CN113190853A - Computer credibility authentication system, method, equipment and readable storage medium - Google Patents

Computer credibility authentication system, method, equipment and readable storage medium Download PDF

Info

Publication number
CN113190853A
CN113190853A CN202110315311.7A CN202110315311A CN113190853A CN 113190853 A CN113190853 A CN 113190853A CN 202110315311 A CN202110315311 A CN 202110315311A CN 113190853 A CN113190853 A CN 113190853A
Authority
CN
China
Prior art keywords
trusted
file
value
verification
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110315311.7A
Other languages
Chinese (zh)
Inventor
王朝阳
朱朝阳
周亮
宋小芹
王杰
王云龙
曹飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electric Power Research Institute Co Ltd CEPRI
Original Assignee
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electric Power Research Institute Co Ltd CEPRI filed Critical China Electric Power Research Institute Co Ltd CEPRI
Priority to CN202110315311.7A priority Critical patent/CN113190853A/en
Publication of CN113190853A publication Critical patent/CN113190853A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a computer trusted authentication system, a method, equipment and a readable storage medium, which bring a trusted computing technology into the overall security of the system, and a trusted PC based on a platform can ensure the integrity of software and hardware of the PC in the using process, and an attacker can not achieve an attack directory by means of refreshing a ROM, replacing accessories, replacing an operating system, implanting trojans and the like, so that the trusted PC always operates in a safe and trusted environment. The invention can start the operation system from the bottom hardware, and then ensure the software and hardware environment of the credible PC equipment to be always in a safe and credible state through the operation of the actual software, and the like, and can effectively ensure the safety of the office environment because unauthorized software cannot be installed in the system and illegal programs, trojan viruses and the like cannot be executed. The trusted computing has outstanding superiority and strong defense capability to network attack weapons and attack modes.

Description

Computer credibility authentication system, method, equipment and readable storage medium
Technical Field
The invention belongs to the technical field of security authentication, and relates to a computer trusted authentication system, method, device and readable storage medium.
Background
The trusted PC is based on a processor platform, integrates a trusted computing technology, and performs integrity protection on various ROMs (such as BIOS (basic input/output system) and various hardware environments (such as a processor, a memory, a magnetic disk and PCIe (peripheral component interconnect express) device) of the PC, an operating system kernel, related configuration files, running software and the like so as to prevent illegal tampering; by the white list technology, the execution of unknown programs is prevented, and the execution of illegal programs such as Trojan horses, viruses and the like can be effectively resisted; in addition, a signature verification mechanism can be used for installing the application program to prevent the installation of the program with unknown incoming routes, and the installation is allowed only through the program signed through a regular channel, so that various unnecessary software can be effectively prevented from being installed on an office PC, and the safety, credibility and reliability of the office environment are ensured.
The PC in the key information infrastructure industry is prioritized for replacement, and a trusted computing technology is applied according to compliance requirements. Trusted computing is a comprehensive information security technique aimed at enhancing the trustworthiness of computer systems.
The basic idea of trusted computing is: in the computer system, a trust root is firstly constructed, the trust root is started to a hardware platform, an operating system and an application, the first-level measurement is first, the first-level trust is first, the trust is expanded to the whole computer system, and protective measures are taken to ensure the data integrity and the behavior predictability of computing resources, so that the trust of the whole computer system is ensured.
The international Trusted Computing Group (TCG) defines trust with the predictability of entity behavior: an entity is trusted if its behavior always reaches the intended goal in the intended way. TCG considers trustworthiness to be primarily security.
Among various information security measures, the security of a hardware system and the security of an operating system are the basis of the security of an information system, and a cryptographic technology, a network security technology and the like are key technologies; the current technical trend is that all software is defined, but the software is operated on hardware, and the safety problem of an information system can be effectively solved only by comprehensively taking measures from the bottom layer of the software and the hardware.
The trusted computing is a new computing mode with operation and protection coexistence and active immunity, the starting point, the foundation and the strength of the security of the trusted computing are substantially different from those of the traditional security technology, the trusted computing is based on a hardware password chip, a complete trust chain is constructed from the power-on of a platform to the execution of an application program, the authentication is carried out step by step, and the program which is not authenticated cannot be executed, so that the information system realizes autoimmunity, and an active defense system with high security level is constructed.
The PC is used for personal office work, the randomness of the use is high, the personal safety protection capability and consciousness are weak, the PC can be frequently started (once a day) in the use process, the personal preference is that some non-working necessary software is installed, some non-regular websites are browsed or some attachments with unknown paths are opened through mails, so that the PC is easily taken as a jumper board of an attacker, and the personal PC invades the office network of a unit, and the unpredictable loss is brought to the unit.
Disclosure of Invention
The invention aims to solve the problems in the prior art and provides a computer credibility authentication system, a method, equipment and a readable storage medium.
In order to achieve the purpose, the invention adopts the following technical scheme to realize the purpose:
a computer trusted authentication method, comprising the steps of:
verifying and signing the BIOS firmware, and if the verification and signing pass, continuing to start the operating system; otherwise, alarming, stopping the starting of the operating system, feeding back to the terminal, and determining whether to continue the starting of the system by the user;
carrying out credibility measurement verification on various firmware and hardware in the computer, and if the credibility measurement verification is passed, continuing to start the operating system; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
performing credibility measurement verification on the grub, and starting an operating system if the credibility measurement verification is passed; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
constructing a credible reference library;
judging the credible state of the file according to the credible reference library, and if the file is credible, allowing the access to the file; otherwise, the file is indicated to be tampered, and the access to the file is prevented.
The invention further improves the following steps:
the specific method for verifying and signing the BIOS firmware is as follows:
when the processor is powered on and started, the BIOS firmware signature checking function is called, the BIOS firmware is checked by using a built-in public key certificate, when the BIOS firmware passes the signature checking, the abstract value of the BIOS firmware is calculated, the abstract value is expanded into the register PCR0, the control right is transferred to the BIOS, and when the BIOS firmware passes the signature checking, the transfer of the control right is terminated, and an alarm is given.
The specific method for verifying the credibility metric of grub is as follows:
before the grub transfers the control right to the kernel, calculating a configuration file grub.cfg of the grub, a kernel file vmlinux and an initial disk file initramfs to calculate abstract values;
and verifying the credible state of the credible verification object.
The calculation method of the abstract value is as follows:
firstly, calculating a digest value of an object to obtain a 32-bit hash value;
taking the obtained 32-bit hash value as input, and calculating the input 32-bit hash value again by using a digest algorithm to obtain a new digest value;
extending the new abstract value into the PCR as a measurement value of the object;
and writing log information of the measurement into a log storage NV, wherein the log information comprises time, a measurement object and a hash value of the measurement object.
The specific method for verifying the trusted state is as follows:
reading reference value information from the NV storage area;
reading corresponding abstract value information from the PCR;
comparing the reference value information with the abstract value information, and writing the comparison information into a log storage NV, wherein the log information comprises time, a trusted verification object, a reference value of the trusted verification object, a metric value of the trusted verification object and a trusted state;
if the comparison result is consistent, the trusted verification object is not tampered and is trusted, and the system is allowed to continue to be started; otherwise, the credible verification object is tampered, the verification is not credible, the system is prevented from starting, the user is prompted at the terminal, and the decision of the user is waited;
if the user inputs an instruction of continuing the system starting, continuing the subsequent starting, otherwise, not performing any treatment.
The specific method for constructing the credible reference library comprises the following steps:
calculating the digest value of the file, hash 1;
calculating the digest value hash2 of the absolute path of the file;
the digest value hash1 and the digest value hash2 are concatenated to obtain a digest value hash3, hash3= (hash1+ hash 2);
taking the digest value hash3 as input, calculating the digest value by using a hardware algorithm SM3 to obtain a digest value hash 4;
the digest value hash4 is written into the extended attribute of the file as the reference value of the file, and the file name and the modification time of the file are written at the same time.
The specific method for judging the credible state of the file is as follows:
acquiring a modification time1 of the file;
acquiring a reference modification time2 of the file stored in the file extension attribute;
comparing the modification time1 with the modification time2, if the modification time1 and the modification time2 are equal, the file is not tampered, the file is allowed to be trusted, and if the modification time 8932 and the modification time are not equal, the file is possibly tampered, and the digest value of the file needs to be calculated to judge the trusted state of the file;
calculating the digest value hash5 of the file by the same algorithm as the construction process of the reference library;
reading a digest value hash4 from the extended attribute of the file;
and comparing the reference value information hash4 with the digest value hash5, if the results are the same, the file is not tampered and is trusted, and the access to the file is allowed, and if the results are different, the file is tampered and is not trusted, and the access to the file is prevented.
A computer trusted authentication system, comprising:
the processor verifies and signs the BIOS firmware, and if the verification and the signing pass, the operating system is continuously started; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
the trusted BIOS is used for carrying out trusted measurement verification on various firmware and hardware in the computer, and if the trusted measurement verification is passed, the operating system is continuously started; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
the trusted Grub is used for performing trusted measurement verification on the Grub, and if the trusted measurement verification is passed, the operating system is started; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
the trusted verification module is integrated in the operating system and used for judging the trusted state of the file according to the trusted reference library, and if the trusted state is trusted, the access to the file is allowed; otherwise, the file is indicated to be tampered, and the access to the file is prevented.
A terminal device comprising a memory, a processor and a computer program stored in said memory and executable on said processor, said processor implementing the steps of the method as described above when executing said computer program.
A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method as described above.
Compared with the prior art, the invention has the following beneficial effects:
the invention can start the operation system from the bottom hardware, and then ensure the software and hardware environment of the credible PC equipment to be always in a safe and credible state through the operation of the actual software, and the like, and can effectively ensure the safety of the office environment because unauthorized software cannot be installed in the system and illegal programs, trojan viruses and the like cannot be executed. The method has outstanding superiority and strong defense capability for a batch of novel network attack weapons and attack modes such as 'seismic net', 'flame', 'heart blood drip', APT attack, 0Day attack, supply chain attack and the like through credible calculation.
The invention brings the trusted computing technology into the overall security of the system, the trusted PC based on the platform can ensure the integrity of software and hardware of the PC in the using process, and an attacker can not achieve the attack directory by means of refreshing the ROM, replacing accessories, replacing an operating system, implanting trojans and the like, so that the trusted PC always operates in a safe and trusted environment.
Drawings
In order to more clearly explain the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a flowchart illustrating trusted boot verification of a trusted PC operating system;
FIG. 2 is a flowchart of trusted verification of trusted PC applications.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the embodiments of the present invention, it should be noted that if the terms "upper", "lower", "horizontal", "inner", etc. are used for indicating the orientation or positional relationship based on the orientation or positional relationship shown in the drawings or the orientation or positional relationship which is usually arranged when the product of the present invention is used, the description is merely for convenience and simplicity, and the indication or suggestion that the referred device or element must have a specific orientation, be constructed and operated in a specific orientation, and thus, cannot be understood as limiting the present invention. Furthermore, the terms "first," "second," and the like are used merely to distinguish one description from another, and are not to be construed as indicating or implying relative importance.
Furthermore, the term "horizontal", if present, does not mean that the component is required to be absolutely horizontal, but may be slightly inclined. For example, "horizontal" merely means that the direction is more horizontal than "vertical" and does not mean that the structure must be perfectly horizontal, but may be slightly inclined.
In the description of the embodiments of the present invention, it should be further noted that unless otherwise explicitly stated or limited, the terms "disposed," "mounted," "connected," and "connected" should be interpreted broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The invention is described in further detail below with reference to the accompanying drawings:
referring to fig. 1 and fig. 2, an embodiment of the present invention discloses a computer trusted authentication system, which includes a processor, a trusted BIOS, a trusted computing module, and a trusted verification module.
The processor is used as a trusted computing root to construct a trusted chain; the processor has a trusted starting function, namely the processor is required to be used as a trusted root, signature information of a BIOS to be measured and verified is built in the processor, when the system is powered on and started, the processor firstly obtains control right, verifies and signs the BIOS firmware, alarms when the verification signature fails, stops the system starting, determines whether to continue the system starting or not by a user after the terminal prompts, and continues the subsequent system starting after the user confirms that the system is allowed to start. And after the signature is verified, calculating a hash value of the BIOS firmware, and extending the hash value into the PCR0 corresponding to the trusted computing module to serve as a first level of a trusted chain.
The specific method for the processor to verify the BIOS signature information is as follows:
step 1-1, a BIOS manufacturer signs the BIOS firmware through a private key of the BIOS manufacturer, and submits a certificate for signature and signature information to a processor manufacturer;
step 1-2, when a processor manufacturer leaves factory and initializes, a public key certificate and signature information of a BIOS manufacturer are imported into a processor;
step 1-3, when the processor is powered on and started, the BIOS firmware signature checking function is called, the BIOS firmware is checked and signed by using a built-in public key certificate, when the BIOS firmware signature checking passes, the abstract value of the BIOS firmware is calculated, the abstract value is expanded into a platform configuration register PCR0 of a trusted computing module, the control right is transferred to the BIOS, and when the BIOS firmware signature checking fails, the transfer of the control right is terminated, and an alarm is given.
The trusted BIOS supports a trusted measurement verification function; the trusted BIOS is internally provided with a functional module for verifying the trusted measurement of various firmware and hardware in the trusted PC platform. The specific method for the trusted BIOS to perform the trusted measurement verification is as follows:
step 2-1, after obtaining the control right, the BIOS performs self-checking on a processor, a memory, a display card, a hard disk, PCIe (peripheral component interconnect express) equipment, a starting partition and the like, and calculates abstract values of the equipment in the self-checking process;
and 2-2, extending the abstract value into PCR 1-PCR 7 of a platform configuration register of the trusted computing module to serve as a second level of the trusted chain.
And 2-3, comparing the abstract value with a reference abstract value in a reference library, stopping system starting if the abstract value is inconsistent, prompting a user to have an object for verifying the incredibility at a terminal, determining whether to continue the system starting by the user, and allowing the system to continue starting if the user inputs 'Y', or not performing any treatment.
The trusted computing module can support TCM1.0 or TPM2.0 standards; the trusted computing module can be mounted on a PC mainboard in a paster mode, an interface can be reserved on the mainboard, the trusted computing module can be used in an inserting mode through the module, and the trusted computing module can be connected to an SPI (serial peripheral interface), an LPC (Linear Power controller) or a PCIe (peripheral component interconnect express) bus to provide a flexible multi-form access mode.
The trusted Grub can perform trusted verification on the bootstrap program, the operating system kernel and relevant configuration, and the system is stopped when the verification is not trusted; the method comprises the steps that a credibility measurement and verification function of a credible grub is installed in a system in a grub module mode, configuration files grub.cfg of the grub are used for configuration starting, the configuration files grub.cfg are firstly analyzed in the grub starting process, a credible verification module is loaded to perform measurement verification on an operating system kernel, a virtual file system and each starting module, and a measurement result is expanded into PCR 8-PCR 11 of the credible verification module to serve as the third level of a credible chain. The specific verification method of the credible grub is as follows:
step 3-1, before the grub transfers the control right to the kernel, calculating a configuration file grub.cfg, a kernel file vmlinux and an initial disk file initramfs of the grub to calculate abstract values; the abstract value is calculated as follows:
1) firstly, calculating a digest value of an object by using a software sha256 algorithm to obtain a 32-bit hash value;
2) taking the obtained 32-bit hash value as input, and then calculating the input 32-bit digest value again by using a hardware SM3 digest algorithm of the trusted computing module to obtain a new digest value;
3) expanding the abstract value into a PCR of a trusted computing module as a measurement value of an object; and writing log information of the measurement into a log storage NV, wherein the log information comprises time, a measurement object and a hash value of the measurement object.
Step 3-2, verifying the credibility state of the credible verification object, wherein the verification method comprises the following steps:
1) reading reference value information from an NV storage area of a trusted computing module;
2) reading corresponding abstract value information from the PCR;
3) comparing the reference value information with the abstract value information, and writing the comparison information into a log storage NV, wherein the log information comprises time, a trusted verification object, a reference value of the trusted verification object, a measurement value of the trusted verification object and a trusted state (trusted/unregulated);
4) if the compared result is consistent, the trusted verification object is not tampered, the trusted verification object is trusted, the system is allowed to continue to be started, if the compared result is inconsistent, the trusted verification object is tampered, the trusted verification object is verified to be not trusted, the system is prevented from being started, and the user is prompted at the terminal to wait for the decision of the user;
5) if the user wants to continue the startup of the system, after inputting the 'Y', the system can continue the subsequent startup, otherwise, no processing is performed.
The trusted verification module can prevent illegal tampering of system files and programs, installation of unknown programs, running of unknown programs and the like. The operating system supports the credible verification function of the application program, and the credible verification function of the application program is as follows:
step 4-1, constructing a credible reference library: the trusted reference library is constructed as follows:
1) computing a digest value hash1 of the file using a software algorithm;
2) calculating a digest value hash2 of the absolute path of the file through a software algorithm;
3) the digest values of the hash1 and the hash2 are concatenated to obtain a digest value of hash3= (hash1+ hash 2);
4) taking a hash3 as an input, calculating a digest value by using a hardware algorithm SM3 of a trusted calculation module to obtain a hash4, writing the value of the hash4 serving as a reference value of a file into an extended attribute of the file, and simultaneously writing a file name and the modification time of the file;
step 4-2, judging the credible state of the file: the process of judging the credible state of the file is as follows:
1) acquiring a modification time1 of the file;
2) acquiring a reference modification time2 of the file stored in the file extension attribute;
3) comparing the time1 with the time2, if the time1 and the time2 are equal, the file is not tampered, the file is allowed to be trusted, and if the time 8932 and the time2 are not equal, the file is possibly tampered, and the digest value of the file needs to be calculated to judge the trusted state of the file;
4) calculating the digest value hash5 of the file by the same algorithm as the construction process of the reference library;
5) reading reference value information hash4 from the extended attribute of the file;
6) comparing the values of the hash4 and the hash5, if the results are the same, the file is not tampered, the file is trusted, and the access to the file is allowed, and if the results are different, the file is tampered, the file is not trusted, and the access to the file is prevented.
The terminal device provided by the embodiment of the invention. The terminal device of this embodiment includes: a processor, a memory, and a computer program, such as a speech recognition program, stored in the memory and executable on the processor. The processor, when executing the computer program, implements the steps of the various method embodiments described above, for example as shown in fig. 1. Or, the processor implements the functions of the modules/units in the embodiments of the apparatus when executing the computer program, for example, the non-text representation extraction module is configured to recognize the connection of the input speech features, output the non-text representations corresponding to the sentences, capture the special values in the whole time sequence, and determine whether the whole sentence has obvious changes in tone and mood.
The computer program may be partitioned into one or more modules/units that are stored in the memory and executed by the processor to implement the invention.
The terminal device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The terminal device may include, but is not limited to, a processor, a memory.
The processor may be a central processing unit (cpu), other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, etc.
The memory may be used for storing the computer programs and/or modules, and the processor may implement various functions of the terminal device by executing or executing the computer programs and/or modules stored in the memory and calling data stored in the memory.
The module integrated with the terminal device may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer memory, Read-only memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for authenticating a computer, comprising the steps of:
verifying and signing the BIOS firmware, and if the verification and signing pass, continuing to start the operating system; otherwise, alarming, stopping the starting of the operating system, feeding back to the terminal, and determining whether to continue the starting of the system by the user;
carrying out credibility measurement verification on various firmware and hardware in the computer, and if the credibility measurement verification is passed, continuing to start the operating system; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
performing credibility measurement verification on the grub, and starting an operating system if the credibility measurement verification is passed; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
constructing a credible reference library;
judging the credible state of the file according to the credible reference library, and if the file is credible, allowing the access to the file; otherwise, the file is indicated to be tampered, and the access to the file is prevented.
2. The computer trusted authentication method of claim 1, wherein the specific method for verifying and signing the BIOS firmware is as follows:
when the processor is powered on and started, the BIOS firmware signature checking function is called, the BIOS firmware is checked by using a built-in public key certificate, when the BIOS firmware passes the signature checking, the abstract value of the BIOS firmware is calculated, the abstract value is expanded into the register PCR0, the control right is transferred to the BIOS, and when the BIOS firmware passes the signature checking, the transfer of the control right is terminated, and an alarm is given.
3. The computer trusted authentication method as claimed in claim 1, wherein the specific method for verifying the trust measure of grub is as follows:
before the grub transfers the control right to the kernel, calculating a configuration file grub.cfg of the grub, a kernel file vmlinux and an initial disk file initramfs to calculate abstract values;
and verifying the credible state of the credible verification object.
4. The computer trusted authentication method according to claim 3, wherein the digest value is calculated as follows:
firstly, calculating a digest value of an object to obtain a 32-bit hash value;
taking the obtained 32-bit hash value as input, and calculating the input 32-bit hash value again by using a digest algorithm to obtain a new digest value;
extending the new abstract value into the PCR as a measurement value of the object;
and writing log information of the measurement into a log storage NV, wherein the log information comprises time, a measurement object and a hash value of the measurement object.
5. The computer trusted authentication method according to claim 3, wherein the specific method for verifying the trusted status is as follows:
reading reference value information from the NV storage area;
reading corresponding abstract value information from the PCR;
comparing the reference value information with the abstract value information, and writing the comparison information into a log storage NV, wherein the log information comprises time, a trusted verification object, a reference value of the trusted verification object, a metric value of the trusted verification object and a trusted state;
if the comparison result is consistent, the trusted verification object is not tampered and is trusted, and the system is allowed to continue to be started; otherwise, the credible verification object is tampered, the verification is not credible, the system is prevented from starting, the user is prompted at the terminal, and the decision of the user is waited;
if the user inputs an instruction of continuing the system starting, continuing the subsequent starting, otherwise, not performing any treatment.
6. The computer credibility authentication method according to claim 1, wherein the specific method for constructing the credibility reference library is as follows:
calculating the digest value of the file, hash 1;
calculating the digest value hash2 of the absolute path of the file;
the digest value hash1 and the digest value hash2 are concatenated to obtain a digest value hash3, hash3= (hash1+ hash 2);
taking the digest value hash3 as input, calculating the digest value by using a hardware algorithm SM3 to obtain a digest value hash 4;
the digest value hash4 is written into the extended attribute of the file as the reference value of the file, and the file name and the modification time of the file are written at the same time.
7. The computer trusted authentication method according to claim 6, wherein the specific method for determining the trusted status of the file is as follows:
acquiring a modification time1 of the file;
acquiring a reference modification time2 of the file stored in the file extension attribute;
comparing the modification time1 with the modification time2, if the modification time1 and the modification time2 are equal, the file is not tampered, the file is allowed to be trusted, and if the modification time 8932 and the modification time are not equal, the file is possibly tampered, and the digest value of the file needs to be calculated to judge the trusted state of the file;
calculating the digest value hash5 of the file by the same algorithm as the construction process of the reference library;
reading a digest value hash4 from the extended attribute of the file;
and comparing the reference value information hash4 with the digest value hash5, if the results are the same, the file is not tampered and is trusted, and the access to the file is allowed, and if the results are different, the file is tampered and is not trusted, and the access to the file is prevented.
8. A computer trusted authentication system, comprising:
the processor verifies and signs the BIOS firmware, and if the verification and the signing pass, the operating system is continuously started; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
the trusted BIOS is used for carrying out trusted measurement verification on various firmware and hardware in the computer, and if the trusted measurement verification is passed, the operating system is continuously started; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
the trusted Grub is used for performing trusted measurement verification on the Grub, and if the trusted measurement verification is passed, the operating system is started; otherwise, alarming, stopping system starting, feeding back to the terminal, and determining whether to continue system starting by the user;
the trusted verification module is integrated in the operating system and used for judging the trusted state of the file according to the trusted reference library, and if the trusted state is trusted, the access to the file is allowed; otherwise, the file is indicated to be tampered, and the access to the file is prevented.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1-7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202110315311.7A 2021-03-24 2021-03-24 Computer credibility authentication system, method, equipment and readable storage medium Pending CN113190853A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110315311.7A CN113190853A (en) 2021-03-24 2021-03-24 Computer credibility authentication system, method, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110315311.7A CN113190853A (en) 2021-03-24 2021-03-24 Computer credibility authentication system, method, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN113190853A true CN113190853A (en) 2021-07-30

Family

ID=76973841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110315311.7A Pending CN113190853A (en) 2021-03-24 2021-03-24 Computer credibility authentication system, method, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN113190853A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113987599A (en) * 2021-12-28 2022-01-28 苏州浪潮智能科技有限公司 Method, device, equipment and readable storage medium for realizing firmware trusted root
CN114499962A (en) * 2021-12-24 2022-05-13 深圳开源互联网安全技术有限公司 File detection method and device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101038556A (en) * 2007-04-30 2007-09-19 中国科学院软件研究所 Trusted bootstrap method and system thereof
CN103927490A (en) * 2014-04-25 2014-07-16 华为技术有限公司 OS secure startup method and device
CN104036157A (en) * 2014-06-05 2014-09-10 蓝盾信息安全技术有限公司 Method based on comprehensive characteristic value for detecting tampering of file
CN107545184A (en) * 2017-08-17 2018-01-05 大唐高鸿信安(浙江)信息科技有限公司 The credible measurement system and method for cloud main frame
CN111222180A (en) * 2020-02-27 2020-06-02 山东浪潮通软信息科技有限公司 Method, system, device and medium for judging whether accounting document is tampered
US20200244461A1 (en) * 2019-01-30 2020-07-30 Alibaba Group Holding Limited Data Processing Method and Apparatus
CN111723379A (en) * 2020-06-18 2020-09-29 中国电力科学研究院有限公司 Trusted protection method, system, equipment and storage medium for trusted platform zone intelligent terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101038556A (en) * 2007-04-30 2007-09-19 中国科学院软件研究所 Trusted bootstrap method and system thereof
CN103927490A (en) * 2014-04-25 2014-07-16 华为技术有限公司 OS secure startup method and device
CN104036157A (en) * 2014-06-05 2014-09-10 蓝盾信息安全技术有限公司 Method based on comprehensive characteristic value for detecting tampering of file
CN107545184A (en) * 2017-08-17 2018-01-05 大唐高鸿信安(浙江)信息科技有限公司 The credible measurement system and method for cloud main frame
US20200244461A1 (en) * 2019-01-30 2020-07-30 Alibaba Group Holding Limited Data Processing Method and Apparatus
CN111222180A (en) * 2020-02-27 2020-06-02 山东浪潮通软信息科技有限公司 Method, system, device and medium for judging whether accounting document is tampered
CN111723379A (en) * 2020-06-18 2020-09-29 中国电力科学研究院有限公司 Trusted protection method, system, equipment and storage medium for trusted platform zone intelligent terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王江少;余综;李光;: "可信计算之信任链技术研究", 计算机工程与设计, no. 09 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499962A (en) * 2021-12-24 2022-05-13 深圳开源互联网安全技术有限公司 File detection method and device, computer equipment and storage medium
CN114499962B (en) * 2021-12-24 2023-09-08 深圳开源互联网安全技术有限公司 File detection method, device, computer equipment and storage medium
CN113987599A (en) * 2021-12-28 2022-01-28 苏州浪潮智能科技有限公司 Method, device, equipment and readable storage medium for realizing firmware trusted root

Similar Documents

Publication Publication Date Title
EP2962241B1 (en) Continuation of trust for platform boot firmware
US9292302B2 (en) Allowing bypassing of boot validation in a computer system having secure boot enabled by default only under certain circumstances
US9589139B2 (en) Method and device for altering a unified extensible firmware interface (UEFI) secure boot process in a computing device
KR101359841B1 (en) Methods and apparatus for trusted boot optimization
US8335931B2 (en) Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments
Abu-Jassar et al. Electronic user authentication key for access to HMI/SCADA via unsecured internet networks
US7380136B2 (en) Methods and apparatus for secure collection and display of user interface information in a pre-boot environment
US8087086B1 (en) Method for mitigating false positive generation in antivirus software
US8544092B2 (en) Integrity verification using a peripheral device
US7769993B2 (en) Method for ensuring boot source integrity of a computing system
TW201935234A (en) Bios flashing method and bios image file processing method
CN106687985A (en) Method for privileged mode based secure input mechanism
WO2017112137A1 (en) Verified social media content
CN113190853A (en) Computer credibility authentication system, method, equipment and readable storage medium
CN110674494B (en) Process protection method, system and data processing method
US10019577B2 (en) Hardware hardened advanced threat protection
CN107368735B (en) Application installation method, mobile terminal and computer readable storage medium
CN113448681B (en) Registration method, equipment and storage medium of virtual machine monitor public key
US11263309B2 (en) Block device signature-based integrity protection for containerized applications
CN110363011B (en) Method and apparatus for verifying security of UEFI-based BIOS
CN106778286A (en) A kind of system and method whether attacked for detection service device hardware
CN114722413B (en) Method, device, server and medium for establishing security trust chain
Abu-Jassar et al. Research Article Electronic User Authentication Key for Access to HMI/SCADA via Unsecured Internet Networks
KR20070074409A (en) Apparatus and method for system authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210730