Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for realizing safe and trusted authentication through bios and kernel

A core and trusted technology, applied in the direction of computer security devices, instruments, platform integrity maintenance, etc., can solve the problems of lack of security management mechanism, lack of upper-level operating system protection, etc.

Active Publication Date: 2017-12-15
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical application, this method has some defects, including the lack of flexible security management mechanism and the lack of protection of the upper operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing safe and trusted authentication through bios and kernel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0017] As shown in the attached figure, the specific operation steps are as follows:

[0018] 1. Add the DXE driver to the UEFI BIOS source code, compile the BIOS source code to generate an executable ROM file.

[0019] 2. Update the newly compiled BIOS file to the system Firmware.

[0020] 3. Add the code to authenticate the BIOS signature in the Linux kernel, and update the operating system kernel.

[0021] 4. Start the system and enter the operating system.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for achieving safe and trusted authentication through BIOS and a kernel. The method comprises the steps of: adding a private key for decrypting the signature of an operating system kernel into NVSTORAGE area of the BIOS, adding a virtual device driver into UEFIBIOS, loading the virtual device driver into a UEFI operating environment in the initial stage of a DXE period, subsequently asymmetrically encrypting the signature of the BIOS by using the DXE driver, storing the encrypted result into a pre-defined reserved memory area, loading the operating system kernel file into an internal memory after self-check of the BIOS is completed, obtaining the encrypted signature of the kernel code through searching iconic characters, visiting NVSTORAGE by UEFIBIOS to read the private key stored therein, decrypting the system signature by the private key, if the decrypted signature is trusted, the BISO jumping to the kernel core to turning over right of control to the operating system, otherwise, prompting that the operating system of the user is not authenticated, and prompting the user whether to continue the operation.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to a method for realizing safe and credible authentication through BIOS and kernel. Background technique [0002] The development of information security technology is not only based on the security mechanism at the operating system level, but also further extended to the firmware layer. The firmware BIOS is at the bottom of the computer system. If the BIOS is attacked and modified by malicious code, it will cause the computer system to completely collapse, or cause the computer system to be controlled by malicious people from the bottom. In order to solve the security problem faced by the BIOS system, the industry has proposed the concept of trusted computing. The new version of the UEFI standard adds definitions of services such as trusted boot, digital signature, and digital digest. These definitions conform to the trusted platform specification developed by the Tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/62
CPCG06F21/575G06F21/62
Inventor 赵瑞东李萌刘毅枫耿士华鄢建龙
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD