Trusted Boot Method of Operating System Based on Reverse Integrity Verification
An integrity verification and operating system technology, applied in the field of trusted booting of the operating system, can solve problems such as limiting the application range of trusted computing technology, and achieve the goals of ensuring integrity, improving application range, good flexibility and ease of use Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.
[0044] Such as figure 1 As shown, the operating system trusted boot method based on reverse integrity verification of the present invention is realized through the cooperation of the operating system kernel, BIOS (firmware), and USBKey (USB smart card). The operating system kernel is the basic environment for the software system to run, and completes the driver loading of the system hardware and the construction of the system execution environment. In the process of system booting, the operating system kernel includes Stage 1, Stage 1.5, Stage 2 of system booting and the kernel modules loaded later. The BIOS covers the firmware layer of the system platform hardware information, realizes the initial stage of system booting, and completes the functional operation from powering on the hardware to the start of the operating system bootin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 