Firmware security starting method and device, computing equipment and readable storage medium

A computing device and secure boot technology, applied in the computer field, can solve problems such as untrustworthy, untrustworthy application programs and upper-layer security mechanisms, and achieve the effect of improving security

Active Publication Date: 2022-05-13
PHYTIUM TECH CO LTD
View PDF29 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The premise of ensuring information security is that the information system itself is safe. If the system itself is tampered with by a malicious program at startup, the system will enter an untrustworthy state, resulting in the inability of the application program and the upper layer security mechanism based on this system. Faithful

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firmware security starting method and device, computing equipment and readable storage medium
  • Firmware security starting method and device, computing equipment and readable storage medium
  • Firmware security starting method and device, computing equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. In the description of the present application, the terms "first", "second" and the like are only used for distinguishing descriptions, and cannot be understood as indicating or implying relative importance.

[0046] In order to clearly describe the solution of this embodiment, the nouns involved are defined as follows:

[0047] UEFI: Unified Extensible Firmware Interface, Unified Extensible Firmware Interface.

[0048] TEE: Trusted Execution Environment, trusted execution environment, TEE is based on trustzone technology to build a trusted program operating environment isolated from the non-secure world.

[0049] OP-TEE: Open Portable TEE, Open Portable Trusted Execution Environment, OP-TEE is an open source project that completely implements a trusted execution software and hardware environment, in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a firmware security starting method and device, computing equipment and a readable storage medium, the method is applied to the computing equipment, and the computing equipment carries a common execution environment and a trusted execution environment; uEFI firmware runs in the common execution environment, at least one first calling interface is arranged in the common execution environment, and at least one second calling interface is arranged in the trusted execution environment; the method comprises the steps that when verification request information of a mirror image file is received, the verification request information of the mirror image file is transmitted to a second calling interface through a first calling interface, the verification request information is received through at least one second calling interface, the mirror image file is verified, and a verification result is obtained; and returning the verification result to the first calling interface through the second calling interface so as to execute the starting process of the UEFI firmware. According to the method and the device, the verification of the mirror image file in the trusted execution environment is realized, and the security of UEFI startup is improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular, to a firmware secure startup method, device, computing device and readable storage medium. Background technique [0002] UEFI (Unified Extensible Firmware Interface, Unified Extensible Firmware Interface) From a specification point of view, it is a specification that defines the interface specification between the computer operating system and platform firmware. From a physical point of view, BIOS (Basic Input Output System) and UEFI are two different types of computer firmware. Computer firmware is solidified in a non-volatile storage area (EEPROM) on the computer motherboard. For a small system, the computer starts it first, and then loads the real operating system. [0003] After the computer starts up and enters the configuration interface, what you can see intuitively is the UI interface of the UEFI firmware. You can configure the configurable items of this fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/572G06F21/575
Inventor 贾玲刘勇鹏舒奕棋张博锋邓强谢鹏
Owner PHYTIUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products