CN111125717A - Method, device, equipment and medium for safely running BIOS (basic input output System) driver - Google Patents

Method, device, equipment and medium for safely running BIOS (basic input output System) driver Download PDF

Info

Publication number
CN111125717A
CN111125717A CN201911332550.2A CN201911332550A CN111125717A CN 111125717 A CN111125717 A CN 111125717A CN 201911332550 A CN201911332550 A CN 201911332550A CN 111125717 A CN111125717 A CN 111125717A
Authority
CN
China
Prior art keywords
sub
block
bios
initial
subblock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201911332550.2A
Other languages
Chinese (zh)
Inventor
李莉莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN201911332550.2A priority Critical patent/CN111125717A/en
Publication of CN111125717A publication Critical patent/CN111125717A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers

Abstract

The application discloses a method, a device, electronic equipment and a computer readable storage medium for safely operating a BIOS driver, wherein the method comprises the following steps: determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the sub-block to generate a sub-block cipher text; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; presetting an initial sub-block cipher text after each sub-block of an initial BIOS driving program is encrypted, wherein the initial sub-block cipher text is stored in the security chip in advance in the BIOS compiling process; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate the sub-block cipher text and the subsequent steps. The initial BISO driver is encrypted and safely stored, the BIOS driver in the BIOS chip is verified when the device is started, and safe starting can be effectively realized.

Description

Method, device, equipment and medium for safely running BIOS (basic input output System) driver
Technical Field
The present disclosure relates to the field of electronic technologies, and in particular, to a method and an apparatus for safely running a BIOS driver, an electronic device, and a computer-readable storage medium.
Background
With the continuous development of the technology in the IT field, the security, spectrum reliability and usability of the server are more and more important.
The safe starting means that only an authenticated operating system or a hardware driver can be loaded on the mainboard, so that malicious software is prevented from invading. When the computer boot is modified by a virus, it will give a reminder and refuse to start, avoiding further loss that may be brought about.
The server is started mainly by a driver in a Basic Input/output System (BIOS) chip on the server, which stores the most important Basic Input/output program, a self-test program after power-on, and a System self-starting program, and provides the lowest layer and most direct hardware setting and control for the computer. With the development of technology, the BIOS program is likely to be invaded by malicious software and then illegally booted to the system, so that client data is leaked or attacked.
In view of the above, it is an important need for those skilled in the art to provide a solution to the above technical problems.
Disclosure of Invention
The application aims to provide a method, a device, an electronic device and a computer readable storage medium for safely running a BIOS driver, so that the safety of starting the BIOS is effectively guaranteed, and the safety and the reliability of a system are further improved.
To solve the above technical problem, in a first aspect, the present application discloses a method for safely running a BIOS driver, including:
determining a sub-block of a BIOS driver stored in a BIOS chip;
performing an encryption operation on the subblock to generate a subblock ciphertext;
acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driving program in the BIOS compiling process in advance;
judging whether the subblock ciphertext is consistent with the initial subblock ciphertext;
if so, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate a sub-block cipher text and the subsequent steps.
Optionally, after the determining whether the subblock ciphertext is consistent with the initial subblock ciphertext, the method further includes:
if not, the BIOS driving program is stopped running and alarm information is generated.
Optionally, the performing an encryption operation on the subblock to generate a subblock ciphertext includes:
and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
Optionally, the preset security chip is a TMP chip.
Optionally, after all the sub-blocks of the BIOS driver are executed, the operating system is started.
In a second aspect, the present application further discloses an apparatus for securely operating a BIOS driver, including:
the determining module is used for determining the sub-blocks of the BIOS driving program stored in the BIOS chip;
the encryption module is used for carrying out encryption operation on the subblocks to generate subblock ciphertexts;
the reading module is used for acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores each initial sub-block cipher text after each sub-block of the initial BIOS driving program is encrypted in the BIOS compiling process in advance;
the processing module is used for judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and continuously determining the next sub-block by the determining module.
Optionally, the processing module is further configured to: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
Optionally, the encryption module is specifically configured to:
and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
Optionally, the preset security chip is a TMP chip.
Optionally, the processing module is further configured to: and starting the operating system after all the sub-blocks of the BIOS driver are executed.
In a third aspect, the present application also discloses an electronic device, including:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of any one of the methods for securely running a BIOS driver as described above.
In a fourth aspect, the present application further discloses a computer-readable storage medium, in which a computer program is stored, and the computer program is used to implement the steps of any one of the above methods for safely running the BIOS driver when being executed by a processor.
The method for safely operating the BIOS driver comprises the following steps: determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the subblock to generate a subblock ciphertext; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driving program in the BIOS compiling process in advance; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if so, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate a sub-block cipher text and the subsequent steps.
Therefore, the safe initial BISO driver sub-blocks are respectively encrypted and safely stored in the equipment production stage based on BIOS compiling and the preset safe chip, so that whether the BIOS driver stored in the BIOS chip is safe and reliable can be checked when the equipment is started, the safety of BIOS starting is effectively guaranteed, and the safety and the reliability of a system are improved. The device for safely running the BIOS driver, the electronic equipment and the computer readable storage medium provided by the application also have the beneficial effects.
Drawings
In order to more clearly illustrate the technical solutions in the prior art and the embodiments of the present application, the drawings that are needed to be used in the description of the prior art and the embodiments of the present application will be briefly described below. Of course, the following description of the drawings related to the embodiments of the present application is only a part of the embodiments of the present application, and it will be obvious to those skilled in the art that other drawings can be obtained from the provided drawings without any creative effort, and the obtained other drawings also belong to the protection scope of the present application.
FIG. 1 is a flowchart illustrating a method for securely operating a BIOS driver according to an embodiment of the present disclosure;
FIG. 2 is a block diagram of an apparatus for securely operating a BIOS driver according to an embodiment of the present disclosure;
fig. 3 is a block diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
