Safe starting method based on X86 architecture
A secure boot and architecture technology, applied in the field of data security, can solve the problems that the validity of the kernel and initramfs cannot be guaranteed, it is not applicable to PC or server, and it is not applicable to the X86 platform, so as to prevent others from tampering with the kernel and initramfs without authorization
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0020] In order to have a further understanding of the technical solution and beneficial effects of the present invention, the technical solution of the present invention and its beneficial effects will be described in detail below.
[0021] The general idea of the present invention is to increase the trusted root certificate generated by itself for the server, and use the root certificate to regenerate the kernel and initramfs, import the trusted root certificate into the machine, and open the SecureBoot function.
[0022] After enabling SecureBoot, the verification process is as follows:
[0023] (1) The firmware verifies the bootloader (shim-signed) in the first stage, and the verified key is stored in the DB.
[0024] (2) The first-stage bootloader (shim-signed) verifies the second-stage bootloader (grub2-efi-x64).
[0025] (3) The bootloader (grub2-efi-x64) of the second stage calls the shim interface to verify the signature of the kernel.
[0026] (4) Kernel verifica...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com