CN111984490A - Warning device, method, equipment and medium for illegal operating system starting item - Google Patents
Warning device, method, equipment and medium for illegal operating system starting item Download PDFInfo
- Publication number
- CN111984490A CN111984490A CN202011041755.8A CN202011041755A CN111984490A CN 111984490 A CN111984490 A CN 111984490A CN 202011041755 A CN202011041755 A CN 202011041755A CN 111984490 A CN111984490 A CN 111984490A
- Authority
- CN
- China
- Prior art keywords
- operating system
- item
- starting
- items
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000012795 verification Methods 0.000 claims abstract description 73
- 230000008569 process Effects 0.000 claims abstract description 18
- 239000000758 substrate Substances 0.000 claims abstract description 13
- 230000005540 biological transmission Effects 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 11
- 238000001514 detection method Methods 0.000 claims description 4
- 238000012423 maintenance Methods 0.000 abstract description 21
- 238000004891 communication Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2273—Test methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2284—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by power-on test, e.g. power-on self test [POST]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2289—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by configuration test
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Debugging And Monitoring (AREA)
- Stored Programmes (AREA)
Abstract
The application discloses an alarm device, a method, an electronic device and a computer readable storage medium for illegal operating system startup items, wherein the alarm device is applied to a basic input output system controller of a server and comprises the following steps: the safety checking module is used for carrying out safety checking on the starting items of the operating system through the basic input and output system in the safety starting process of the server; the result judging module is used for judging whether an operating system starting item which fails to be checked exists or not; and the alarm interface module is used for intercepting the operating system startup items which fail to be verified, acquiring corresponding verification failure information and sending the corresponding verification failure information to the substrate management controller so that the substrate management controller can display interface information and record logs for the operating system startup items which fail to be verified. According to the method and the system, the starting items of the operating system are safely checked, the checking failure information is sent to the BMC to be displayed and recorded in a log mode, operation and maintenance personnel can conveniently carry out system debugging, and the operation and maintenance efficiency is improved.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to an alarm device, method, electronic device, and computer-readable storage medium for an illegal operating system boot entry.
Background
Generally, when a server performs Secure Boot, that is, Secure Boot, if it is found that a Boot item to be loaded is an illegal Boot item, the server intercepts Boot of the Boot item. However, in the prior art, the related interception condition for the illegal boot item is only currently displayed on the display screen interface or the KVM remote display interface, which has display timeliness and is inconvenient for the operation and maintenance personnel to perform problem analysis and maintenance. In view of the above, it is an important need for those skilled in the art to provide a solution to the above technical problems.
Disclosure of Invention
The application aims to provide an alarming device, an alarming method, electronic equipment and a computer readable storage medium for an illegal operating system startup item, so that malicious startup items can be effectively prevented from being started, and an alarming record is generated to facilitate equipment debugging and automatic operation and maintenance of operation and maintenance personnel.
In order to solve the above technical problem, in a first aspect, the present application discloses an alarm device for an illegal operating system boot entry, which is applied to a bios controller in a server, the alarm device including:
the safety checking module is used for carrying out safety checking on the starting items of the operating system through the basic input and output system in the safety starting process of the server;
the result judging module is used for judging whether an operating system starting item which fails to be checked exists or not;
and the alarm interface module is used for intercepting the operating system startup items which fail to be verified, acquiring corresponding verification failure information and sending the corresponding verification failure information to the substrate management controller so that the substrate management controller can display interface information and record logs for the operating system startup items which fail to be verified.
Optionally, the security check module is specifically configured to:
judging whether the operating system startup item is a signed startup item or not through a basic input output system based on a preset public key; if yes, judging that the operating system starting item is successfully verified; if not, judging that the verification of the starting item of the operating system fails.
Optionally, the alert interface module is specifically configured to:
taking the acquired verification failure type information and the acquired startup item configuration information as the verification failure information; wherein, the configuration information of the startup item includes the name of the startup item, the drive path and the file path of the startup item of the operating system which fails to be checked.
Optionally, the method further comprises:
the enabling detection module is used for judging whether the safety starting service of the server is enabled or not before the safety starting of the server; and if the safety starting service is not enabled, generating corresponding prompt information.
Optionally, the alert interface module is further configured to:
and if the transmission fails when the verification failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
Optionally, the baseboard management control is specifically configured to:
and performing interface information display and log record on the failure time, interception reason and verification failure information of the operating system startup item with verification failure.
In a second aspect, the present application further discloses an alarming method for an illegal operating system boot entry, which is applied to a bios controller in a server, where the alarming method includes:
in the process of safely starting the server, carrying out safety verification on an operating system starting item through a basic input and output system;
judging whether an operating system starting item with verification failure exists or not;
if so, intercepting the operating system startup items failed in verification, acquiring corresponding verification failure information and sending the corresponding verification failure information to the baseboard management controller, so that the baseboard management controller can perform interface display and log recording on the operating system startup items failed in verification.
Optionally, the performing security check on the operating system boot entry through the bios includes:
judging whether the operating system startup item is a signed startup item or not through a basic input output system based on a preset public key;
if yes, judging that the operating system starting item is successfully verified;
if not, judging that the verification of the starting item of the operating system fails.
Optionally, the acquiring the corresponding verification failure information specifically includes:
taking the acquired verification failure type information and the acquired startup item configuration information as the verification failure information; wherein, the configuration information of the startup item includes the name of the startup item, the drive path and the file path of the startup item of the operating system which fails to be checked.
Optionally, before the secure booting of the server, the method further includes:
judging whether the safety starting service of the server is enabled or not; and if the safety starting service is not enabled, generating corresponding prompt information.
Optionally, after the obtaining the corresponding verification failure information and sending the verification failure information to the substrate management controller, the method further includes:
and if the transmission fails when the verification failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
Optionally, the interface information display and log recording are performed by the baseboard management controller for the operating system startup item that fails to be verified, where the interface information display and log recording include:
and the baseboard management controller displays interface information and records log of the failure time, interception reason and verification failure information of the operation system startup item with verification failure.
In a third aspect, the present application also discloses an electronic device, including:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of any of the above-described alerting methods for an illegal operating system boot item.
In a fourth aspect, the present application further discloses a computer-readable storage medium, in which a computer program is stored, and the computer program is used to implement the steps of any one of the above-mentioned warning methods for an illegal operating system boot item when being executed by a processor.
The warning device, the warning method, the electronic equipment and the computer-readable storage medium for the illegal operating system startup items have the advantages that: according to the method and the system, the safety check is carried out on the operating system starting item in the server safety starting mode, the warning interface module in communication connection with the BMC is utilized, the check failure information of the operating system starting item can be sent to the BMC to be displayed and recorded in a log mode, operation and maintenance personnel can carry out problem analysis and system debugging conveniently, and the automation operation and maintenance efficiency of the server is improved.
Drawings
In order to more clearly illustrate the technical solutions in the prior art and the embodiments of the present application, the drawings that are needed to be used in the description of the prior art and the embodiments of the present application will be briefly described below. Of course, the following description of the drawings related to the embodiments of the present application is only a part of the embodiments of the present application, and it will be obvious to those skilled in the art that other drawings can be obtained from the provided drawings without any creative effort, and the obtained other drawings also belong to the protection scope of the present application.
Fig. 1 is a block diagram of an alarm device for an illegal operating system boot entry according to an embodiment of the present application;
FIG. 2 is a flowchart of an alarming method for illegal OS boot entry according to an embodiment of the present application;
fig. 3 is a block diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
The core of the application is to provide an alarm device, method, electronic device and computer readable storage medium for an illegal operating system startup item, so as to effectively prevent the startup of a malicious startup item and generate an alarm record to facilitate the operation and maintenance personnel to perform device debugging and automatic operation and maintenance.
In order to more clearly and completely describe the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Generally, when a server performs Secure Boot, that is, Secure Boot, if it is found that a Boot item to be loaded is an illegal Boot item, the server intercepts Boot of the Boot item. However, in the prior art, the related interception condition for the illegal boot item is only currently displayed on the display screen interface or the KVM remote display interface, which has display timeliness and is inconvenient for the operation and maintenance personnel to perform problem analysis and maintenance. In view of this, the present application provides an alarm scheme for an illegal operating system boot entry, which can effectively solve the above problem.
Referring to fig. 1, an embodiment of the present application discloses an alarm device for an illegal operating system boot entry, which is applied to a basic input output system controller (BIOS controller) in a server, and the device includes:
the security verification module 101 is configured to perform security verification on an operating system boot entry through the basic input output system in a security boot process of the server;
a result judgment module 102, configured to judge whether an operating system startup item that fails to be checked exists;
and the alarm interface module 103 is configured to intercept the operating system startup item that fails to be verified, obtain corresponding verification failure information, and send the corresponding verification failure information to the baseboard management controller, so that the baseboard management controller performs interface information display and log recording on the operating system startup item that fails to be verified.
