Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted Boot Method of Operating System Based on Reverse Integrity Verification

An integrity verification and operating system technology, applied in the field of trusted booting of the operating system, can solve problems such as limiting the application range of trusted computing technology, and achieve the goals of ensuring integrity, improving application range, good flexibility and ease of use Effect

Active Publication Date: 2011-12-07
KYLIN CORP
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are not many computing devices equipped with TPM chips at present, which limits the application range of trusted computing technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted Boot Method of Operating System Based on Reverse Integrity Verification
  • Trusted Boot Method of Operating System Based on Reverse Integrity Verification
  • Trusted Boot Method of Operating System Based on Reverse Integrity Verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0044] Such as figure 1 As shown, the operating system trusted boot method based on reverse integrity verification of the present invention is realized through the cooperation of the operating system kernel, BIOS (firmware), and USBKey (USB smart card). The operating system kernel is the basic environment for the software system to run, and completes the driver loading of the system hardware and the construction of the system execution environment. In the process of system booting, the operating system kernel includes Stage 1, Stage 1.5, Stage 2 of system booting and the kernel modules loaded later. The BIOS covers the firmware layer of the system platform hardware information, realizes the initial stage of system booting, and completes the functional operation from powering on the hardware to the start of the operating system bootin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for performing trusted boot on an operation system based on re verse integrity verification. The method comprises two steps of performing pre-measurement, namely, performing conventional boot by the operation system until the operation system starts to receive user input, and loading a pre-measurement program of the system, reading information of all system boot stages sequentially and performing first trusted measurement respectively by a system pre-measurement program and writing a result serving a trusted boot measurement value into a storage unit; and performing reverse integrity verification, namely, booting again by the operation system until the operation system starts to receive user input, and loading a reverse integrity verification module and the storage unit, reading trusted boot measurement values of all system boot stages by the reverse integrity verification module, reading information of all system boot stages sequentially and performing second trusted measurement, comparing the result and the trusted measurement values, and if the result is not equal to the trusted boot measurement values, setting the state of the system to be not trusted; and if the result is equal to the trusted boot measurement values, entering the next stage until the measurement is finished, and setting the operation system to be trusted. The method has the advantages of flexibility and usability.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a trusted guiding method for an operating system. Background technique [0002] With the increasingly prominent security issues in computer systems, especially end systems, computer systems in network environments are facing a serious crisis of trust. The main causes of security problems in information systems are: there are design loopholes in the software and hardware structure of the host; there is no strict authentication and authorization control for legitimate users, resulting in the abuse of resources; malicious programs use system weaknesses to destroy and so on. To completely solve these problems, in the final analysis, it is necessary to solve the security problems of the end system from the system structure and establish a trusted computing environment for the system. Trusted Computing Platform technology is born from this. The Trusted Computing Platform ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F9/445G06F21/51
Inventor 黄辰林吴庆波戴华东何连跃唐晓东王蕾孔金珠付松龄
Owner KYLIN CORP