored with basic input output system, obtains the area attribute information of check information and the memory;Protected field is determined according to area attribute information;Protected field is verified using check information, to judge whether protected field is destroyed or is tampered;If judging result is that protected field is destroyed or be tampered, basic input output system is repaired, basic input output system is avoided to damage the adverse effect being switched on to electronic equipment.
Description
Technical field
This application involves technical field of electronic equipment, more specifically to a kind of information processing method, device and electronics
Equipment.
Background technique
During electronic equipment starting up, basic input output system (Basic Input Output System,
BIOS) main function is that the bottom, most direct hardware setting and control are provided for electronic equipment, if BIOS is damaged
It ruins, then electronic equipment cannot be started up, and need to repair BIOS at this time.
Summary of the invention
The purpose of the application is to provide a kind of information processing method, device and electronic equipment, with it is at least part of overcome it is existing
There is technical problem present in technology.
To achieve the above object, this application provides following technical solutions:
A kind of information processing method, comprising:
System initialisation phase carries out in the first storage region in the memory for being stored with basic input output system
Information is read, and obtains the area attribute information of check information and the memory;Is determined according to the area attribute information
Two storage regions;Wherein, second storage region is protected field;
Second storage region is verified using the check information, whether to judge second storage region
It is destroyed or be tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is carried out
It repairs.
The above method, it is preferred that baseboard management controller in preset duration do not determine described in be stored with input substantially it is defeated
When whether the memory of system is destroyed out or is tampered, information reading is carried out in first storage region, is verified
The area attribute information of information and the memory.
The above method, it is preferred that the check information includes: the characteristic value and key of second storage region;Institute
It states that second storage region verify using the check information and includes:
Calculate the first cryptographic Hash of second storage region;
It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;
If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters
Change.
The above method, it is preferred that if first cryptographic Hash is different from second cryptographic Hash, determine second storage
Region is destroyed or is tampered.
The above method, it is preferred that before being verified using the check information to second storage region, also wrap
It includes:
The key is compared with pre-stored key;
If the two is identical, determine that the memory is legal memory, using the check information to second storage
Region is verified;Otherwise, it determines the memory is illegal memory.
The above method, it is preferred that the key is the public key in rivest, shamir, adelman;By using it is described it is asymmetric plus
Private key in close algorithm encrypts to obtain the characteristic value to the cryptographic Hash of second storage region.
A kind of information processing unit, comprising:
Read module, be used for system initialisation phase, first in the memory for being stored with basic input output system
Information reading is carried out in storage region, obtains the area attribute information of check information and the memory;According to the region
Attribute information determines the second storage region;Wherein, second storage region is protected field;
Correction verification module, for being verified using the check information to second storage region, to judge described
Whether two storage regions are destroyed or are tampered;
Repair module, if being that second storage region is destroyed or be tampered for judging result, to described substantially defeated
Enter output system to be repaired.
A kind of electronic equipment, comprising:
First memory, for storing basic input output system;
Second memory, at least storing one group of instruction set;
Baseboard management controller, for calling and executing the described instruction collection in the second memory, by executing institute
Instruction set is stated to perform the following operation:
System initialisation phase carries out information reading in the first storage region in the first memory, obtains school
Test the area attribute information of information and the memory;The second storage region is determined according to the area attribute information;Wherein,
Second storage region is protected field;
Second storage region is verified using the check information, whether to judge second storage region
It is destroyed or be tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is carried out
It repairs.
Above-mentioned electronic equipment, it is preferred that system initialisation phase, the baseboard management controller be not true in preset duration
When whether the fixed first memory is destroyed or is tampered, information reading is carried out in first storage region, obtains school
Test the area attribute information of information and the memory.
Above-mentioned electronic equipment, it is preferred that the check information includes: the characteristic value of second storage region, Yi Jimi
Key;When the baseboard management controller verifies second storage region using the check information, for calculating
State the first cryptographic Hash of the second storage region;It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;If
First cryptographic Hash is identical as second cryptographic Hash, determines that second storage region is not destroyed and alters.
By above scheme it is found that a kind of information processing method, device and electronic equipment provided by the present application, system are initial
The change stage carries out information reading in the first storage region in the memory for being stored with basic input output system, obtains school
Test the area attribute information of information and the memory;Protected field is determined according to area attribute information;Believed using verification
Breath verifies protected field, to judge whether protected field is destroyed or is tampered;If judging result is protected
Region is destroyed or is tampered, and repairs to basic input output system, avoids basic input output system damage to electronics
The adverse effect of device power-up.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of implementation flow chart of information processing method provided by the embodiments of the present application;
Fig. 2 is a kind of structural schematic diagram of information processing unit provided by the embodiments of the present application;
Fig. 3 is a kind of structural schematic diagram of electronic equipment provided by the embodiments of the present application.
Specification and claims and term " first " in above-mentioned attached drawing, " second ", " third " " the 4th " etc. (if
In the presence of) it is part for distinguishing similar, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so that embodiments herein described herein can be in addition to illustrating herein
Sequence in addition is implemented.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under that premise of not paying creative labor
Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is a kind of implementation flow chart of information processing method provided by the embodiments of the present application, can wrap
It includes:
Step S11: system initialisation phase, the first memory block in the memory for being stored with basic input output system
Information reading is carried out in domain, obtains the area attribute information of check information and memory;Is determined according to area attribute information
Two storage regions;Wherein, the second storage region is protected field.
In the embodiment of the present application, it is stored with and will record the storage for storing the BIOS in the memory of basic input output system
The area attribute information of device, i.e. which region are protected field (being denoted as the second storage region), which region is not protected
Region, wherein protected field is the region that should not be tampered or change.In addition, also using Encryption Algorithm to protected field
It is encrypted, generates the check information of the protected field, and the check information and above-mentioned zone attribute information are written
In the one piece of region reserved in the memory of BIOS.That is, also specially being set other than storing BIOS in the memory of BIOS
Region (being denoted as the first storage region) has been counted to store above-mentioned check information and area attribute information.Protected field can be with
It is entire BIOS storage region, is also possible to a part of BIOS storage region.
Optionally, output output system substantially can be based on UEFI ((Unified Extensible Firmware
Interface) the basic input output system of same Extensible Firmware Interface.System initialisation phase can refer to substantially defeated
Enter PEI (Pre-EFIInitialization) initial stage of the memory of output system after system boot.
Step S12: verifying the second storage region using the check information of reading, to judge that the second storage region is
It is no destroyed or be tampered.
In the embodiment of the present application, the second storage region, which does not verify, to be passed through, then it is assumed that the second storage region is destroyed or is altered
Change.
Step S13: if judging result is that the second storage region is destroyed or be tampered, basic input output system is carried out
It repairs.
In the embodiment of the present application, as long as judging that protected field is destroyed or is tampered, to basic input and output system
System is repaired.
Information processing method provided by the present application, system initialisation phase are being stored with depositing for basic input output system
Information reading is carried out in the first storage region in reservoir, obtains the area attribute information of check information and the memory;
Protected field is determined according to area attribute information;Protected field is verified using check information, it is protected to judge
Whether region is destroyed or is tampered;If judging result is that protected field is destroyed or be tampered, to basic input and output system
System is repaired, and basic input output system is avoided to damage the adverse effect being switched on to electronic equipment.
In an optional embodiment, the above method can be by baseboard management controller (Baseboard Management
Controller, BMC) it executes, specifically, system initialisation phase, baseboard management controller in preset duration do not deposit by determination
Whether the memory for containing basic input output system is destroyed or when being tampered, and information reading is carried out in the first storage region
It takes, obtains the area attribute information of check information and memory.
In the prior art, basic input output system and baseboard management controller are by ABR (Automatic BIOS
Recovery, automatic BIOS are repaired) mechanism realizes the reparation of BIOS.The principle of ABR mechanism is: system initialisation phase, BMC
It can start timing, when BIOS does not transmit halt instruction to the change of BMC in 6 minutes, BMC can restart system, if situation is continuous again
Occur 2 times, then assert that the memory of storage BIOS is destroyed or alters, then BIOS is repaired.That is, existing skill
In art, need just to can confirm that for 18 minutes whether the memory of storage BIOS is damaged or altered in total.
And in the application, determination is not stored with basic input to baseboard management controller (in such as 6 minutes) in preset duration
When whether the memory of output system is destroyed or is tampered, information reading is carried out in the first storage region, directly according to reading
The information got judges whether the memory for storing BIOS is destroyed or is tampered.It can fast and accurately determine storage BIOS
Memory it is whether destroyed or be tampered.