Specifically, the bios (basic Input and Output system), i.e., a basic Input and Output system, is a set of programs that are fixed on a chip on a motherboard in a computer, and stores the most important power-on self-test, hardware initialization program, and service program of the system bottom layer of the computer.
The alarm device provided by the application can specifically utilize the BIOS to realize the safety check and alarm of the starting item of the operating system in the safety starting process of the server system. The Secure Boot is a server operating system Boot method for preventing malicious software from invading, and the malicious software cannot pass the security check, so that the system cannot be infected.
Specifically, in the secure boot process of the server, based on the secure verification module, the application performs the secure verification on the boot items of the operating system, mainly the grub boot items, by using the BIOS. The grub (grand unified bootloader) is a bootable kernel program of a bootable multi-operating system from the GNU project, is an implementation of a multi-boot specification, and allows a user to simultaneously own a plurality of operating systems in a computer and select an operating system which the user wants to run when the computer is booted.
If the operating system boot item which fails to be checked exists, the alarm interface module 103 intercepts the operating system boot item to prevent the boot of the illegal operating system boot item. Meanwhile, the alarm interface module 103 also provides a communication line with a BMC (Baseboard Management Controller), and can send related verification failure information to the BMC, and the BMC performs interface display and log archive recording. Therefore, follow-up maintenance personnel can call the BMC log to perform problem analysis and system maintenance, and debugging efficiency of the maintenance personnel is greatly facilitated.
It should be further noted that, in the present application, the server needs to start the enabling of the secure boot in advance, so as to enter the secure boot mode after the system is powered on and booted. Specifically, for example, a server with a NF5280M5 installed with an operating system may log in to the web in advance, open the remote KVM service, and click a power-on button to power on the server. Then in the process of POST (Power On Self Test), clicking DEL Key to enter a Setup interface, changing CSM Support option to Disable (not enabled), Factory Key Provision option to Enable (enabled), changing Secure boot option to Enable (enabled), and storing and restarting. Therefore, the restarted server automatically enters a Secure boot mode after being powered on and started.
Therefore, the warning device for the illegal operating system startup items disclosed in the embodiment of the application can send the verification failure information of the operating system startup items to the BMC for display and log recording by performing the security verification on the operating system startup items in the server security startup mode and using the warning interface module 103 in communication connection with the BMC, thereby greatly facilitating the problem analysis and system debugging of operation and maintenance personnel and improving the automatic operation and maintenance efficiency for the server.
As a specific embodiment, in the warning apparatus for an illegal operating system boot entry disclosed in the embodiment of the present application, on the basis of the above contents, the security check module is specifically configured to:
judging whether the operating system startup item is a signed startup item or not through the basic input and output system based on a preset public key; if so, judging that the starting item of the operating system is successfully verified; if not, the starting item of the operating system is judged to fail to be checked.
Specifically, the process of secure boot may specifically be a process of performing secure verification based on a secret key. When the mainboard leaves a factory, some reliable public keys can be built in, and any operating system or hardware driver which is to be loaded on the mainboard needs to pass the authentication of the public keys. That is, only the program signed by the corresponding private key can pass the public key verification, otherwise, the main board refuses to load and determines it as an illegal program.
As a specific embodiment, on the basis of the above content, the alarm interface module 103 of the alarm device for the illegal operating system boot entry disclosed in the embodiment of the present application is specifically configured to:
the acquired verification failure type information and the acquired startup item configuration information are used as verification failure information; the configuration information of the startup item comprises the name of the startup item, the drive path and the file path of the startup item of the operating system with failed verification.
Specifically, by recording verification failure type information and startup item configuration information in detail, operation and maintenance personnel can be helped to quickly and effectively locate problem faults, and operation and maintenance efficiency is improved.
As a specific embodiment, the warning device for an illegal operating system boot entry disclosed in the embodiment of the present application further includes, on the basis of the foregoing content:
the enabling detection module is used for judging whether the safe starting service of the server is enabled or not before the server is safely started; and if the safety starting service is not enabled, generating corresponding prompt information.
Specifically, this embodiment is further provided with an enable detection module for detecting whether the server has started the secure boot enable, which can ensure that the server can smoothly enter the secure boot process.
As a specific embodiment, in the warning apparatus for an illegal operating system boot entry disclosed in the embodiment of the present application, on the basis of the above contents, the warning interface module 103 is further configured to:
and if the transmission fails when the verification failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
For example, the preset upper limit of the number of retransmissions may be specifically set to 3 times.
As a specific embodiment, on the basis of the above content, the warning device for the illegal operating system boot entry disclosed in the embodiment of the present application is specifically configured to:
and performing interface information display and log recording on the failure time, interception reason and verification failure information of the operating system startup item with verification failure.
Referring to fig. 2, an embodiment of the present application discloses an alarm method for an illegal operating system startup item, which is applied to a basic input output system controller in a server, and the method mainly includes:
s201: and in the process of safely starting the server, carrying out safety verification on the starting item of the operating system through the basic input and output system.
S202: judging whether an operating system starting item with verification failure exists or not; if yes, the process proceeds to S203.
S203: intercepting the operating system startup items which fail to be checked; the process proceeds to S204.
S204: and acquiring corresponding verification failure information and sending the verification failure information to the baseboard management controller so that the baseboard management controller can display an interface and record logs according to the operating system starting items which are failed in verification.
Therefore, according to the alarming method for the illegal operating system startup items, the safety verification of the operating system startup items is carried out in the server safety startup mode, the alarming interface module in communication connection with the BMC is utilized, the verification failure information of the operating system startup items can be sent to the BMC for displaying and log recording, the problem analysis and system debugging of operation and maintenance personnel are greatly facilitated, and the automatic operation and maintenance efficiency for the server is improved.
As a specific embodiment, the method for alarming an illegal operating system boot entry provided in the embodiment of the present application performs security check on the operating system boot entry through the basic input output system on the basis of the above contents, and includes:
judging whether the operating system startup item is a signed startup item or not through the basic input and output system based on a preset public key;
if so, judging that the starting item of the operating system is successfully verified;
if not, the starting item of the operating system is judged to fail to be checked.
As a specific embodiment, the method for warning about an illegal operating system startup item according to the embodiment of the present application, based on the above contents, specifically includes:
the acquired verification failure type information and the acquired startup item configuration information are used as verification failure information; the configuration information of the startup item comprises the name of the startup item, the drive path and the file path of the startup item of the operating system with failed verification.
As a specific embodiment, the method for alarming an illegal operating system boot entry provided in the embodiment of the present application further includes, on the basis of the foregoing content, before the server performs secure boot:
judging whether the safety starting service of the server is enabled or not; and if the safety starting service is not enabled, generating corresponding prompt information.
As a specific embodiment, the method for alarming an illegal operating system startup item according to the embodiment of the present application, after acquiring corresponding verification failure information and sending the verification failure information to the substrate management controller on the basis of the above contents, further includes:
and if the transmission fails when the verification failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
As a specific embodiment, in the warning method for the illegal operating system startup item provided in the embodiment of the present application, on the basis of the above contents, the interface information display and log recording are performed by the baseboard management controller for the operating system startup item that fails to be verified, including:
and the baseboard management controller displays interface information and records log of the failure time, interception reason and verification failure information of the operation system startup item which fails in verification.
For the specific content of the above warning method for the illegal operating system boot entry, reference may be made to the foregoing detailed description of the warning device for the illegal operating system boot entry, and details thereof are not repeated here.
Referring to fig. 3, an embodiment of the present application discloses an electronic device, including:
a memory 301 for storing a computer program;
a processor 302 for executing said computer program for implementing the steps of any of the alerting methods for illegal operating system booted items as described above.
Further, the present application also discloses a computer-readable storage medium, in which a computer program is stored, and the computer program is used for implementing the steps of any one of the above-mentioned warning methods for an illegal operating system boot item when being executed by a processor.
For the details of the electronic device and the computer-readable storage medium, reference may be made to the foregoing detailed description of the warning device for the illegal operating system boot entry, and details thereof are not repeated here.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the equipment disclosed by the embodiment, the description is relatively simple because the equipment corresponds to the method disclosed by the embodiment, and the relevant parts can be referred to the method part for description.
It is further noted that, throughout this document, relational terms such as "first" and "second" are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The technical solutions provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, without departing from the principle of the present application, several improvements and modifications can be made to the present application, and these improvements and modifications also fall into the protection scope of the present application.
Claims (10)
1. An alarm device for illegal operating system boot items, which is applied to a basic input output system controller in a server, the alarm device comprising:
the safety checking module is used for carrying out safety checking on the starting items of the operating system through the basic input and output system in the safety starting process of the server;
the result judging module is used for judging whether an operating system starting item which fails to be checked exists or not;
and the alarm interface module is used for intercepting the operating system startup items which fail to be verified, acquiring corresponding verification failure information and sending the corresponding verification failure information to the substrate management controller so that the substrate management controller can display interface information and record logs for the operating system startup items which fail to be verified.
2. The alarm device according to claim 1, wherein the security check module is specifically configured to:
judging whether the operating system startup item is a signed startup item or not through a basic input output system based on a preset public key; if yes, judging that the operating system starting item is successfully verified; if not, judging that the verification of the starting item of the operating system fails.
3. The alert device according to claim 1, wherein the alert interface module is specifically configured to:
taking the acquired verification failure type information and the acquired startup item configuration information as the verification failure information; wherein, the configuration information of the startup item includes the name of the startup item, the drive path and the file path of the startup item of the operating system which fails to be checked.
4. The warning device of claim 1 further comprising:
the enabling detection module is used for judging whether the safety starting service of the server is enabled or not before the safety starting of the server; and if the safety starting service is not enabled, generating corresponding prompt information.
5. The alert device of any one of claims 1 to 4, wherein the alert interface module is further configured to:
and if the transmission fails when the verification failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
6. The warning device according to claim 5, wherein the baseboard management control is specifically configured to:
and performing interface information display and log record on the failure time, interception reason and verification failure information of the operating system startup item with verification failure.
7. An alarming method for illegal operating system startup items, which is applied to a basic input output system controller in a server, and comprises the following steps:
in the process of safely starting the server, carrying out safety verification on an operating system starting item through a basic input and output system;
judging whether an operating system starting item with verification failure exists or not;
if so, intercepting the operating system startup items failed in verification, acquiring corresponding verification failure information and sending the corresponding verification failure information to the baseboard management controller, so that the baseboard management controller can perform interface display and log recording on the operating system startup items failed in verification.
8. The alerting method of claim 1 wherein the security check of the os boot entry by the bios comprises:
judging whether the operating system startup item is a signed startup item or not through a basic input output system based on a preset public key;
if yes, judging that the operating system starting item is successfully verified;
if not, judging that the verification of the starting item of the operating system fails.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing said computer program for carrying out the steps of the alerting method for illegal operating system booted items according to claim 7 or 8.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method for alerting an illegal operating system startup item according to claim 7 or 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011041755.8A CN111984490B (en) | 2020-09-28 | 2020-09-28 | Warning device, method, equipment and medium for illegal operating system starting item |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011041755.8A CN111984490B (en) | 2020-09-28 | 2020-09-28 | Warning device, method, equipment and medium for illegal operating system starting item |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111984490A true CN111984490A (en) | 2020-11-24 |
CN111984490B CN111984490B (en) | 2023-01-10 |
Family
ID=73449469
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011041755.8A Active CN111984490B (en) | 2020-09-28 | 2020-09-28 | Warning device, method, equipment and medium for illegal operating system starting item |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111984490B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112905252A (en) * | 2021-02-20 | 2021-06-04 | 山东英信计算机技术有限公司 | Sequencing method and medium for server BIOS startup item sequence |
CN113064640A (en) * | 2021-03-12 | 2021-07-02 | 山东英信计算机技术有限公司 | BIOS option verification method, system and medium |
CN113127076A (en) * | 2021-03-26 | 2021-07-16 | 山东英信计算机技术有限公司 | Startup item changing method, system and storage medium |
CN113868667A (en) * | 2021-09-29 | 2021-12-31 | 北京东土科技股份有限公司 | Safety detection system, method, device and storage medium |
CN116881929A (en) * | 2023-09-06 | 2023-10-13 | 苏州浪潮智能科技有限公司 | Safety protection method and device, electronic equipment and substrate controller chip |
WO2024087710A1 (en) * | 2022-10-27 | 2024-05-02 | 华为技术有限公司 | Secure boot method and apparatus, and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110162435A (en) * | 2019-04-24 | 2019-08-23 | 苏州浪潮智能科技有限公司 | A kind of server PXE starting test method, system, terminal and storage medium |
CN111290918A (en) * | 2020-02-26 | 2020-06-16 | 苏州浪潮智能科技有限公司 | Server running state monitoring method and device and computer readable storage medium |
CN111399919A (en) * | 2020-03-06 | 2020-07-10 | 苏州浪潮智能科技有限公司 | Starting method and system of server, electronic equipment and storage medium |
-
2020
- 2020-09-28 CN CN202011041755.8A patent/CN111984490B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110162435A (en) * | 2019-04-24 | 2019-08-23 | 苏州浪潮智能科技有限公司 | A kind of server PXE starting test method, system, terminal and storage medium |
CN111290918A (en) * | 2020-02-26 | 2020-06-16 | 苏州浪潮智能科技有限公司 | Server running state monitoring method and device and computer readable storage medium |
CN111399919A (en) * | 2020-03-06 | 2020-07-10 | 苏州浪潮智能科技有限公司 | Starting method and system of server, electronic equipment and storage medium |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112905252A (en) * | 2021-02-20 | 2021-06-04 | 山东英信计算机技术有限公司 | Sequencing method and medium for server BIOS startup item sequence |
CN113064640A (en) * | 2021-03-12 | 2021-07-02 | 山东英信计算机技术有限公司 | BIOS option verification method, system and medium |
CN113064640B (en) * | 2021-03-12 | 2023-03-21 | 山东英信计算机技术有限公司 | BIOS option verification method, system and medium |
CN113127076A (en) * | 2021-03-26 | 2021-07-16 | 山东英信计算机技术有限公司 | Startup item changing method, system and storage medium |
CN113868667A (en) * | 2021-09-29 | 2021-12-31 | 北京东土科技股份有限公司 | Safety detection system, method, device and storage medium |
WO2024087710A1 (en) * | 2022-10-27 | 2024-05-02 | 华为技术有限公司 | Secure boot method and apparatus, and device |
CN116881929A (en) * | 2023-09-06 | 2023-10-13 | 苏州浪潮智能科技有限公司 | Safety protection method and device, electronic equipment and substrate controller chip |
CN116881929B (en) * | 2023-09-06 | 2024-01-19 | 苏州浪潮智能科技有限公司 | Safety protection method and device, electronic equipment and substrate controller chip |
Also Published As
Publication number | Publication date |
---|---|
CN111984490B (en) | 2023-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111984490B (en) | Warning device, method, equipment and medium for illegal operating system starting item | |
US11520894B2 (en) | Verifying controller code | |
TWI559167B (en) | A unified extensible firmware interface(uefi)-compliant computing device and a method for administering a secure boot in the uefi-compliant computing device | |
CN109213667B (en) | Exception handling method of Android system and electronic equipment | |
US9886580B2 (en) | Method for optimizing boot time of an information handling system | |
CN109670319B (en) | Server flash safety management method and system thereof | |
US9471474B2 (en) | Cloud deployment infrastructure validation engine | |
US8028172B2 (en) | Systems and methods for updating a secure boot process on a computer with a hardware security module | |
EP2989579B1 (en) | Redundant system boot code in a secondary non-volatile memory | |
US9665452B2 (en) | Systems and methods for smart diagnoses and triage of failures with identity continuity | |
US11321454B2 (en) | Notice of intrusion into firmware | |
CN107665308B (en) | TPCM system for building and maintaining trusted operating environment and corresponding method | |
US20160364250A1 (en) | Systems and methods for providing technical support and exporting diagnostic data | |
CN111352702A (en) | Method, device, equipment and storage medium for determining credible state of virtual data center | |
US20200410104A1 (en) | Secure boot process | |
US9465643B1 (en) | Systems and methods for monitoring a primary operating system (OS) and/or migrating data using an OS hypervisor | |
CN114510381A (en) | Fault injection method, device, equipment and storage medium | |
CN110096882B (en) | Safety measurement method in equipment operation process | |
US20200244461A1 (en) | Data Processing Method and Apparatus | |
JP6128388B2 (en) | Information processing device | |
CN117113355A (en) | Basic input/output system configuration method, system, computer device and medium | |
CN115964725A (en) | Data protection method and device | |
CN104573500A (en) | UEFI (Unified Extensible Firmware Interface)-based software real-time protection system and UEFI-based software real-time protection method | |
US20220382636A1 (en) | Security inspections | |
US11132206B2 (en) | Systems and methods for modifying boot operation of an information handling system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |