Method and system for controlling trusted root in BIOS

A root of trust and trustworthy technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of not verifying the identity of the root of trust, threatening the data security of computer platforms, etc., and achieve the effect of protecting security

Active Publication Date: 2019-12-06
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At this stage, the BIOS only completes the initialization operation of the root of trust, and does not verify the identity of the root of trust. Once the root of trust in the computer platform is replaced by an uncontrolled

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling trusted root in BIOS
  • Method and system for controlling trusted root in BIOS
  • Method and system for controlling trusted root in BIOS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to clearly illustrate the technical features of the present solution, the present invention will be described in detail below through specific implementation methods and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate a relationship between the various embodiments and / or arrangements discussed. It should be noted that components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted herein to avoid unnecessarily lim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention disclose a method and a system for controlling a trusted root in a BIOS, the method comprises certificate initialization and certificate verification, the certificateinitialization comprises the steps of generating a hardware platform certificate of the trusted root and importing the hardware platform certificate into the trusted root, and the hardware platform certificate comprises an information main body and a signature value. The method comprises the following steps: initializing a trusted root by a BIOS; and verifying that the information main body in thehardware platform certificate is valid, indicating that the hardware platform certificate is matched with the trusted root, ensuring that the hardware platform certificate is valid, verifying that the signature in the hardware platform certificate is valid, indicating that the hardware platform certificate is matched with the manufacturer public key solidified in the BIOS, and ensuring that the hardware platform certificate is legal. According to the invention, the BIOS verifies the identity of the trusted root after initializing the trusted root, and judges whether to provide a trusted rootfunction for a subsequent running program or not according to the verification result so as to protect the security of upper-layer application data of a computer.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a method and system for controlling trusted roots in BIOS. Background technique [0002] Cryptographic security modules involve national information security, so countries have different requirements and restrictions on cryptographic security modules, and even only specific cryptographic security modules are allowed to be used in some important areas. The root of trust is a security component in the computer field, which can provide cryptographic functions for the computer system and protect information such as data in the computer platform. [0003] BIOS is the first program executed after the computer is powered on. It is responsible for the initialization operations of various hardware (such as graphics cards, sound cards, etc.), such as device detection, memory mapping, and other operations. The root of trust has a unified specification to constrain eac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/64G06F21/44H04L9/08H04L9/32
CPCG06F21/44G06F21/572G06F21/64H04L9/0816H04L9/3263
Inventor 许鑫
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products