It may include: the characteristic value of the second storage region, Yi Jimi in an optional embodiment, in above-mentioned check information
Key;A kind of above-mentioned implementation verified using check information to the second storage region can be with are as follows:
Calculate the first cryptographic Hash of the second storage region;
It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;That is, the second storage region
The characteristic value of storage is the cryptographic Hash of encryption.
If the first cryptographic Hash is identical as the second cryptographic Hash, determine that the second storage region is not destroyed and alters.
If the first cryptographic Hash is different from the second cryptographic Hash, determine that the second storage region is destroyed or alters.
Optionally, the key for including in check information can be the public key in rivest, shamir, adelman;Second storage region
Characteristic value be to be added by using cryptographic Hash of the private key in the rivest, shamir, adelman to second storage region
It is close to obtain.Further ensure the safety of BIOS.
In an optional embodiment, before being verified using check information to the second storage region, it can also wrap
It includes:
Key in check information is compared with pre-stored key.
If the two is identical, determines that the memory of storage basic input output system is legal memory, then utilize verification letter
Breath verifies second storage region;If the two is different, determine that the memory of storage basic input output system is non-
Method memory can determine that the memory of storage basic input output system is destroyed or alters, no longer need to deposit to second at this time
Storage area domain is verified.
In the embodiment of the present application, first judge whether hardware (i.e. memory) is legal, only legal in hardware situation
Under, just the second storage region is verified, otherwise just the second storage region is not verified, is avoided illegal in memory
In the case of unnecessary verification is carried out to the second storage region.
Corresponding with embodiment of the method, the application also provides a kind of information processing unit, information processing provided by the present application
A kind of structural schematic diagram of device is as shown in Fig. 2, may include:
Read module 21, correction verification module 22 and repair module 23;Wherein,
Read module 21 be used for system initialisation phase, first in the memory for being stored with basic input output system
Information reading is carried out in storage region, obtains the area attribute information of check information and memory;According to area attribute information
Determine the second storage region;Wherein, the second storage region is protected field;
Correction verification module 22 is for verifying the second storage region using check information, to judge that the second storage region is
It is no destroyed or be tampered;
If repair module 23 is that the second storage region is destroyed or be tampered for judging result, to basic input and output system
System is repaired.
Information processing unit provided by the present application, system initialisation phase are being stored with depositing for basic input output system
Information reading is carried out in the first storage region in reservoir, obtains the area attribute information of check information and the memory;
Protected field is determined according to area attribute information;Protected field is verified using check information, it is protected to judge
Whether region is destroyed or is tampered;If judging result is that protected field is destroyed or be tampered, to basic input and output system
System is repaired, and basic input output system is avoided to damage the adverse effect being switched on to electronic equipment.
In an optional embodiment, read module 21 specifically can be used for: system initialisation phase, in preset duration
Whether the memory that basic input output system is stored with described in not determining is destroyed or when being tampered, and is being stored with basic input
Information reading is carried out in the first storage region in the memory of output system
In an optional embodiment, the check information includes: the characteristic value of second storage region, Yi Jimi
Key;Correction verification module 22 specifically can be used for:
Calculate the first cryptographic Hash of second storage region;
It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;
If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters
Change.
If first cryptographic Hash is different from second cryptographic Hash, determine that second storage region is destroyed or is altered
Change.
In an optional embodiment, correction verification module 22 be can be also used for:
Before being verified using the check information to second storage region, by the key be pre-stored it is close
Key is compared;
If the two is identical, determine that the memory is legal memory, using the check information to second storage
Region is verified;Otherwise, it determines the memory is illegal memory.
In an optional embodiment, the key is the public key in rivest, shamir, adelman;By using described non-right
The private key in Encryption Algorithm is claimed to encrypt to obtain the characteristic value to the cryptographic Hash of second storage region.
Corresponding with embodiment of the method, the application also provides a kind of electronic equipment, a kind of structural representation of the electronic equipment
Figure is as shown in figure 3, may include:
First memory 31, second memory 32 and baseboard management controller 33;Wherein,
First memory 31 is for storing basic input output system;
Second memory 32 is at least storing one group of instruction set;
Baseboard management controller 33 for calling and execute the instruction set in second memory 32, by execute instruction collect into
The following operation of row:
System initialisation phase carries out information reading in the first storage region in the first memory, obtains school
Test the area attribute information of information and the memory;The second storage region is determined according to the area attribute information;Wherein,
Second storage region is protected field;
Second storage region is verified using the check information, whether to judge second storage region
It is destroyed or be tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is carried out
It repairs.
Electronic equipment provided by the present application, system initialisation phase, in the memory for being stored with basic input output system
In the first storage region in carry out information reading, obtain the area attribute information of check information and the memory;According to
Area attribute information determines protected field;Protected field is verified using check information, to judge protected field
It is whether destroyed or be tampered;If judging result is that protected field is destroyed or be tampered, to basic input output system into
Row is repaired, and basic input output system is avoided to damage the adverse effect being switched on to electronic equipment.
In an optional embodiment, system initialisation phase, baseboard management controller 33 does not determine in preset duration
When whether first memory destroyed or is tampered, in the first storage region carry out information reading, obtain check information and
The area attribute information of memory.
In an optional embodiment, the check information includes: the characteristic value of second storage region, Yi Jimi
Key;When baseboard management controller 33 verifies second storage region using the check information, specifically it can be used for:
Calculate the first cryptographic Hash of second storage region;It is decrypted using characteristic value described in the key pair, obtains the second Kazakhstan
Uncommon value;If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters.
If first cryptographic Hash is different from second cryptographic Hash, determine that second storage region is destroyed or is tampered.
In an optional embodiment, baseboard management controller 33 be can be also used for:
Before being verified using the check information to second storage region, by the key be pre-stored it is close
Key is compared;
If the two is identical, determine that the memory is legal memory, using the check information to second storage
Region is verified;Otherwise, it determines the memory is illegal memory.
In an optional embodiment, the key is the public key in rivest, shamir, adelman;By using described non-right
The private key in Encryption Algorithm is claimed to encrypt to obtain the characteristic value to the cryptographic Hash of second storage region.
In the embodiment of the present application, electronic equipment can be computer.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.Another point, shown or discussed mutual coupling, direct-coupling or communication connection can
To be the indirect coupling or communication connection of device or unit through some interfaces, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It should be appreciated that can be combined with each other combination in the embodiment of the present application from power, each embodiment, feature, can realize
Solve aforementioned technical problem.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
1. a kind of information processing method, comprising:
System initialisation phase carries out information in the first storage region in the memory for being stored with basic input output system
It reads, obtains the area attribute information of check information and the memory;Determine that second deposits according to the area attribute information
Storage area domain;Wherein, second storage region is protected field;
Second storage region is verified using the check information, to judge whether second storage region is damaged
It ruins or is tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is repaired
It is multiple.
2. according to the method described in claim 1, system initialisation phase, baseboard management controller does not determine in preset duration
When whether the memory for being stored with basic input output system destroyed or is tampered, in first storage region into
Row information is read, and obtains the area attribute information of check information and the memory.
3. according to the method described in claim 1, the check information includes: the characteristic value of second storage region, and
Key;It is described using the check information to second storage region carry out verification include:
Calculate the first cryptographic Hash of second storage region;
It is decrypted using characteristic value described in the key pair, obtains the second cryptographic Hash;
If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters.
4., if first cryptographic Hash is different from second cryptographic Hash, determining that described second deposits according to method described in right 3
Storage area domain is destroyed or is tampered.
5. according to the method described in claim 3, carrying out verifying it to second storage region using the check information
Before, further includes:
The key is compared with pre-stored key;
If the two is identical, determine that the memory is legal memory, using the check information to second storage region
It is verified;Otherwise, it determines the memory is illegal memory.
6. according to the method described in claim 3, the key is the public key in rivest, shamir, adelman;By using described non-
Private key in symmetric encipherment algorithm encrypts to obtain the characteristic value to the cryptographic Hash of second storage region.
7. a kind of information processing unit, comprising:
Read module is used for system initialisation phase, the first storage in the memory for being stored with basic input output system
Information reading is carried out in region, obtains the area attribute information of check information and the memory;According to the area attribute
Information determines the second storage region;Wherein, second storage region is protected field;
Correction verification module, for being verified using the check information to second storage region, to judge that described second deposits
Whether storage area domain is destroyed or is tampered;
Repair module, if being that second storage region is destroyed or be tampered for judging result, to it is described input substantially it is defeated
System is repaired out.
8. a kind of electronic equipment, comprising:
First memory, for storing basic input output system;
Second memory, at least storing one group of instruction set;
Baseboard management controller, for calling and executing the described instruction collection in the second memory, by executing the finger
Collection is enabled to perform the following operation:
System initialisation phase carries out information reading in the first storage region in the first memory, obtains verification letter
The area attribute information of breath and the memory;The second storage region is determined according to the area attribute information;Wherein, described
Second storage region is protected field;
Second storage region is verified using the check information, to judge whether second storage region is damaged
It ruins or is tampered;
If judging result is that second storage region is destroyed or be tampered, the basic input output system is repaired
It is multiple.
9. electronic equipment according to claim 8, system initialisation phase, the baseboard management controller is in preset duration
When not determining whether the first memory is destroyed or is tampered inside, information reading is carried out in first storage region,
Obtain the area attribute information of check information and the memory.
10. electronic equipment according to claim 8, the check information includes: the characteristic value of second storage region,
And key;When the baseboard management controller verifies second storage region using the check information, it is used for
Calculate the first cryptographic Hash of second storage region;It is decrypted using characteristic value described in the key pair, obtains the second Kazakhstan
Uncommon value;If first cryptographic Hash is identical as second cryptographic Hash, determine that second storage region is not destroyed and alters.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811644630.7A CN109784063A (en) | 2018-12-30 | 2018-12-30 | Information processing method, device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811644630.7A CN109784063A (en) | 2018-12-30 | 2018-12-30 | Information processing method, device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109784063A true CN109784063A (en) | 2019-05-21 |
Family
ID=66499594
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811644630.7A Pending CN109784063A (en) | 2018-12-30 | 2018-12-30 | Information processing method, device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109784063A (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1760838A (en) * | 2004-10-16 | 2006-04-19 | 鸿富锦精密工业(深圳)有限公司 | ROM of BIOS data detection system and method |
CN1841348A (en) * | 2005-03-29 | 2006-10-04 | 株式会社东芝 | Processor, storage device, computer system, LSI system and method for transferring data |
CN101140535A (en) * | 2006-09-08 | 2008-03-12 | 鸿富锦精密工业(深圳)有限公司 | Method for preventing BIOS chip data from missing |
CN101364193A (en) * | 2007-08-06 | 2009-02-11 | 英业达股份有限公司 | BIOS automatic recovery method and computer and system using the method |
CN101667128A (en) * | 2008-09-05 | 2010-03-10 | 华硕电脑股份有限公司 | Method for updating and repairing basic input and output system |
US20120254630A1 (en) * | 2011-04-04 | 2012-10-04 | Samsung Electronics Co., Ltd. | Method, host, storage, and machine-readable storage medium for protecting content |
US20130117566A1 (en) * | 2011-11-08 | 2013-05-09 | Samsung Electronics Co., Ltd. | Memory system |
CN103226505A (en) * | 2013-04-22 | 2013-07-31 | 华为技术有限公司 | Method and equipment for checking basic input output system (BIOS) |
CN105786404A (en) * | 2016-02-22 | 2016-07-20 | 深圳市共进电子股份有限公司 | Protective method and device for Flash storage |
CN107015878A (en) * | 2017-03-24 | 2017-08-04 | 联想(北京)有限公司 | For system for computer restorative procedure and system |
