Trusted starting method and device, electronic equipment and readable storage medium
A startup device and reliable technology, applied in the direction of safety communication device, program control device, computer security device, etc., can solve the problem of not satisfying the reliability of equipment safety and so on
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0084] See figure 1 , figure 1 A flow chart of a trusted startup method provided in an embodiment of this application includes the following steps:
[0085] S101: Extract the first key from IE FUSE;
[0086] Among them, IE FUSE supports only one data write. The first key is generated based on the IE startup parameters stored in the original IE FW. IE FW supports multiple data writes. IE FUSE and IE FW are different on the same Flash. Data storage block.
[0087] Since IE FUSE supports only one data write, the first key cannot be changed after it is written into IE FUSE. This application uses this specific second key in IE FW that stores IE startup parameters. Perform consistency comparison to determine whether the data stored in the IE FW has been tampered with.
[0088] S102: Extract the first signature from the IE FW, and generate a second key according to the first signature;
[0089] Wherein, the second key is generated based on the IE startup parameters stored in the current IE F...
Embodiment 2
[0101] The foregoing embodiment provides a solution for verifying whether the current IE startup parameters are trustworthy. According to the description of the application of IE in the background technology of this application, it can be seen that IE is a simplified BMC, which is integrated with BIOS in a Flash, based on the characteristics of IE, In the complete startup process of the device, IE will start before the BIOS, that is, after the IE startup is completed, the control will be transferred to the BIOS, and the BIOS will control the startup of the operating system. Therefore, although the BIOS startup parameters are unlikely to be tampered with when the IE startup parameters are trusted, in order to consider the possibility and precedent, this embodiment also adds the BIOS startup parameters to the first embodiment. Reliable verification of startup parameters to ensure as much as possible that this startup is safe and reliable.
[0102] See image 3 , image 3 The flowch...
Embodiment 3
[0112] This embodiment respectively passes as Figure 4 Show the flowchart and as Figure 5 The flow chart shown provides two different ways to verify whether the current BIOS startup parameters are trustworthy. They are distinguished by how the BIOS startup parameters are stored in the Flash, which will be introduced separately as follows:
[0113] See Figure 4 , Figure 4 The flowchart of a method for verifying whether the current BIOS startup parameters are credible among the trusted startup methods provided in the embodiments of this application includes the following steps:
[0114] S301: Extract the third key from IE FUSE;
[0115] Among them, the third key is generated based on the BIOS startup parameters stored in the initial BIOS startup parameter storage block, and the BIOS startup parameter storage block supports multiple data writes.
[0116] S302: Extract the second signature from the BIOS startup parameter storage block, and generate a fourth key according to the second ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com