The core of the application is to provide a method, a device, an electronic device and a computer readable storage medium for safely running a BIOS driver, so that the safety of starting the BIOS is effectively guaranteed, and the safety and the reliability of a system are further improved.
In order to more clearly and completely describe the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Currently, the server is mainly started by a driver in a BIOS (Basic Input/output System) chip on the server, which stores the most important Basic Input/output programs of the computer, a self-test program after power-on, and a System self-starting program, and provides the bottom layer and the most direct hardware setting and control for the computer. With the development of technology, the BIOS program is likely to be invaded by malicious software and then illegally booted to the system, so that client data is leaked or attacked. In view of this, the present application provides a scheme for safely operating a BIOS driver, which can effectively solve the above problem.
Referring to fig. 1, an embodiment of the present application discloses a method for safely running a BIOS driver, which mainly includes:
s101: determining a sub-block of a BIOS driver stored in the BIOS chip.
Specifically, for the BIOS driver, when the BIOS is compiled, it may be divided into a plurality of sub-blocks according to the function type. When the device is used to start and run the BIOS driver, each sub-block is run one by one.
S102: the sub-block is encrypted to generate a sub-block cipher text.
It should be noted that, in the method for securely running the BIOS driver provided in the embodiment of the present application, the initially secure BIOS driver (i.e. the initial BIOS driver) is protected in advance in the device production stage: in the BIOS compiling process, each sub-block of the initial BIOS driving program is encrypted, and the generated initial sub-block cipher text is stored in a preset safety chip.
The preset security chip is a special security chip which is independent of the BIOS chip and has high security performance.
When the device is used to start, the BIOS driver currently stored in the BIOS chip is first run to start the operating system after the BIOS is started. In the process of running the BIOS driver, this embodiment specifically adopts a safe running mode of checking first and running second. For the sub-block currently to be run, an encryption operation is also required to generate the sub-block cipher text in order to compare with the initial sub-block cipher text.
S103: acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driver in the BIOS compiling process in advance.
Before each sub-block of the BIOS driver is run, the sub-block may be encrypted to generate a corresponding sub-block cipher text, and then the calculated sub-block cipher text may be compared with a corresponding initial sub-block cipher text read from a predetermined security chip.
S104: judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, the process proceeds to S105.
Specifically, if the subblock ciphertext generated by the encryption operation is consistent with the initial subblock ciphertext corresponding to the preset security chip, it is indicated that the subblock in the BIOS chip is safe and reliable, and the subblock can be normally executed.
It will be readily appreciated that the encryption algorithm employed in step S102 should be consistent with that of the initial subblock cipher.
S105: the sub-block is executed, and the next sub-block is determined, and the process proceeds to S102.
After the current sub-block is executed, the next sub-block stored in the BIOS chip may be used as a target, and the operation of step S102 and the subsequent steps may be continuously executed.
The method for safely operating the BIOS driver provided by the embodiment of the application comprises the following steps: determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the sub-block to generate a sub-block cipher text; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; presetting an initial sub-block cipher text after each sub-block of an initial BIOS driving program is encrypted, wherein the initial sub-block cipher text is stored in the security chip in advance in the BIOS compiling process; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate the sub-block cipher text and the subsequent steps.
Therefore, the method for safely running the BIOS driver provided by the embodiment of the application respectively encrypts and safely stores the safe sub-blocks of the initial BISO driver based on the BIOS compiling and presetting the safe chip in the equipment production stage, so that whether the BIOS driver stored in the BIOS chip is safe and reliable can be verified when the equipment is started, the safety of BIOS starting is effectively guaranteed, and the safety and the reliability of a system are improved.
As a specific embodiment, the method for safely running the BIOS driver according to the embodiment of the present application, after determining whether the sub-block cipher text is consistent with the initial sub-block cipher text based on the above contents, further includes:
if not, the BIOS driving program is stopped running and alarm information is generated.
Specifically, once any of the subblock ciphertexts is found to be inconsistent with the initial subblock ciphertexts, it can be determined that the BIOS chip is likely to be attacked by intrusion, and the BIOS driver stored therein is likely to be tampered. Therefore, the BIOS can be stopped from being started, and alarm information can be generated.
As a specific embodiment, the method for safely running the BIOS driver according to the embodiment of the present application performs an encryption operation on the sub-block to generate a sub-block cipher text based on the above contents, and includes:
the sub-block is subjected to a hash encryption operation to generate a sub-block cipher text.
Specifically, the embodiment may specifically adopt a hash encryption algorithm, and the generated cipher text of the sub-block is the hash value of the sub-block.
As a specific embodiment, the method for safely running the BIOS driver provided in the embodiment of the present application is based on the above, and the secure chip is preset as the TMP chip.
Specifically, a TPM (Trusted Platform Module) chip refers to a security chip conforming to TPM standards, which can effectively protect a personal computer and prevent an illegal user from accessing the security chip.
As a specific embodiment, the method for safely running the BIOS driver according to the embodiment of the present application starts the operating system after all the sub-blocks of the BIOS driver are executed on the basis of the foregoing contents.
Specifically, when all the sub-blocks are executed (it is indicated that all the sub-blocks are safe), that is, the execution of the entire BIOS driver is finished, the operating system may be further started to complete the device start.
Referring to fig. 2, an embodiment of the present application discloses a device for safely running a BIOS driver, which mainly includes:
a determining module 201, configured to determine a sub-block of a BIOS driver stored in a BIOS chip;
the encryption module 202 is configured to perform an encryption operation on the sub-block to generate a sub-block cipher text;
the reading module 203 is configured to obtain a corresponding initial sub-block cipher text stored in a preset security chip; presetting a security chip to store each initial sub-block cipher text after each sub-block of an initial BIOS driving program is encrypted in the BIOS compiling process in advance;
the processing module 204 is configured to determine whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, the sub-block is executed, and the determining module 201 continues to determine the next sub-block.
Therefore, the device for safely running the BIOS driver disclosed by the embodiment of the application respectively performs encryption processing and safe storage on the safe sub-blocks of the initial BISO driver based on BIOS compiling and presetting the safe chip in the equipment production stage, so that whether the BIOS driver stored in the BIOS chip is safe and reliable can be verified when the equipment is started, the safety of BIOS starting is effectively guaranteed, and the safety and the reliability of a system are further improved.
For the details of the device for safely operating the BIOS driver, reference may be made to the foregoing detailed description of the method for safely operating the BIOS driver, and details thereof are not repeated here.
As a specific embodiment, in the apparatus for safely running the BIOS driver disclosed in the embodiment of the present application, on the basis of the foregoing content, the processing module 204 is further configured to: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
As a specific embodiment, in the device for safely running the BIOS driver disclosed in the embodiment of the present application, on the basis of the foregoing content, the encryption module 202 is specifically configured to:
the sub-block is subjected to a hash encryption operation to generate a sub-block cipher text.
As a specific embodiment, the device for safely running the BIOS driver disclosed in the embodiment of the present application, on the basis of the above contents, presets the secure chip as a TMP chip.
As a specific embodiment, in the apparatus for safely running the BIOS driver disclosed in the embodiment of the present application, on the basis of the foregoing content, the processing module 204 is further configured to: after all the sub-blocks of the BIOS driver are executed, the operating system is started.
Referring to fig. 3, an embodiment of the present application discloses an electronic device, including:
a memory 301 for storing a computer program;
a processor 302 for executing the computer program to implement the steps of:
determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the sub-block to generate a sub-block cipher text; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; presetting an initial sub-block cipher text after each sub-block of an initial BIOS driving program is encrypted, wherein the initial sub-block cipher text is stored in the security chip in advance in the BIOS compiling process; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate the sub-block cipher text and the subsequent steps.
As a specific embodiment, the processor 302, when executing the sub-computer programs stored in the memory 301, is further configured to: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
As a specific embodiment, the processor 302, when executing the sub-computer programs stored in the memory 301, is specifically configured to: the sub-block is subjected to a hash encryption operation to generate a sub-block cipher text.
As a specific embodiment, the predetermined security chip is a TMP chip.
As a specific embodiment, the processor 302, when executing the sub-computer programs stored in the memory 301, is further configured to: after all the sub-blocks of the BIOS driver are executed, the operating system is started.
Further, an embodiment of the present application also discloses a computer-readable storage medium, in which a computer program is stored, and the computer program is used for implementing the following steps when being executed by a processor:
determining a sub-block of a BIOS driver stored in a BIOS chip; performing an encryption operation on the subblock to generate a subblock ciphertext; acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driving program in the BIOS compiling process in advance; judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if so, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate a sub-block cipher text and the subsequent steps.
As a specific embodiment, the sub-computer program stored in the computer readable storage medium when executed is further for: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
As a specific embodiment, the sub-computer program stored in the computer readable storage medium when executed is further for: and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
As a specific embodiment, the preset security chip is a TMP chip.
As a specific embodiment, the sub-computer program stored in the computer readable storage medium when executed is further for: and starting the operating system after all the sub-blocks of the BIOS driver are executed.
For details of the electronic device and the computer-readable storage medium, reference may be made to the foregoing detailed description of the method for securely operating the BIOS driver, and details thereof are not repeated here.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the equipment disclosed by the embodiment, the description is relatively simple because the equipment corresponds to the method disclosed by the embodiment, and the relevant parts can be referred to the method part for description.
It is further noted that, throughout this document, relational terms such as "first" and "second" are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The technical solutions provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, without departing from the principle of the present application, several improvements and modifications can be made to the present application, and these improvements and modifications also fall into the protection scope of the present application.

Claims (10)

1. A method for securely operating a BIOS driver, comprising:
determining a sub-block of a BIOS driver stored in a BIOS chip;
performing an encryption operation on the subblock to generate a subblock ciphertext;
acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores the encrypted initial sub-block cipher text of each sub-block of the initial BIOS driving program in the BIOS compiling process in advance;
judging whether the subblock ciphertext is consistent with the initial subblock ciphertext;
if so, executing the sub-block, and determining the next sub-block to continue to execute the encryption operation on the sub-block to generate a sub-block cipher text and the subsequent steps.
2. The method of claim 1, after said determining whether said sub-block cipher text matches said initial sub-block cipher text, further comprising:
if not, the BIOS driving program is stopped running and alarm information is generated.
3. The method of claim 1, wherein said performing an encryption operation on said sub-block to generate a sub-block cipher text comprises:
and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
4. The method of claim 1, wherein the predetermined security chip is a TMP chip.
5. The method of any of claims 1 to 4, wherein the operating system is started after all the sub-blocks of the BIOS driver have been executed.
6. An apparatus for securely operating a BIOS driver, comprising:
the determining module is used for determining the sub-blocks of the BIOS driving program stored in the BIOS chip;
the encryption module is used for carrying out encryption operation on the subblocks to generate subblock ciphertexts;
the reading module is used for acquiring a corresponding initial sub-block ciphertext stored in a preset security chip; the preset security chip stores each initial sub-block cipher text after each sub-block of the initial BIOS driving program is encrypted in the BIOS compiling process in advance;
the processing module is used for judging whether the subblock ciphertext is consistent with the initial subblock ciphertext; if yes, executing the sub-block, and continuously determining the next sub-block by the determining module.
7. The apparatus of claim 6, wherein the processing module is further configured to: and after judging whether the sub-block cipher text is consistent with the initial sub-block cipher text or not, if not, stopping running the BIOS driving program and generating alarm information.
8. The apparatus according to claim 6 or 7, wherein the encryption module is specifically configured to:
and carrying out Hash encryption operation on the subblock to generate a subblock ciphertext.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the method of securely running a BIOS driver as claimed in any one of claims 1 to 5.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to carry out the steps of the method for securely running a BIOS driver according to any one of claims 1 to 5.
CN201911332550.2A 2019-12-22 2019-12-22 Method, device, equipment and medium for safely running BIOS (basic input output System) driver Withdrawn CN111125717A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911332550.2A CN111125717A (en) 2019-12-22 2019-12-22 Method, device, equipment and medium for safely running BIOS (basic input output System) driver

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911332550.2A CN111125717A (en) 2019-12-22 2019-12-22 Method, device, equipment and medium for safely running BIOS (basic input output System) driver

Publications (1)

Publication Number Publication Date
CN111125717A true CN111125717A (en) 2020-05-08

Family

ID=70501367

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911332550.2A Withdrawn CN111125717A (en) 2019-12-22 2019-12-22 Method, device, equipment and medium for safely running BIOS (basic input output System) driver

Country Status (1)

Country Link
CN (1) CN111125717A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112835440A (en) * 2021-01-20 2021-05-25 浪潮电子信息产业股份有限公司 Server power-on method, device, equipment and medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112835440A (en) * 2021-01-20 2021-05-25 浪潮电子信息产业股份有限公司 Server power-on method, device, equipment and medium

Similar Documents

Publication Publication Date Title
EP2634959B1 (en) Method and Apparatus for Incremental Code Signing
US8132257B2 (en) Anti-virus method based on security chip
KR101476948B1 (en) System and method for tamper-resistant booting
CN110990084B (en) Chip secure starting method and device, storage medium and terminal
US20170237775A1 (en) Method for implementing online anti-phishing
US20120066515A1 (en) Electronic device, key generation program, recording medium, and key generation method
JP2008537224A (en) Safe starting method and system
TW201500960A (en) Detection of secure variable alteration in a computing device equipped with unified extensible firmware interface (UEFI)-compliant firmware
GB2436046A (en) Method for establishing a trusted running environment in the computer
CN113190831A (en) TEE-based operating system application integrity measurement method and system
CN112445537B (en) Trusted starting method and device of operating system, mobile terminal and storage medium
EP2051181A1 (en) Information terminal, security device, data protection method, and data protection program
CN113722720B (en) System starting method and related device
US20210367781A1 (en) Method and system for accelerating verification procedure for image file
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN111125717A (en) Method, device, equipment and medium for safely running BIOS (basic input output System) driver
CN107092832A (en) A kind of method for making up Secure Boot security breaches in time
CN115357908B (en) Network equipment kernel credibility measurement and automatic restoration method
CN109753788B (en) Integrity checking method and computer readable storage medium during kernel operation
US20220245286A1 (en) Method for protecting device software integrity in continuity scenario
US11392705B1 (en) Disk encryption key management for booting of a device
CN111177799B (en) Security protection method, system, computer device and computer-readable storage medium
CN110619219B (en) Application program source code protection method and device, computer equipment and storage medium
CN111143826A (en) BIOS user account password setting method and device and related equipment
CN117411644B (en) Digital signature verification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200508

WW01 Invention patent application withdrawn after publication