CN111125717A - Method, device, equipment and medium for safely running BIOS (basic input output System) driver - Google Patents
Method, device, equipment and medium for safely running BIOS (basic input output System) driver Download PDFInfo
- Publication number
- CN111125717A CN111125717A CN201911332550.2A CN201911332550A CN111125717A CN 111125717 A CN111125717 A CN 111125717A CN 201911332550 A CN201911332550 A CN 201911332550A CN 111125717 A CN111125717 A CN 111125717A
- Authority
- CN
- China
- Prior art keywords
- sub
- block
- bios
- initial
- subblock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 230000008569 process Effects 0.000 claims abstract description 18
- 238000004590 computer program Methods 0.000 claims description 17
- 238000012545 processing Methods 0.000 claims description 9
- 238000005516 engineering process Methods 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4411—Configuring for operating with peripheral devices; Loading of device drivers
Abstract
The application discloses a method, a device, electronic equipment and a computer readable storage medium for safely operating a BIOS driver, wherein the method comprises the following steps: determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the sub-block to generate a sub-block cipher text; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; presetting an initial sub-block cipher text after each sub-block of an initial BIOS driving program is encrypted, wherein the initial sub-block cipher text is stored in the security chip in advance in the BIOS compiling process; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate the sub-block cipher text and the subsequent steps. The initial BISO driver is encrypted and safely stored, the BIOS driver in the BIOS chip is verified when the device is started, and safe starting can be effectively realized.
Description
Technical Field
The present disclosure relates to the field of electronic technologies, and in particular, to a method and an apparatus for safely running a BIOS driver, an electronic device, and a computer-readable storage medium.
Background
With the continuous development of the technology in the IT field, the security, spectrum reliability and usability of the server are more and more important.
The safe starting means that only an authenticated operating system or a hardware driver can be loaded on the mainboard, so that malicious software is prevented from invading. When the computer boot is modified by a virus, it will give a reminder and refuse to start, avoiding further loss that may be brought about.
The server is started mainly by a driver in a Basic Input/output System (BIOS) chip on the server, which stores the most important Basic Input/output program, a self-test program after power-on, and a System self-starting program, and provides the lowest layer and most direct hardware setting and control for the computer. With the development of technology, the BIOS program is likely to be invaded by malicious software and then illegally booted to the system, so that client data is leaked or attacked.
In view of the above, it is an important need for those skilled in the art to provide a solution to the above technical problems.
Disclosure of Invention
The application aims to provide a method, a device, an electronic device and a computer readable storage medium for safely running a BIOS driver, so that the safety of starting the BIOS is effectively guaranteed, and the safety and the reliability of a system are further improved.
To solve the above technical problem, in a first aspect, the present application discloses a method for safely running a BIOS driver, including:
determining a sub-block of a BIOS driver stored in a BIOS chip;
performing an encryption operation on the subblock to generate a subblock ciphertext;
acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driving program in the BIOS compiling process in advance;
judging whether the subblock ciphertext is consistent with the initial subblock ciphertext;
if so, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate a sub-block cipher text and the subsequent steps.
Optionally, after the determining whether the subblock ciphertext is consistent with the initial subblock ciphertext, the method further includes:
if not, the BIOS driving program is stopped running and alarm information is generated.
Optionally, the performing an encryption operation on the subblock to generate a subblock ciphertext includes:
and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
Optionally, the preset security chip is a TMP chip.
Optionally, after all the sub-blocks of the BIOS driver are executed, the operating system is started.
In a second aspect, the present application further discloses an apparatus for securely operating a BIOS driver, including:
the determining module is used for determining the sub-blocks of the BIOS driving program stored in the BIOS chip;
the encryption module is used for carrying out encryption operation on the subblocks to generate subblock ciphertexts;
the reading module is used for acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores each initial sub-block cipher text after each sub-block of the initial BIOS driving program is encrypted in the BIOS compiling process in advance;
the processing module is used for judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and continuously determining the next sub-block by the determining module.
Optionally, the processing module is further configured to: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
Optionally, the encryption module is specifically configured to:
and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
Optionally, the preset security chip is a TMP chip.
Optionally, the processing module is further configured to: and starting the operating system after all the sub-blocks of the BIOS driver are executed.
In a third aspect, the present application also discloses an electronic device, including:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of any one of the methods for securely running a BIOS driver as described above.
In a fourth aspect, the present application further discloses a computer-readable storage medium, in which a computer program is stored, and the computer program is used to implement the steps of any one of the above methods for safely running the BIOS driver when being executed by a processor.
The method for safely operating the BIOS driver comprises the following steps: determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the subblock to generate a subblock ciphertext; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driving program in the BIOS compiling process in advance; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if so, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate a sub-block cipher text and the subsequent steps.
Therefore, the safe initial BISO driver sub-blocks are respectively encrypted and safely stored in the equipment production stage based on BIOS compiling and the preset safe chip, so that whether the BIOS driver stored in the BIOS chip is safe and reliable can be checked when the equipment is started, the safety of BIOS starting is effectively guaranteed, and the safety and the reliability of a system are improved. The device for safely running the BIOS driver, the electronic equipment and the computer readable storage medium provided by the application also have the beneficial effects.
Drawings
In order to more clearly illustrate the technical solutions in the prior art and the embodiments of the present application, the drawings that are needed to be used in the description of the prior art and the embodiments of the present application will be briefly described below. Of course, the following description of the drawings related to the embodiments of the present application is only a part of the embodiments of the present application, and it will be obvious to those skilled in the art that other drawings can be obtained from the provided drawings without any creative effort, and the obtained other drawings also belong to the protection scope of the present application.
FIG. 1 is a flowchart illustrating a method for securely operating a BIOS driver according to an embodiment of the present disclosure;
FIG. 2 is a block diagram of an apparatus for securely operating a BIOS driver according to an embodiment of the present disclosure;
fig. 3 is a block diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
The core of the application is to provide a method, a device, an electronic device and a computer readable storage medium for safely running a BIOS driver, so that the safety of starting the BIOS is effectively guaranteed, and the safety and the reliability of a system are further improved.
In order to more clearly and completely describe the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Currently, the server is mainly started by a driver in a BIOS (Basic Input/output System) chip on the server, which stores the most important Basic Input/output programs of the computer, a self-test program after power-on, and a System self-starting program, and provides the bottom layer and the most direct hardware setting and control for the computer. With the development of technology, the BIOS program is likely to be invaded by malicious software and then illegally booted to the system, so that client data is leaked or attacked. In view of this, the present application provides a scheme for safely operating a BIOS driver, which can effectively solve the above problem.
Referring to fig. 1, an embodiment of the present application discloses a method for safely running a BIOS driver, which mainly includes:
s101: determining a sub-block of a BIOS driver stored in the BIOS chip.
Specifically, for the BIOS driver, when the BIOS is compiled, it may be divided into a plurality of sub-blocks according to the function type. When the device is used to start and run the BIOS driver, each sub-block is run one by one.
S102: the sub-block is encrypted to generate a sub-block cipher text.
It should be noted that, in the method for securely running the BIOS driver provided in the embodiment of the present application, the initially secure BIOS driver (i.e. the initial BIOS driver) is protected in advance in the device production stage: in the BIOS compiling process, each sub-block of the initial BIOS driving program is encrypted, and the generated initial sub-block cipher text is stored in a preset safety chip.
The preset security chip is a special security chip which is independent of the BIOS chip and has high security performance.
When the device is used to start, the BIOS driver currently stored in the BIOS chip is first run to start the operating system after the BIOS is started. In the process of running the BIOS driver, this embodiment specifically adopts a safe running mode of checking first and running second. For the sub-block currently to be run, an encryption operation is also required to generate the sub-block cipher text in order to compare with the initial sub-block cipher text.
S103: acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driver in the BIOS compiling process in advance.
Before each sub-block of the BIOS driver is run, the sub-block may be encrypted to generate a corresponding sub-block cipher text, and then the calculated sub-block cipher text may be compared with a corresponding initial sub-block cipher text read from a predetermined security chip.
S104: judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, the process proceeds to S105.
Specifically, if the subblock ciphertext generated by the encryption operation is consistent with the initial subblock ciphertext corresponding to the preset security chip, it is indicated that the subblock in the BIOS chip is safe and reliable, and the subblock can be normally executed.
It will be readily appreciated that the encryption algorithm employed in step S102 should be consistent with that of the initial subblock cipher.
S105: the sub-block is executed, and the next sub-block is determined, and the process proceeds to S102.
After the current sub-block is executed, the next sub-block stored in the BIOS chip may be used as a target, and the operation of step S102 and the subsequent steps may be continuously executed.
The method for safely operating the BIOS driver provided by the embodiment of the application comprises the following steps: determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the sub-block to generate a sub-block cipher text; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; presetting an initial sub-block cipher text after each sub-block of an initial BIOS driving program is encrypted, wherein the initial sub-block cipher text is stored in the security chip in advance in the BIOS compiling process; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate the sub-block cipher text and the subsequent steps.
Therefore, the method for safely running the BIOS driver provided by the embodiment of the application respectively encrypts and safely stores the safe sub-blocks of the initial BISO driver based on the BIOS compiling and presetting the safe chip in the equipment production stage, so that whether the BIOS driver stored in the BIOS chip is safe and reliable can be verified when the equipment is started, the safety of BIOS starting is effectively guaranteed, and the safety and the reliability of a system are improved.
As a specific embodiment, the method for safely running the BIOS driver according to the embodiment of the present application, after determining whether the sub-block cipher text is consistent with the initial sub-block cipher text based on the above contents, further includes:
if not, the BIOS driving program is stopped running and alarm information is generated.
Specifically, once any of the subblock ciphertexts is found to be inconsistent with the initial subblock ciphertexts, it can be determined that the BIOS chip is likely to be attacked by intrusion, and the BIOS driver stored therein is likely to be tampered. Therefore, the BIOS can be stopped from being started, and alarm information can be generated.
As a specific embodiment, the method for safely running the BIOS driver according to the embodiment of the present application performs an encryption operation on the sub-block to generate a sub-block cipher text based on the above contents, and includes:
the sub-block is subjected to a hash encryption operation to generate a sub-block cipher text.
Specifically, the embodiment may specifically adopt a hash encryption algorithm, and the generated cipher text of the sub-block is the hash value of the sub-block.
As a specific embodiment, the method for safely running the BIOS driver provided in the embodiment of the present application is based on the above, and the secure chip is preset as the TMP chip.
Specifically, a TPM (Trusted Platform Module) chip refers to a security chip conforming to TPM standards, which can effectively protect a personal computer and prevent an illegal user from accessing the security chip.
As a specific embodiment, the method for safely running the BIOS driver according to the embodiment of the present application starts the operating system after all the sub-blocks of the BIOS driver are executed on the basis of the foregoing contents.
Specifically, when all the sub-blocks are executed (it is indicated that all the sub-blocks are safe), that is, the execution of the entire BIOS driver is finished, the operating system may be further started to complete the device start.
Referring to fig. 2, an embodiment of the present application discloses a device for safely running a BIOS driver, which mainly includes:
a determining module 201, configured to determine a sub-block of a BIOS driver stored in a BIOS chip;
the encryption module 202 is configured to perform an encryption operation on the sub-block to generate a sub-block cipher text;
the reading module 203 is configured to obtain a corresponding initial sub-block cipher text stored in a preset security chip; presetting a security chip to store each initial sub-block cipher text after each sub-block of an initial BIOS driving program is encrypted in the BIOS compiling process in advance;
the processing module 204 is configured to determine whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, the sub-block is executed, and the determining module 201 continues to determine the next sub-block.
Therefore, the device for safely running the BIOS driver disclosed by the embodiment of the application respectively performs encryption processing and safe storage on the safe sub-blocks of the initial BISO driver based on BIOS compiling and presetting the safe chip in the equipment production stage, so that whether the BIOS driver stored in the BIOS chip is safe and reliable can be verified when the equipment is started, the safety of BIOS starting is effectively guaranteed, and the safety and the reliability of a system are further improved.
For the details of the device for safely operating the BIOS driver, reference may be made to the foregoing detailed description of the method for safely operating the BIOS driver, and details thereof are not repeated here.
As a specific embodiment, in the apparatus for safely running the BIOS driver disclosed in the embodiment of the present application, on the basis of the foregoing content, the processing module 204 is further configured to: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
As a specific embodiment, in the device for safely running the BIOS driver disclosed in the embodiment of the present application, on the basis of the foregoing content, the encryption module 202 is specifically configured to:
the sub-block is subjected to a hash encryption operation to generate a sub-block cipher text.
As a specific embodiment, the device for safely running the BIOS driver disclosed in the embodiment of the present application, on the basis of the above contents, presets the secure chip as a TMP chip.
As a specific embodiment, in the apparatus for safely running the BIOS driver disclosed in the embodiment of the present application, on the basis of the foregoing content, the processing module 204 is further configured to: after all the sub-blocks of the BIOS driver are executed, the operating system is started.
Referring to fig. 3, an embodiment of the present application discloses an electronic device, including:
a memory 301 for storing a computer program;
a processor 302 for executing the computer program to implement the steps of:
determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the sub-block to generate a sub-block cipher text; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; presetting an initial sub-block cipher text after each sub-block of an initial BIOS driving program is encrypted, wherein the initial sub-block cipher text is stored in the security chip in advance in the BIOS compiling process; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate the sub-block cipher text and the subsequent steps.
As a specific embodiment, the processor 302, when executing the sub-computer programs stored in the memory 301, is further configured to: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
As a specific embodiment, the processor 302, when executing the sub-computer programs stored in the memory 301, is specifically configured to: the sub-block is subjected to a hash encryption operation to generate a sub-block cipher text.
As a specific embodiment, the predetermined security chip is a TMP chip.
As a specific embodiment, the processor 302, when executing the sub-computer programs stored in the memory 301, is further configured to: after all the sub-blocks of the BIOS driver are executed, the operating system is started.
Further, an embodiment of the present application also discloses a computer-readable storage medium, in which a computer program is stored, and the computer program is used for implementing the following steps when being executed by a processor:
determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the subblock to generate a subblock ciphertext; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driving program in the BIOS compiling process in advance; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if so, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate a sub-block cipher text and the subsequent steps.
As a specific embodiment, the sub-computer program stored in the computer readable storage medium when executed is further for: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
As a specific embodiment, the sub-computer program stored in the computer readable storage medium when executed is further for: and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
As a specific embodiment, the preset security chip is a TMP chip.
As a specific embodiment, the sub-computer program stored in the computer readable storage medium when executed is further for: and starting the operating system after all the sub-blocks of the BIOS driver are executed.
For details of the electronic device and the computer-readable storage medium, reference may be made to the foregoing detailed description of the method for securely operating the BIOS driver, and details thereof are not repeated here.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the equipment disclosed by the embodiment, the description is relatively simple because the equipment corresponds to the method disclosed by the embodiment, and the relevant parts can be referred to the method part for description.
It is further noted that, throughout this document, relational terms such as "first" and "second" are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The technical solutions provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, without departing from the principle of the present application, several improvements and modifications can be made to the present application, and these improvements and modifications also fall into the protection scope of the present application.
Claims (10)
1. A method for securely operating a BIOS driver, comprising:
determining a sub-block of a BIOS driver stored in a BIOS chip;
performing an encryption operation on the subblock to generate a subblock ciphertext;
acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driving program in the BIOS compiling process in advance;
judging whether the subblock ciphertext is consistent with the initial subblock ciphertext;
if so, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate a sub-block cipher text and the subsequent steps.
2. The method of claim 1, after said determining whether said sub-block cipher text matches said initial sub-block cipher text, further comprising:
if not, the BIOS driving program is stopped running and alarm information is generated.
3. The method of claim 1, wherein said performing an encryption operation on said sub-block to generate a sub-block cipher text comprises:
and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
4. The method of claim 1, wherein the predetermined security chip is a TMP chip.
5. The method of any of claims 1 to 4, wherein the operating system is started after all the sub-blocks of the BIOS driver have been executed.
6. An apparatus for securely operating a BIOS driver, comprising:
the determining module is used for determining the sub-blocks of the BIOS driving program stored in the BIOS chip;
the encryption module is used for carrying out encryption operation on the subblocks to generate subblock ciphertexts;
the reading module is used for acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores each initial sub-block cipher text after each sub-block of the initial BIOS driving program is encrypted in the BIOS compiling process in advance;
the processing module is used for judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and continuously determining the next sub-block by the determining module.
7. The apparatus of claim 6, wherein the processing module is further configured to: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
8. The apparatus according to claim 6 or 7, wherein the encryption module is specifically configured to:
and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the method of securely running a BIOS driver as claimed in any one of claims 1 to 5.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to carry out the steps of the method for securely running a BIOS driver according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911332550.2A CN111125717A (en) | 2019-12-22 | 2019-12-22 | Method, device, equipment and medium for safely running BIOS (basic input output System) driver |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911332550.2A CN111125717A (en) | 2019-12-22 | 2019-12-22 | Method, device, equipment and medium for safely running BIOS (basic input output System) driver |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111125717A true CN111125717A (en) | 2020-05-08 |
Family
ID=70501367
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911332550.2A Withdrawn CN111125717A (en) | 2019-12-22 | 2019-12-22 | Method, device, equipment and medium for safely running BIOS (basic input output System) driver |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111125717A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112835440A (en) * | 2021-01-20 | 2021-05-25 | 浪潮电子信息产业股份有限公司 | Server power-on method, device, equipment and medium |
-
2019
- 2019-12-22 CN CN201911332550.2A patent/CN111125717A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112835440A (en) * | 2021-01-20 | 2021-05-25 | 浪潮电子信息产业股份有限公司 | Server power-on method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2634959B1 (en) | Method and Apparatus for Incremental Code Signing | |
US8132257B2 (en) | Anti-virus method based on security chip | |
KR101476948B1 (en) | System and method for tamper-resistant booting | |
CN110990084B (en) | Chip secure starting method and device, storage medium and terminal | |
US20170237775A1 (en) | Method for implementing online anti-phishing | |
US20120066515A1 (en) | Electronic device, key generation program, recording medium, and key generation method | |
JP2008537224A (en) | Safe starting method and system | |
TW201500960A (en) | Detection of secure variable alteration in a computing device equipped with unified extensible firmware interface (UEFI)-compliant firmware | |
GB2436046A (en) | Method for establishing a trusted running environment in the computer | |
CN113190831A (en) | TEE-based operating system application integrity measurement method and system | |
CN112445537B (en) | Trusted starting method and device of operating system, mobile terminal and storage medium | |
EP2051181A1 (en) | Information terminal, security device, data protection method, and data protection program | |
CN113722720B (en) | System starting method and related device | |
US20210367781A1 (en) | Method and system for accelerating verification procedure for image file | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
CN111125717A (en) | Method, device, equipment and medium for safely running BIOS (basic input output System) driver | |
CN107092832A (en) | A kind of method for making up Secure Boot security breaches in time | |
CN115357908B (en) | Network equipment kernel credibility measurement and automatic restoration method | |
CN109753788B (en) | Integrity checking method and computer readable storage medium during kernel operation | |
US20220245286A1 (en) | Method for protecting device software integrity in continuity scenario | |
US11392705B1 (en) | Disk encryption key management for booting of a device | |
CN111177799B (en) | Security protection method, system, computer device and computer-readable storage medium | |
CN110619219B (en) | Application program source code protection method and device, computer equipment and storage medium | |
CN111143826A (en) | BIOS user account password setting method and device and related equipment | |
CN117411644B (en) | Digital signature verification method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200508 |
|
WW01 | Invention patent application withdrawn after publication |