A Trusted Boot Method Based on Joint Full Disk Encryption of Firmware and USBKey

A full-disk encryption and firmware technology, applied in computer security devices, internal/peripheral computer component protection, instruments, etc., can solve problems that do not involve the joint full-disk encryption method, reduce the cost of the whole machine, protect user data, and prevent being hacked The effect of stealing

Active Publication Date: 2020-09-04
KYLIN CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this invention can improve the security of kernel startup to a certain extent, it does not involve the joint full-disk encryption method based on firmware and USBkey equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trusted Boot Method Based on Joint Full Disk Encryption of Firmware and USBKey
  • A Trusted Boot Method Based on Joint Full Disk Encryption of Firmware and USBKey

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] The implementation of the present application will be described in detail below in conjunction with the accompanying drawings and embodiments, so as to fully understand and implement the implementation process of how the application uses technical means to solve technical problems and achieve technical effects.

[0089] A trusted boot method based on the joint full disk encryption of firmware and USBkey includes the following steps: firmware preparation, boot partition preparation, installation preparation, and boot trusted boot. Among them, the power-on credible startup includes two processes: the first-time credible startup and the non-first-time startup credible startup.

[0090] (1) Firmware preparation: Save a public key provided in advance in the firmware to decrypt the files in the boot partition; the firmware also needs to save its own private key to respond to the private key encryption request of the system; in addition, the firmware has an MD5 value Calculation fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted boot method for joint full disk encryption on the basis of firmware and a USB (Universal Serial Bus) key. The method mainly comprises the following steps of firmwarepreparation, boot partitioning preparation, loading preparation and startup trusted boot, wherein the step of startup trusted boot comprises first-time startup trusted boot and non-first-time startuptrusted boot; the first-time startup trusted boot and non-first-time startup trusted boot are both divided into three stages that: the firmware verifies a boot partition, the boot partition verifies the firmware, and the boot partition verifies a disk. The method has the beneficial effects that a hard disk can not be started under an untrusted situation, the safety of data in the hard disk is guaranteed, a secret key is stored in the firmware, the use of other firmware can be avoided, complete machine cost is lowered, and the full disk encryption is added for protecting user data during shutdown.

Description

Technical field [0001] This application belongs to the field of trusted boot technology, and specifically relates to a trusted boot method based on joint full disk encryption of firmware and USBkey. Background technique [0002] With the popularity of personal PCs and people's attention to information security, protecting the security of computers and personal data has become a crucial issue. In terms of protecting computer security, trusted boot has become one of the important technical means. Trusted boot is the use of a chip with trusted computing functions to realize hardware identification and trustworthiness detection during the boot phase, which improves computer security. [0003] 1. Trusted boot [0004] Internationally, the Trusted Computing Organization put forward the concepts of "trusted chain" and "trusted measurement", and believes that if an information system starts from an initial "root of trust", it will pass every time the control of the platform is converted. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/78G06F21/60
CPCG06F21/602G06F21/78
Inventor 李艳厚史晶张超郭俊余孔金珠张冬松魏立峰
Owner KYLIN CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products