US20180144135A1 (en) * | 2016-11-21 | 2018-05-24 | Facebook, Inc. | Systems and methods for mitigation of permanent denial of service attacks |
US20180165455A1 (en) * | 2016-12-13 | 2018-06-14 | Amazon Technologies, Inc. | Secure execution environment on a server |
CN108256333A (en) * | 2018-01-24 | 2018-07-06 | 郑州云海信息技术有限公司 | Execution method, system, equipment and the readable storage medium storing program for executing of BIOS/firmware |
CN108345805A (en) * | 2017-05-05 | 2018-07-31 | 清华大学 | Verify the method and device of firmware |
-
2018
- 2018-12-30 CN CN201811644630.7A patent/CN109784063A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1760838A (en) * | 2004-10-16 | 2006-04-19 | 鸿富锦精密工业(深圳)有限公司 | ROM of BIOS data detection system and method |
CN1841348A (en) * | 2005-03-29 | 2006-10-04 | 株式会社东芝 | Processor, storage device, computer system, LSI system and method for transferring data |
CN101140535A (en) * | 2006-09-08 | 2008-03-12 | 鸿富锦精密工业(深圳)有限公司 | Method for preventing BIOS chip data from missing |
CN101364193A (en) * | 2007-08-06 | 2009-02-11 | 英业达股份有限公司 | BIOS automatic recovery method and computer and system using the method |
CN101667128A (en) * | 2008-09-05 | 2010-03-10 | 华硕电脑股份有限公司 | Method for updating and repairing basic input and output system |
US20120254630A1 (en) * | 2011-04-04 | 2012-10-04 | Samsung Electronics Co., Ltd. | Method, host, storage, and machine-readable storage medium for protecting content |
US20130117566A1 (en) * | 2011-11-08 | 2013-05-09 | Samsung Electronics Co., Ltd. | Memory system |
CN103226505A (en) * | 2013-04-22 | 2013-07-31 | 华为技术有限公司 | Method and equipment for checking basic input output system (BIOS) |
CN105786404A (en) * | 2016-02-22 | 2016-07-20 | 深圳市共进电子股份有限公司 | Protective method and device for Flash storage |
US20180144135A1 (en) * | 2016-11-21 | 2018-05-24 | Facebook, Inc. | Systems and methods for mitigation of permanent denial of service attacks |
US20180165455A1 (en) * | 2016-12-13 | 2018-06-14 | Amazon Technologies, Inc. | Secure execution environment on a server |
CN107015878A (en) * | 2017-03-24 | 2017-08-04 | 联想(北京)有限公司 | For system for computer restorative procedure and system |
CN108345805A (en) * | 2017-05-05 | 2018-07-31 | 清华大学 | Verify the method and device of firmware |
CN108256333A (en) * | 2018-01-24 | 2018-07-06 | 郑州云海信息技术有限公司 | Execution method, system, equipment and the readable storage medium storing program for executing of BIOS/firmware |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10790976B1 (en) | System and method of blockchain wallet recovery | |
US8874922B2 (en) | Systems and methods for multi-layered authentication/verification of trusted platform updates | |
CN111723383B (en) | Data storage and verification method and device | |
CN104462965B (en) | Application integrity verification method and the network equipment | |
US6993648B2 (en) | Proving BIOS trust in a TCPA compliant system | |
CN106656502A (en) | Computer systems and safe execution method | |
TWI460607B (en) | Securing device environment for trust provisioning | |
US10771264B2 (en) | Securing firmware | |
CN103955648B (en) | Method and device for verifying legality of system image | |
US20050021968A1 (en) | Method for performing a trusted firmware/bios update | |
CN110737897B (en) | Method and system for starting measurement based on trusted card | |
TW201109969A (en) | Method and system for securely updating field upgradeable units | |
TW201939922A (en) | Policy Deployment Method, Apparatus, System and Computing System of Trusted Server | |
TW201516733A (en) | System and method for verifying changes to UEFI authenticated variables | |
GB2450869A (en) | A property based attestation system uses a zero knowledge proof to attest to the integrity of a TPM equipped computing device without disclosing configuration | |
CN111160879B (en) | Hardware wallet and security improving method and device thereof | |
CN110008689A (en) | A kind of BMC starting method, apparatus, equipment and computer readable storage medium | |
CN104715183A (en) | Trusted verifying method and equipment used in running process of virtual machine | |
CN110768791A (en) | Zero-knowledge proof data interaction method, node and equipment | |
CN105426734B (en) | A kind of identity identifying method and device based on trust computing | |
CN109474420A (en) | A kind of private key backup method and relevant device | |
CN107801059A (en) | A kind of method for authenticating and server | |
EP2503482A1 (en) | Electronic device with flash memory component | |
CN106878009A (en) | Key updating method and system | |
US6983364B2 (en) | System and method for restoring a secured terminal to default status |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |