BMC U-boot trusted starting control method

A boot control and trusted technology, applied in the field of BMCU-boot trusted boot control, can solve problems such as program tampering and integrity damage, and achieve the effect of improving core competitiveness, strong practicability, and easy promotion

Inactive Publication Date: 2017-02-08
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, the present invention proposes a method that can effectively solve the problem that U-boot may be tampered with and integr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • BMC U-boot trusted starting control method
  • BMC U-boot trusted starting control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0024] as attached figure 1 Shown, the present invention proposes that the present invention proposes a kind of method that realizes BMC U-boot credible start-up control, has adopted domestic SM3, SM4 cryptographic algorithm, in U-boot start guide system process, to Linux kernel mirror image, file system mirror image and The device tree image is used to measure and judge the trusted state to ensure the integrity of the program, and finally establish a trusted execution environment for the BMC system platform.

[0025] In this method step, my country's commercial cryptographic algorithms SM3 and SM4 are used, SM3 is a cryptographic hash algorithm, and SM4 is a symmetric cryptographic algorithm, and the combination of the two algorithms can ensure the security of the system;

[0026] During the startup process of BMC U-boot, the trusted function...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a BMC U-boot trusted starting control method; the method comprises the following steps: using SM3 and SM4 cipher algorithms (SM3 refers to a cipher hash algorithm, SM4 refers to a symmetry cipher algorithm) to determine measure and trusted states of a Linux core mirror image, a file system mirror image and an equipment tree mirror image in a U-boot starting guide system process, i.e., comparing a measure value with a reference value; starting an operating system if the measure value-reference value contrast passes, thus allowing the BMC to enter a trusted environment; stop guiding the operating system if the measure value-reference value is not consistent, allowing a BMC administrator to process, thus finally building up a BMC system platform trusted execution environment. Compared with the prior art, the BMC U-boot trusted starting control method can ensure the system integrity and no malicious code is implanted, thus ensuring the trusted BMC system platform execution environment, and helping domestic BMC chip core competitiveness; the BMC U-boot trusted starting control method is strong in practical value, wide in application scope, and easy to promote.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a method for realizing BMC U-boot trusted startup control with strong practicability. Background technique [0002] BMC is the abbreviation of Baseboard Management Controller, which has been widely used in the server field. Use the virtual keyboard, interface, mouse, power supply, etc. to provide remote management functions for the server. Users use the BMC to monitor the physical characteristics of the server, such as the temperature, voltage, fan working status, power supply, and chassis intrusion of each component. With the development of my country's information technology and the improvement of chip manufacturing technology, my country has the ability to develop and manufacture domestic BMC chips. Although the domestic BMC chip has been localized and independently controllable, it cannot guarantee safety and reliability during the startup process. U-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/575
Inventor 苏振宇
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products