A Trusted Booting Method of Operating System Based on Real Mode Technology

An operating system and real-mode technology, applied in the field of guidance, can solve problems such as inability to actively defend, actively defend, and insecure information systems, and achieve the effect of strengthening integrity verification and protection, eliminating attack methods, and ensuring integrity

Active Publication Date: 2018-08-14
STATE GRID CORP OF CHINA +3
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The root cause of the insecurity of the information system is due to the simplification of the PC structure and the lack of verification of the processes and programs in the system, resulting in the arbitrary execution of executable programs and processes without authorization and the implementation of malicious behaviors, while traditional firewalls, anti-viruses, IDS are mainly based on peripheral blocking and post-upgrade virus code base, and cannot actively defend and actively defend

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trusted Booting Method of Operating System Based on Real Mode Technology
  • A Trusted Booting Method of Operating System Based on Real Mode Technology
  • A Trusted Booting Method of Operating System Based on Real Mode Technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings.

[0038] combine figure 1 and figure 2 As shown, a method for trusted booting of an operating system based on real mode technology, the method includes: (1) obtaining trusted boot program information for verification, and performing trusted measurements for different stages;

[0039] Among them, such as image 3 As shown, the real mode workflow includes: Since the original hardware driver and dynamic library of the PC-AT compatible computer system need the support of the operating system and cannot be called before the operating system is loaded, it is necessary to implement the real mode driver, which is the measurement of the GRUB stage Provide a call interface, take the same 16-bit segment and offset as 8086 for addressing, the maximum addressing space is 1MB, the maximum segment is 64KB, and 32-bit instructions can be used.

[0040] Such as Figure 4 As shown, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an operation system trusted guide method based on a real mode technology. The method includes the steps that trusted guide program information required to be verified is obtained, and trusted measurement is conducted on different stages; the expected value of the verified content is obtained through a trusted chip, and Hash operation is conducted on the verified content through an international algorithm SM3; whether the measured value obtained through calculation and the expected value are the same or not is judged through comparison; the MBR, the Stage 1.5, the Stage 2, the MCF, the operation system nucleus and other key data are protected against illegal alteration.

Description

technical field [0001] The invention relates to a booting method, in particular to an operating system trusted booting method based on real mode technology. Background technique [0002] The root cause of the insecurity of the information system is due to the simplification of the PC structure and the lack of verification of the processes and programs in the system, resulting in the arbitrary execution of executable programs and processes without authorization and the implementation of malicious behaviors, while traditional firewalls, anti-viruses, IDS are all based on peripheral blocking and post-event upgrade of the virus code base, and cannot actively defend and actively defend. Trusted computing structurally solves the vulnerability problem brought about by the simplification of the personal computer architecture by introducing a trusted chip on the hardware. Based on the hardware chip, a complete chain of trust is built from the power-on of the platform to the execution...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
Inventor 赵保华张浩王志皓施贵荣杨博龙宋磊阎博李新鹏李烜邢金
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products