OS secure startup method and device

An operating system and secure boot technology, which is applied in the computer field and can solve problems such as the inability to guarantee the security of the boot program.

Inactive Publication Date: 2014-07-16
HUAWEI TECH CO LTD
View PDF4 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for safely starting an operating system to overcome the inability to guarantee the safety of the boot program after BootLoader in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • OS secure startup method and device
  • OS secure startup method and device
  • OS secure startup method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0036] figure 1 It is a flow chart of Embodiment 1 of the method for securely starting an operating system in the present invention. Figure 1A It is a schematic diagram of the execution process of Embodiment 1 of the secure boot method for the operating system of the present invention. The execution subject of this embodiment is the device for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an OS secure startup method and device. The method includes the steps that signature verification is conducted on the UEFI BIOS, and signature verification is conducted on guidance programs of an OS if the UEFI BIOS passes the signature verification; the guidance programs, passing the signature verification, of the OS are measured through a secure hash algorithm, and the obtained measurement result serves as a trust root; the trust root serves as an initial value, and multiple configuration files of the OS are sequentially measured; the obtained final measurement result is compared with an expected secure value, and whether the OS is safely started or not is verified. By means of the OS secure startup method and device, security is verified through the method that the guidance programs of the OS pass the digital signature verification, the guidance programs, measured to be secure, of the OS generate the trust root, the OS is measured level by level according to the trust root, a trusted chain extends to the OS from the BIOS, and the problem that in the prior art, security of programs started after the Boot Loader can not be ensured is solved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular, to a method and device for safely starting an operating system. Background technique [0002] In today's information age, protecting information security and providing a reliable computing environment has become an inevitable requirement of informatization. With the rapid evolution of malicious software, malicious software is taking Basic Input Output System (BIOS for short) as the preferred attack target. It is difficult to defend against viruses that attack the underlying firmware and startup programs. Therefore, protecting the computer startup process Credibility and security are particularly important. [0003] The BIOS is solidified in a Read-Only Memory (ROM) chip on the computer motherboard, which stores the most important basic input and output programs, power-on self-test programs, system self-start programs, and menu programs of the comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/44
CPCG06F21/575G06F21/44
Inventor 杨青蒋小安施迅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products