CN111984490B - Warning device, method, equipment and medium for illegal operating system starting item - Google Patents

Warning device, method, equipment and medium for illegal operating system starting item Download PDF

Info

Publication number
CN111984490B
CN111984490B CN202011041755.8A CN202011041755A CN111984490B CN 111984490 B CN111984490 B CN 111984490B CN 202011041755 A CN202011041755 A CN 202011041755A CN 111984490 B CN111984490 B CN 111984490B
Authority
CN
China
Prior art keywords
operating system
item
starting
verification
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011041755.8A
Other languages
Chinese (zh)
Other versions
CN111984490A (en
Inventor
唐建亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202011041755.8A priority Critical patent/CN111984490B/en
Publication of CN111984490A publication Critical patent/CN111984490A/en
Application granted granted Critical
Publication of CN111984490B publication Critical patent/CN111984490B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2273Test methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2284Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by power-on test, e.g. power-on self test [POST]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2289Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by configuration test
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses an alarm device, a method, an electronic device and a computer readable storage medium for illegal operating system startup items, wherein the alarm device is applied to a basic input output system controller of a server and comprises the following steps: the safety check module is used for carrying out safety check on the starting item of the operating system through the basic input and output system in the safety starting process of the server; the result judging module is used for judging whether an operating system starting item which fails to be checked exists or not; and the alarm interface module is used for intercepting the operating system startup items which are failed in verification, acquiring corresponding verification failure information and sending the verification failure information to the substrate management controller, so that the substrate management controller can display interface information and record logs for the operating system startup items which are failed in verification. According to the method and the system, the starting items of the operating system are safely checked, the checking failure information is sent to the BMC to be displayed and log recorded, operation and maintenance personnel can carry out system debugging conveniently, and the operation and maintenance efficiency is improved.

Description

Warning device, method, equipment and medium for illegal operating system starting item
Technical Field
The present application relates to the field of computer technologies, and in particular, to an alarm device, method, electronic device, and computer-readable storage medium for an illegal operating system boot entry.
Background
Generally, when a server performs Secure Boot, that is, secure Boot, if it is found that a Boot item to be loaded is an illegal Boot item, the server intercepts Boot of the Boot item. However, in the prior art, the related interception condition for the illegal boot item is only currently displayed on the display screen interface or the KVM remote display interface, which has display timeliness and is inconvenient for the operation and maintenance personnel to perform problem analysis and maintenance. In view of the above, it is an important need for those skilled in the art to provide a solution to the above technical problems.
Disclosure of Invention
The application aims to provide an alarming device, method, electronic equipment and computer readable storage medium for an illegal operating system startup item, so as to effectively prevent the startup of a malicious startup item and generate an alarming record to facilitate equipment debugging and automatic operation and maintenance of operation and maintenance personnel.
In order to solve the above technical problem, in a first aspect, the present application discloses an alarm device for an illegal operating system boot entry, which is applied to a bios controller in a server, the alarm device including:
the safety checking module is used for carrying out safety checking on the starting item of the operating system through the basic input and output system in the safety starting process of the server;
the result judging module is used for judging whether an operating system starting item which fails to be checked exists or not;
and the alarm interface module is used for intercepting the operating system startup items which fail to be verified, acquiring corresponding verification failure information and sending the corresponding verification failure information to the substrate management controller so that the substrate management controller can display interface information and record logs for the operating system startup items which fail to be verified.
Optionally, the security check module is specifically configured to:
judging whether the operating system startup item is a signed startup item or not through a basic input output system based on a preset public key; if yes, judging that the operating system starting item is successfully verified; if not, judging that the verification of the starting item of the operating system fails.
Optionally, the alert interface module is specifically configured to:
taking the acquired verification failure type information and the acquired startup item configuration information as the verification failure information; wherein, the configuration information of the startup item includes the name of the startup item, the drive path and the file path of the startup item of the operating system which fails to be checked.
Optionally, the method further comprises:
the enabling detection module is used for judging whether the safety starting service of the server is enabled or not before the safety starting of the server; and if the safety starting service is not enabled, generating corresponding prompt information.
Optionally, the alert interface module is further configured to:
and if the transmission fails when the verification failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
Optionally, the baseboard management control is specifically configured to:
and performing interface information display and log record on the failure time, interception reason and verification failure information of the operating system startup item with verification failure.
In a second aspect, the present application further discloses an alarm method for an illegal operating system startup item, which is applied to a basic input output system controller in a server, where the alarm method includes:
in the process of safely starting the server, carrying out safety verification on an operating system starting item through a basic input and output system;
judging whether an operating system starting item with verification failure exists or not;
if yes, intercepting the operation system startup items failed in verification, acquiring corresponding verification failure information and sending the corresponding verification failure information to the baseboard management controller, so that the baseboard management controller can perform interface display and log recording on the operation system startup items failed in verification.
Optionally, the performing security check on the os startup item through the bios includes:
judging whether the operating system startup item is a signed startup item or not through a basic input output system based on a preset public key;
if yes, judging that the operating system starting item is successfully verified;
if not, judging that the verification of the starting item of the operating system fails.
Optionally, the obtaining of the corresponding verification failure information specifically includes:
taking the acquired verification failure type information and the acquired startup item configuration information as the verification failure information; wherein, the configuration information of the startup item includes the name of the startup item, the drive path and the file path of the startup item of the operating system which fails to be checked.
Optionally, before the server performs secure boot, the method further includes:
judging whether the safety starting service of the server is enabled or not; and if the safety starting service is not enabled, generating corresponding prompt information.
Optionally, after the obtaining the corresponding verification failure information and sending the verification failure information to the substrate management controller, the method further includes:
and if the transmission fails when the check failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
Optionally, the interface information display and log recording are performed by the baseboard management controller for the operating system startup item that fails to be verified, where the interface information display and log recording include:
and the baseboard management controller displays interface information and records log of the failure time, interception reason and verification failure information of the operation system startup item with verification failure.
In a third aspect, the present application also discloses an electronic device, including:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of any of the above-described alerting methods for an illegal operating system boot item.
In a fourth aspect, the present application further discloses a computer-readable storage medium, in which a computer program is stored, and the computer program is used to implement the steps of any one of the above-mentioned warning methods for an illegal operating system boot item when executed by a processor.
The warning device, the warning method, the electronic equipment and the computer-readable storage medium for the illegal operating system startup items have the advantages that: according to the method and the system, the safety check is carried out on the operating system starting item in the server safety starting mode, the warning interface module in communication connection with the BMC is utilized, the check failure information of the operating system starting item can be sent to the BMC to be displayed and recorded in a log mode, operation and maintenance personnel can carry out problem analysis and system debugging conveniently, and the automation operation and maintenance efficiency of the server is improved.
Drawings
In order to more clearly illustrate the technical solutions in the prior art and the embodiments of the present application, the drawings that are needed to be used in the description of the prior art and the embodiments of the present application will be briefly described below. Of course, the following description of the drawings related to the embodiments of the present application is only a part of the embodiments of the present application, and it will be apparent to those skilled in the art that other drawings may be obtained from the provided drawings without any creative effort, and the obtained other drawings also belong to the protection scope of the present application.
Fig. 1 is a block diagram of an alarm device for an illegal operating system boot entry according to an embodiment of the present application;
FIG. 2 is a flowchart of an alarming method for illegal OS boot entry according to an embodiment of the present application;
fig. 3 is a block diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
The core of the application is to provide an alarm device, method, electronic device and computer readable storage medium for an illegal operating system startup item, so as to effectively prevent the startup of a malicious startup item and generate an alarm record to facilitate the operation and maintenance personnel to perform device debugging and automatic operation and maintenance.
In order to more clearly and completely describe the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Generally, when a server performs Secure Boot, that is, secure Boot, if it is found that a Boot item to be loaded is an illegal Boot item, the server intercepts Boot of the Boot item. However, in the prior art, the related interception condition for the illegal boot item is only currently displayed on the display screen interface or the KVM remote display interface, which has display timeliness and is inconvenient for the operation and maintenance personnel to perform problem analysis and maintenance. In view of this, the present application provides an alarm scheme for an illegal operating system boot entry, which can effectively solve the above problem.
Referring to fig. 1, an embodiment of the present application discloses an alarm device for an illegal operating system boot entry, which is applied to a basic input output system controller (BIOS controller) in a server, and the device includes:
the security verification module 101 is configured to perform security verification on an operating system boot entry through the basic input output system in a security boot process of the server;
a result judgment module 102, configured to judge whether an operating system startup item that fails to be checked exists;
and the alarm interface module 103 is configured to intercept the operating system startup item that fails to be verified, obtain corresponding verification failure information, and send the corresponding verification failure information to the baseboard management controller, so that the baseboard management controller performs interface information display and log recording on the operating system startup item that fails to be verified.
Specifically, the BIOS (Basic Input and Output System), i.e., a Basic Input and Output System, is a set of programs that are fixed on a chip on a motherboard in a computer, and stores the most important power-on self-test, hardware initialization program, and service program of the System bottom layer of the computer.
The alarm device provided by the application can specifically utilize the BIOS to realize the safety check and alarm of the starting item of the operating system in the safety starting process of the server system. The Secure Boot is a server operating system Boot method for preventing malicious software from invading, and the malicious software cannot pass the security check, so that the system cannot be infected.
Specifically, in the secure boot process of the server, based on the secure verification module, the application performs the secure verification on the boot items of the operating system, mainly the grub boot items, by using the BIOS. Among them, grub (grand unified bootloader) is a bootable kernel of a bootable multi-operating system from the GNU project, and is an implementation of a multi-boot specification, which allows a user to have multiple operating systems in a computer at the same time and select an operating system that the user wants to run when the computer is booted.
If the operating system boot item which fails to be checked exists, the alarm interface module 103 intercepts the operating system boot item to prevent the boot of the illegal operating system boot item. Meanwhile, the alarm interface module 103 also provides a communication line with a BMC (Baseboard Management Controller), and can send related verification failure information to the BMC, and the BMC performs interface display and log archive recording. Therefore, follow-up maintenance personnel can call the BMC log to perform problem analysis and system maintenance, and debugging efficiency of the maintenance personnel is greatly facilitated.
It should be further noted that, in the present application, the server needs to start the enabling of the secure boot in advance, so as to enter the secure boot mode after the system is powered on and booted. Specifically, for example, a server with a NF5280M5 model and an operating system installed therein may log in to the web in advance, open the remote KVM service, and click a power-on button to power on the server. Then in the process of POST (Power On Self Test), clicking DEL Key to enter a Setup interface, changing CSM Support option to Disable (not enabled), factory Key Provision option to Enable (enabled), then changing Secure boot option to Enable (enabled), and saving and restarting. Therefore, the restarted server automatically enters a Secure boot mode after being powered on and started.
Therefore, the alarm device for the illegal operating system startup items disclosed in the embodiment of the application can send the verification failure information of the operating system startup items to the BMC for displaying and logging by performing the security verification on the operating system startup items in the server security startup mode and utilizing the alarm interface module 103 in communication connection with the BMC, thereby greatly facilitating the problem analysis and system debugging of operation and maintenance personnel and improving the automatic operation and maintenance efficiency for the server.
As a specific embodiment, in the warning apparatus for an illegal operating system boot entry disclosed in the embodiment of the present application, on the basis of the above contents, the security check module is specifically configured to:
judging whether the operating system startup item is a signed startup item or not through the basic input and output system based on a preset public key; if so, judging that the starting item of the operating system is successfully verified; if not, the starting item of the operating system is judged to fail to be checked.
Specifically, the process of secure start may specifically be a process of performing secure verification based on a secret key. When the motherboard leaves a factory, some reliable public keys can be built in, and any operating system or hardware driver which is to be loaded on the motherboard must pass the authentication of the public keys. That is, only the program signed by the corresponding private key can pass the public key verification, otherwise, the main board refuses to load and determines the program as an illegal program.
As a specific embodiment, on the basis of the above content, the alarm interface module 103 of the alarm device for the illegal operating system boot entry disclosed in the embodiment of the present application is specifically configured to:
the acquired verification failure type information and the acquired startup item configuration information are used as verification failure information; the configuration information of the startup item comprises the name of the startup item, the drive path and the file path of the startup item of the operating system with failed verification.
Specifically, by recording verification failure type information and startup item configuration information in detail, operation and maintenance personnel can be helped to quickly and effectively locate problem faults, and operation and maintenance efficiency is improved.
As a specific embodiment, the warning device for the illegal operating system startup item disclosed in the embodiment of the present application further includes, on the basis of the foregoing content:
the enabling detection module is used for judging whether the safe starting service of the server is enabled or not before the server is safely started; and if the safety starting service is not enabled, generating corresponding prompt information.
Specifically, this embodiment is further provided with an enable detection module for detecting whether the server has started the secure boot enable, which can ensure that the server can smoothly enter the secure boot process.
As a specific embodiment, in the warning apparatus for an illegal operating system boot entry disclosed in the embodiment of the present application, on the basis of the above contents, the warning interface module 103 is further configured to:
and if the transmission fails when the verification failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
For example, the preset upper limit of the number of retransmissions may be specifically set to 3 times.
As a specific embodiment, on the basis of the above content, the warning device for the illegal operating system boot entry disclosed in the embodiment of the present application is specifically configured to:
and performing interface information display and log recording on the failure time, interception reason and verification failure information of the operating system startup item with verification failure.
Referring to fig. 2, an embodiment of the present application discloses an alarm method for an illegal operating system startup item, which is applied to a basic input output system controller in a server, and the method mainly includes:
s201: and in the process of safely starting the server, carrying out safety verification on the starting item of the operating system through the basic input and output system.
S202: judging whether an operating system starting item with verification failure exists or not; if yes, the process proceeds to S203.
S203: intercepting the operating system starting item which fails in verification; the process proceeds to S204.
S204: and acquiring corresponding verification failure information and sending the verification failure information to the baseboard management controller so that the baseboard management controller can display an interface and record logs according to the operating system starting items which are failed in verification.
Therefore, according to the alarming method for the illegal operating system startup items, the safety verification of the operating system startup items is carried out in the server safety startup mode, the alarming interface module in communication connection with the BMC is utilized, the verification failure information of the operating system startup items can be sent to the BMC for displaying and log recording, the problem analysis and system debugging of operation and maintenance personnel are greatly facilitated, and the automatic operation and maintenance efficiency for the server is improved.
As a specific embodiment, the method for alarming an illegal os startup item provided in the embodiment of the present application, based on the above contents, performs security verification on an os startup item through a basic input output system, and includes:
judging whether the operating system startup item is a signed startup item or not through a basic input and output system based on a preset public key;
if so, judging that the starting item of the operating system is successfully verified;
if not, the starting item of the operating system is judged to fail to be checked.
As a specific embodiment, the method for warning about an illegal operating system startup item according to the embodiment of the present application, based on the above contents, specifically includes:
the acquired verification failure type information and the acquired startup item configuration information are used as verification failure information; the configuration information of the startup item comprises the name of the startup item, the drive path and the file path of the startup item of the operating system with failed verification.
As a specific embodiment, the method for alarming an illegal operating system startup item provided in the embodiment of the present application, on the basis of the foregoing content, before the server performs secure startup, further includes:
judging whether the safety starting service of the server is enabled or not; and if the safety starting service is not enabled, generating corresponding prompt information.
As a specific embodiment, the method for alarming an illegal operating system startup item according to the embodiment of the present application, after acquiring corresponding verification failure information and sending the verification failure information to the substrate management controller on the basis of the above contents, further includes:
and if the transmission fails when the verification failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
As a specific embodiment, in the warning method for the illegal operating system startup item provided in the embodiment of the present application, on the basis of the above contents, the interface information display and log recording are performed by the baseboard management controller for the operating system startup item that fails to be verified, including:
and the baseboard management controller displays interface information and records logs of failure time, interception reasons and verification failure information of the operation system startup items which are failed in verification.
For the specific content of the above warning method for the illegal operating system boot entry, reference may be made to the foregoing detailed description of the warning device for the illegal operating system boot entry, and details thereof are not repeated here.
Referring to fig. 3, an embodiment of the present application discloses an electronic device, including:
a memory 301 for storing a computer program;
a processor 302 for executing the computer program to implement the steps of any of the above-mentioned warning methods for illegal operating system boot items.
Further, the embodiment of the present application also discloses a computer-readable storage medium, in which a computer program is stored, and the computer program is used for implementing the steps of any one of the above-mentioned warning methods for an illegal operating system startup item when executed by a processor.
For the details of the electronic device and the computer-readable storage medium, reference may be made to the foregoing detailed description of the warning device for the illegal operating system boot entry, and details thereof are not repeated here.
The embodiments in the present application are described in a progressive manner, and each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the equipment disclosed by the embodiment, the description is relatively simple because the equipment corresponds to the method disclosed by the embodiment, and the relevant parts can be referred to the method part for description.
It is further noted that, throughout this document, relational terms such as "first" and "second" are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
The technical solutions provided in the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, without departing from the principle of the present application, several improvements and modifications can be made to the present application, and these improvements and modifications also fall into the protection scope of the present application.

Claims (10)

1. An alarm device for illegal operating system startup items, which is applied to a basic input output system controller in a server, the alarm device comprising:
the safety checking module is used for carrying out safety checking on the starting items of the operating system through the basic input and output system in the safety starting process of the server;
the result judging module is used for judging whether an operating system starting item which fails to be checked exists or not;
and the alarm interface module is used for intercepting the operating system startup items which fail to be verified, acquiring corresponding verification failure information and sending the corresponding verification failure information to the substrate management controller so that the substrate management controller can display interface information and record logs for the operating system startup items which fail to be verified.
2. The alarm device according to claim 1, wherein the security check module is specifically configured to:
judging whether the operating system startup item is a signed startup item or not through a basic input and output system based on a preset public key; if yes, judging that the operating system starting item is successfully verified; if not, judging that the verification of the starting item of the operating system fails.
3. The alarm device according to claim 1, wherein the alarm interface module is specifically configured to:
taking the acquired verification failure type information and the acquired startup item configuration information as the verification failure information; the configuration information of the startup item comprises the name of the startup item, the driver path and the file path of the startup item of the operating system which fails to be checked.
4. The alert device of claim 1, further comprising:
the enabling detection module is used for judging whether the safety starting service of the server is enabled or not before the safety starting of the server; and if the safety starting service is not enabled, generating corresponding prompt information.
5. The alert device of any one of claims 1 to 4, wherein the alert interface module is further configured to:
and if the transmission fails when the verification failure information is transmitted to the substrate management controller, repeating the transmission operation until the transmission is successful or the preset retransmission time upper limit is reached.
6. The alert device of claim 5, wherein the baseboard management control is specifically configured to:
and performing interface information display and log record on the failure time, interception reason and verification failure information of the operating system startup item with verification failure.
7. An alarm method for illegal operating system startup items is characterized in that the alarm method is applied to a basic input output system controller in a server, and comprises the following steps:
in the process of safely starting the server, carrying out safety verification on an operating system starting item through a basic input and output system;
judging whether an operating system starting item with verification failure exists or not;
if so, intercepting the operating system startup items failed in verification, acquiring corresponding verification failure information and sending the corresponding verification failure information to the baseboard management controller, so that the baseboard management controller can perform interface display and log recording on the operating system startup items failed in verification.
8. The alerting method of claim 7 wherein the security check of the os boot entry by the bios comprises:
judging whether the operating system startup item is a signed startup item or not through a basic input output system based on a preset public key;
if yes, judging that the operating system starting item is successfully verified;
if not, judging that the verification of the starting item of the operating system fails.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing said computer program to implement the steps of the method for alerting of an illegal operating system startup item according to claim 7 or 8.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method for alerting of an illegal operating system startup item according to claim 7 or 8.
CN202011041755.8A 2020-09-28 2020-09-28 Warning device, method, equipment and medium for illegal operating system starting item Active CN111984490B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011041755.8A CN111984490B (en) 2020-09-28 2020-09-28 Warning device, method, equipment and medium for illegal operating system starting item

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011041755.8A CN111984490B (en) 2020-09-28 2020-09-28 Warning device, method, equipment and medium for illegal operating system starting item

Publications (2)

Publication Number Publication Date
CN111984490A CN111984490A (en) 2020-11-24
CN111984490B true CN111984490B (en) 2023-01-10

Family

ID=73449469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011041755.8A Active CN111984490B (en) 2020-09-28 2020-09-28 Warning device, method, equipment and medium for illegal operating system starting item

Country Status (1)

Country Link
CN (1) CN111984490B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112905252A (en) * 2021-02-20 2021-06-04 山东英信计算机技术有限公司 Sequencing method and medium for server BIOS startup item sequence
CN113064640B (en) * 2021-03-12 2023-03-21 山东英信计算机技术有限公司 BIOS option verification method, system and medium
CN113127076A (en) * 2021-03-26 2021-07-16 山东英信计算机技术有限公司 Startup item changing method, system and storage medium
CN113868667A (en) * 2021-09-29 2021-12-31 北京东土科技股份有限公司 Safety detection system, method, device and storage medium
CN117992960A (en) * 2022-10-27 2024-05-07 华为技术有限公司 Safe starting method, device and equipment
CN116881929B (en) * 2023-09-06 2024-01-19 苏州浪潮智能科技有限公司 Safety protection method and device, electronic equipment and substrate controller chip

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162435B (en) * 2019-04-24 2022-08-12 苏州浪潮智能科技有限公司 Method, system, terminal and storage medium for starting and testing PXE of server
CN111290918B (en) * 2020-02-26 2022-12-27 苏州浪潮智能科技有限公司 Server running state monitoring method and device and computer readable storage medium
CN111399919A (en) * 2020-03-06 2020-07-10 苏州浪潮智能科技有限公司 Starting method and system of server, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111984490A (en) 2020-11-24

Similar Documents

Publication Publication Date Title
CN111984490B (en) Warning device, method, equipment and medium for illegal operating system starting item
US11520894B2 (en) Verifying controller code
TWI559167B (en) A unified extensible firmware interface(uefi)-compliant computing device and a method for administering a secure boot in the uefi-compliant computing device
US9471474B2 (en) Cloud deployment infrastructure validation engine
CN109213667B (en) Exception handling method of Android system and electronic equipment
US9886580B2 (en) Method for optimizing boot time of an information handling system
CN102955921B (en) Electronic device and safe starting method
CN109670319B (en) Server flash safety management method and system thereof
US8028172B2 (en) Systems and methods for updating a secure boot process on a computer with a hardware security module
US20160055113A1 (en) Redundant System Boot Code in a Secondary Non-Volatile Memory
US9665452B2 (en) Systems and methods for smart diagnoses and triage of failures with identity continuity
CN107665308B (en) TPCM system for building and maintaining trusted operating environment and corresponding method
US11321454B2 (en) Notice of intrusion into firmware
US20160364250A1 (en) Systems and methods for providing technical support and exporting diagnostic data
CN111352702A (en) Method, device, equipment and storage medium for determining credible state of virtual data center
US9465643B1 (en) Systems and methods for monitoring a primary operating system (OS) and/or migrating data using an OS hypervisor
CN115061871A (en) Computer performance test method, device and medium
CN111309242A (en) Intelligent cabinet screen display method and device, server and storage medium
CN110096882B (en) Safety measurement method in equipment operation process
CN114510381A (en) Fault injection method, device, equipment and storage medium
US7340594B2 (en) Bios-level incident response system and method
US9811348B2 (en) Information processing apparatus
WO2024119787A1 (en) Method and apparatus for amd server system installation power-off processing, device and medium
CN115964725A (en) Data protection method and device
US11132206B2 (en) Systems and methods for modifying boot operation of an information handling system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant