WO2017049770A1 - 一种对bios进行审计的方法 - Google Patents

一种对bios进行审计的方法 Download PDF

Info

Publication number
WO2017049770A1
WO2017049770A1 PCT/CN2015/096565 CN2015096565W WO2017049770A1 WO 2017049770 A1 WO2017049770 A1 WO 2017049770A1 CN 2015096565 W CN2015096565 W CN 2015096565W WO 2017049770 A1 WO2017049770 A1 WO 2017049770A1
Authority
WO
WIPO (PCT)
Prior art keywords
bmc
bios
tpm module
powered
tpm
Prior art date
Application number
PCT/CN2015/096565
Other languages
English (en)
French (fr)
Inventor
王雪松
陈长发
Original Assignee
苏州中太服务器有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州中太服务器有限公司 filed Critical 苏州中太服务器有限公司
Publication of WO2017049770A1 publication Critical patent/WO2017049770A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing

Definitions

  • the present invention belongs to the technical field of server products, and more specifically, to a method for auditing a BIOS.
  • the TPM (Trusted Platform Module) module is inserted into the PCIe slot as a server peripheral.
  • the TPM module can be powered on and the audit function of the TPM module can be used only after the BIOS is started.
  • the disadvantage of the prior art is that the TPM module must be used after the BIOS is started. It is impossible to use the TPM module before the BIOS is started, and thus the BIOS cannot be audited before the BIOS is started.
  • the purpose of the present invention is to provide a method for auditing the BIOS, which aims to solve the problem that the BIOS cannot be audited before the BIOS is started because the TPM module can only be used after the BIOS is started. The problem.
  • the present invention provides a method for auditing a BIOS, comprising the following steps:
  • the BMC is powered on first, and the TPM module is powered on at the same time, and the CPU is not powered on.
  • the BMC After the BMC is booted, the BMC enables the TPM module, and after waiting for the initialization time of the TPM module, the BMC sends an audit request command to the TPM module for requesting the TPM module to audit the BIOS FW;
  • the TPM module receives the audit request instruction, audits the BIOS FW, and sends the audit result to the BMC after completing the audit;
  • the TPM module is used as a PCIe peripheral.
  • the TPM module audits the BIOS FW specifically: the TPM module checks whether the BIOS FW is illegally modified.
  • the BMC when the CPU is not powered on, the BMC performs data interaction with the TPM module, the BMC sends a request auditing instruction to the TPM, and the TPM accesses the BIOS FW through the SPI data channel.
  • the data channel between the BMC and the TPM is closed by the BMC, and the CPU and the TPM exchange data through the PCIe data channel.
  • the TPM module is powered on while the BMC is powered on, and the BIOS is audited by the TPM module before the CPU is started.
  • the present invention utilizes the characteristics that the server BMC is never powered off and preferentially powered on, the system is powered on by the BMC while the BMC is powered on, so that Use the TPM module before the BIOS starts to implement BIOS audit before the BIOS starts.
  • FIG. 1 is a schematic block diagram of a system on which a method for auditing a BIOS according to an embodiment of the present invention is based.
  • the method for auditing the BIOS is mainly applied to the technical field of the server product, and the server BMC is never powered off and the special power is preferentially powered on.
  • the system is powered by the TPM module to help The BIOS is audited before the BIOS starts.
  • the BMC is powered on first, and the TPM module is powered on at the same time.
  • the CPU is not powered on.
  • the BMC enables the TPM module while waiting.
  • the BMC issues an audit request to the TPM module, requesting the TPM module to audit the BIOS FW.
  • the audit process is the existing technology, and the TPM is to complete this function. How to audit is the working details of the TPM, and will not be described here.
  • the TPM module checks if the BIOS FW has been illegally modified. After the TPM module completes the audit, the TPM module informs the BMC of the audit result.
  • the BMC will not power on the CPU. If the audit (the audit means that the TPM module checks if the BIOS FW is illegally modified), the BMC will not power on the CPU. If the audit is passed, the BMC will first close the data channel between the BMC and the TPM module, and then power up the CPU. After the CPU is booted, the TPM module is used as a normal PCIe peripheral.
  • the BMC interacts with the TPM module.
  • the BMC sends a request audit command to the TPM, and the TPM accesses the BIOS FW through the SPI data channel.
  • the data channel between the BMC and the TPM is closed by the BMC.
  • the CPU and the TPM exchange data through the PCIe data channel.
  • the TPM module is no different from the normal PCIe peripheral.
  • the present invention is directed to the dual data channel design of the TPM module, and powering up the TPM module while the BMC is powered up, so that the TPM module can be used as a general PCIe peripheral after the CPU is powered on, and the TPM module can be used in the CPU. It can be used by the BMC before power-on to audit the BIOS before the CPU starts the BIOS.
  • the TPM module is designed with dual data channels; when the BMC is powered on, the TPM module is powered on.
  • the BIOS is audited by the TPM module before the CPU starts.
  • the BMC turns off the data channel between the BMC and the TPM module before powering on the CPU.
  • the invention utilizes the characteristics that the server BMC is never powered off and the power is preferentially powered on.
  • the system is powered on by the TPM module, so that the TPM module can be used before the BIOS is started, and the BIOS is audited before the BIOS is started.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

一种对BIOS进行审计的方法,包括下述步骤:(1)当服务器上电后,给所述BMC上电的同时给TPM模块上电,CPU未上电;(2)当BMC启动完毕后,BMC使能TPM模块,同时在等待一段TPM模块的初始化时间之后,BMC给所述TPM模块发出用于请求TPM模块对BIOS FW进行审计的审计请求指令;(3)TPM模块接收所述审计请求指令,对BIOS FW进行审计,并在完成审计后将审计结果发送给BMC;(4)当审计不通过时,BMC将不给CPU上电;当审计通过时,BMC将先关闭BMC与TPM模块之间的数据通道,再给CPU上电;(5)CPU启动后,将TPM模块作为PCIe外设使用。利用服务器BMC永不下电以及优先上电的特殊性,在BMC上电的同时系统即为TPM模块上电以帮助在BIOS启动前,对BIOS进行审计。

Description

一种对BIOS进行审计的方法 技术领域
本发明属于服务器产品技术领域,更具体地,涉及一种对BIOS进行审计的方法。
背景技术
现有技术是将TPM(Trusted Platform Module,可信赖平台模块)模块作为服务器的外设插在PCIe插槽中,只有BIOS启动后才能给TPM模块上电并使用TPM模块的审计功能。
现有技术的缺点是必须在BIOS启动后才能使用TPM模块,无法实现在BIOS启动前使用TPM模块,因而也无法在BIOS启动前实现对BIOS的审计。
发明内容
针对现有技术的缺陷,本发明的目的在于提供一种对BIOS进行审计的方法,旨在解决现有技术中由于只能在BIOS启动后使用TPM模块导致无法在BIOS启动前实现对BIOS的审计的问题。
本发明提供了一种对BIOS进行审计的方法,包括下述步骤:
(1)当服务器上电后,BMC优先上电,TPM模块也同时上电,而CPU并未上电;
(2)当BMC启动完毕后,BMC使能TPM模块,同时在等待一段TPM模块的初始化时间之后,BMC给所述TPM模块发出用于请求TPM模块对BIOS FW进行审计的审计请求指令;
(3)TPM模块接收所述审计请求指令,对BIOS FW进行审计,并在完成审计后将审计结果发送给BMC;
(4)当审计不通过时,BMC将不给CPU上电;当审计通过时,BMC 将先关闭BMC与TPM模块之间的数据通道,再给CPU上电;
(5)CPU启动后,将TPM模块作为PCIe外设使用。
更进一步地,所述TPM模块对BIOS FW进行审计具体为:TPM模块检查BIOS FW是否被非法修改。
更进一步地,当CPU未上电时,BMC与TPM模块之间进行数据交互,BMC向TPM发出请求审计指令,TPM通过SPI数据通道访问BIOS FW。
更进一步地,当CPU上电后,BMC与TPM之间的数据通道被BMC关闭,CPU与TPM之间通过PCIe数据通道进行数据交互。
更进一步地,在BMC上电的同时给TPM模块上电,在CPU启动前由TPM模块对BIOS进行审计。
通过本发明所构思的以上技术方案,与现有技术相比,由于本发明利用服务器BMC永不下电以及优先上电的特性,在BMC上电的同时系统即为TPM模块上电,从而可以在BIOS启动前使用TPM模块,在BIOS启动前实现对BIOS的审计。
附图说明
图1是本发明实施例提供的对BIOS进行审计的方法所基于的系统的原理框图。
具体实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明提供的一种对BIOS进行审计的方法主要应用于服务器产品技术领域,利用服务器BMC永不下电以及优先上电的特殊性,在BMC上电的同时系统即为TPM模块上电以帮助在BIOS启动前,对BIOS进行审计。
如图1所示,服务器上电后,BMC优先上电,TPM模块也同时上电,此时CPU并未上电。BMC启动完毕后,BMC使能TPM模块,同时在等 待一段TPM模块的初始化时间之后,BMC给TPM模块发出审计请求指令,请求TPM模块对BIOS FW进行审计。审计过程是现有技术,TPM就是完成这个功能的,具体如何审计是TPM的工作细节,在此不作赘述。简言之,就是TPM模块检查BIOS FW是否被非法修改。TPM模块完成审计后,TPM模块将审计结果告知BMC。如果审计(审计的意思就是TPM模块检查BIOS FW是否被非法修改。)不通过,BMC将不会给CPU上电。如果审计通过,BMC将首先关闭BMC与TPM模块之间的数据通道,然后再给CPU上电。CPU启动之后,将TPM模块作为一个普通的PCIe外设使用。
从数据流动的角度看,CPU未上电时,BMC与TPM模块进行数据交互,BMC向TPM发出请求审计指令,TPM通过SPI数据通道访问BIOS FW。CPU上电后,BMC与TPM之间的数据通道被BMC关闭,CPU与TPM之间通过PCIe数据通道进行数据交互,此时TPM模块与普通的PCIe外设没有区别。
本发明针对TPM模块的双数据通道设计,以及在BMC上电的同时即为TPM模块上电,使TPM模块既可以在CPU上电后作为通用的PCIe外设使用,又可以使TPM模块在CPU上电前即可被BMC使用,实现在CPU启动BIOS前对BIOS进行审计。
在本发明实施例中,TPM模块双数据通道设计;BMC上电的同时即给TPM模块上电。CPU启动前由TPM模块对BIOS进行审计。BMC给CPU上电前先关闭BMC与TPM模块之间的数据通道。
本发明利用服务器BMC永不下电以及优先上电的特性,在BMC上电的同时系统即为TPM模块上电,从而可以在BIOS启动前使用TPM模块,在BIOS启动前实现对BIOS的审计。
本领域的技术人员容易理解,以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。

Claims (5)

  1. 一种对BIOS进行审计的方法,其特征在于,包括下述步骤:
    (1)当服务器上电后,给所述BMC上电的同时给TPM模块上电,CPU未上电;
    (2)当BMC启动完毕后,BMC使能TPM模块,同时在等待一段TPM模块的初始化时间之后,BMC给所述TPM模块发出用于请求TPM模块对BIOS FW进行审计的审计请求指令;
    (3)TPM模块接收所述审计请求指令,对BIOS FW进行审计,并在完成审计后将审计结果发送给BMC;
    (4)当审计不通过时,BMC将不给CPU上电;当审计通过时,BMC将先关闭BMC与TPM模块之间的数据通道,再给CPU上电;
    (5)CPU启动后,将TPM模块作为PCIe外设使用。
  2. 如权利要求1所述的方法,其特征在于,所述TPM模块对BIOS FW进行审计具体为:TPM模块检查BIOS FW是否被非法修改。
  3. 如权利要求1所述的方法,其特征在于,当CPU未上电时,BMC与TPM模块之间进行数据交互,BMC向TPM发出请求审计指令,TPM通过SPI数据通道访问BIOS FW。
  4. 如权利要求1所述的方法,其特征在于,当CPU上电后,BMC与TPM之间的数据通道被BMC关闭,CPU与TPM之间通过PCIe数据通道进行数据交互。
  5. 如权利要求1-4任一项所述的方法,其特征在于,在BMC上电的同时给TPM模块上电,在CPU启动前由TPM模块对BIOS进行审计。
PCT/CN2015/096565 2015-09-21 2015-12-07 一种对bios进行审计的方法 WO2017049770A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510603651.4A CN105159808B (zh) 2015-09-21 2015-09-21 一种对bios进行审计的方法
CN201510603651.4 2015-09-21

Publications (1)

Publication Number Publication Date
WO2017049770A1 true WO2017049770A1 (zh) 2017-03-30

Family

ID=54800670

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/096565 WO2017049770A1 (zh) 2015-09-21 2015-12-07 一种对bios进行审计的方法

Country Status (2)

Country Link
CN (1) CN105159808B (zh)
WO (1) WO2017049770A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106484578A (zh) * 2016-10-14 2017-03-08 苏州国芯科技有限公司 一种基于可信计算机硬件的校验系统
CN106874771A (zh) * 2017-02-16 2017-06-20 浪潮(北京)电子信息产业有限公司 一种构建可信硬件信任链的方法以及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281577A (zh) * 2008-05-16 2008-10-08 北京工业大学 一种对bios进行保护的可信计算系统及其应用方法
CN101295340A (zh) * 2008-06-20 2008-10-29 北京工业大学 一种可信平台模块及其主动度量方法
US20110280402A1 (en) * 2006-11-30 2011-11-17 Ibrahim Wael M Methods and systems for utilizing cryptographic functions of a cryptographic co-processor
CN103488498A (zh) * 2013-09-03 2014-01-01 华为技术有限公司 一种计算机启动方法及计算机

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401208B2 (en) * 1998-07-17 2002-06-04 Intel Corporation Method for BIOS authentication prior to BIOS execution
US7200758B2 (en) * 2002-10-09 2007-04-03 Intel Corporation Encapsulation of a TCPA trusted platform module functionality within a server management coprocessor subsystem
CN102663301B (zh) * 2012-04-13 2014-10-29 北京国基科技股份有限公司 一种可信计算机及可信性检测方法
CN104410636A (zh) * 2014-12-01 2015-03-11 浪潮集团有限公司 一种云计算系统中增强bmc/smc安全性的方法
CN104580483A (zh) * 2015-01-19 2015-04-29 浪潮电子信息产业股份有限公司 一种基于tpm2.0芯片的可信移动模块实现方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110280402A1 (en) * 2006-11-30 2011-11-17 Ibrahim Wael M Methods and systems for utilizing cryptographic functions of a cryptographic co-processor
CN101281577A (zh) * 2008-05-16 2008-10-08 北京工业大学 一种对bios进行保护的可信计算系统及其应用方法
CN101295340A (zh) * 2008-06-20 2008-10-29 北京工业大学 一种可信平台模块及其主动度量方法
CN103488498A (zh) * 2013-09-03 2014-01-01 华为技术有限公司 一种计算机启动方法及计算机

Also Published As

Publication number Publication date
CN105159808A (zh) 2015-12-16
CN105159808B (zh) 2019-02-19

Similar Documents

Publication Publication Date Title
US10019601B2 (en) Method and apparatus for securely saving and restoring the state of a computing platform
US10216937B2 (en) Secure BIOS password method in server computer
US20170364689A1 (en) Technologies for securely binding a platform manifest to a platform
US20080163383A1 (en) Methods and apparatus for authenticating components of processing systems
US20150178226A1 (en) Using authenticated manifests to enable external certification of multi-processor platforms
WO2017133559A1 (zh) 安全启动方法及装置
US20080159541A1 (en) Methods and apparatus for protecting data
US20190045358A1 (en) System and Method for Control of Baseboard Management Controller Ports
US11269984B2 (en) Method and apparatus for securing user operation of and access to a computer system
US20100082955A1 (en) Verification of chipset firmware updates
US9053305B2 (en) System and method for generating one-time password for information handling resource
US20190332421A1 (en) Secure delivery and deployment of a virtual environment
US10255438B2 (en) Operating system agnostic validation of firmware images
KR20150034196A (ko) 하드웨어 강제 액세스 보호
US20200019708A1 (en) Remote access controller in-band access system
US10366025B2 (en) Systems and methods for dual-ported cryptoprocessor for host system and management controller shared cryptoprocessor resources
EP3758326B1 (en) Secure updating of computing system firmware
CN104408364A (zh) 一种服务器管理程序保护方法及系统
WO2017049770A1 (zh) 一种对bios进行审计的方法
WO2009069321A1 (ja) セキュリティ管理プログラム、セキュリティ管理方法および携帯端末装置
US10148444B2 (en) Systems and methods for storing administrator secrets in management controller-owned cryptoprocessor
US9069937B2 (en) Converting traditional computer product licenses into cloud-based entitlements
US20230008885A1 (en) Systems and methods for importing security credentials for use by an information handling system
WO2019205590A1 (zh) 电池认证方法、设备电池、无人机及存储介质
WO2015007184A1 (zh) 多应用智能卡及智能卡多应用管理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15904645

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 20.08.2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15904645

Country of ref document: EP

Kind code of ref document: A1