CN-121997331-A - Safe starting method and related equipment
Abstract
The secure boot method comprises the steps of responding to detection of a preset secure boot condition, adopting a national root certificate preset in a processor to conduct trusted measurement on an intermediate root certificate, storing the intermediate root certificate in an external storage space of the processor, conducting trusted measurement on an intermediate application certificate through the intermediate root certificate when the trusted measurement on the intermediate root certificate passes, storing the intermediate application certificate in the external storage space of the processor, conducting trusted measurement on a user certificate through the intermediate application certificate when the trusted measurement on the intermediate application certificate passes, storing the user certificate in the external storage space of the processor, conducting trusted measurement on a basic input output system through the user certificate when the trusted measurement on the user certificate passes, and operating the basic input output system when the trusted measurement on the basic input output system passes. The technical scheme of the invention is beneficial to improving the reliability, the public trust and the authority of trust chain verification.
Inventors
- YING ZHIWEI
- CHEN SHAN
Assignees
- 海光云芯集成电路设计(上海)有限公司
Dates
- Publication Date
- 20260508
- Application Date
- 20251224
Claims (19)
- 1. A secure boot method, applied to a processor, comprising: In response to detecting a preset safe starting condition, adopting a national root certificate preset in the processor to perform trusted measurement on an intermediate certificate, wherein the intermediate certificate is stored in an external storage space of the processor; when the trusted measurement of the intermediate certificate passes, adopting the intermediate certificate to perform the trusted measurement of the user certificate, wherein the user certificate is stored in an external storage space of the processor; When the credibility measurement of the user certificate passes, adopting the user certificate to perform credibility measurement on a basic input and output system; And when the credibility measurement of the basic input output system passes, operating the basic input output system.
- 2. The secure launch method of claim 1, wherein said intermediate certificate comprises an intermediate root certificate; the adoption of the national root certificate preset in the processor for carrying out the trusted measurement on the intermediate certificate comprises the adoption of the national root certificate for carrying out the trusted measurement on the intermediate root certificate; The adoption of the intermediate certificate to perform the trusted measurement on the user certificate comprises the adoption of the intermediate root certificate to perform the trusted measurement on the user certificate.
- 3. The secure launch method of claim 2, wherein said intermediate certificate further comprises an intermediate application certificate; when the trusted measurement of the intermediate root certificate passes, the method further comprises the steps of adopting the intermediate root certificate to perform the trusted measurement on the intermediate application certificate; When the trusted measurement of the intermediate application certificate passes, the adoption of the intermediate certificate to perform the trusted measurement on the user certificate comprises the adoption of the intermediate application certificate to perform the trusted measurement on the user certificate.
- 4. The secure launch method according to claim 1, wherein said user certificate comprises user identification information, said processor being further preset with user identification information; When the intermediate certificate is adopted to carry out the trusted measurement on the user certificate, and before the user certificate is adopted to carry out the trusted measurement on the basic input and output system, the method further comprises the steps of obtaining user identification information in the user certificate, comparing the user identification information in the user certificate with user identification information preset in the processor, and when the user identification information in the user certificate is determined to be consistent with the trusted user identification information preset in the processor, carrying out the trusted measurement on the user certificate.
- 5. The secure launch method according to claim 1, wherein said user certificate comprises public key version number information, said processor being further preset with public key version number information of said user certificate; When the intermediate certificate is adopted to carry out the trusted measurement on the user certificate, and before the user certificate is adopted to carry out the trusted measurement on the basic input and output system, the method further comprises the steps of obtaining public key version number information in the user certificate, comparing the public key version number information in the user certificate with public key version number information of the user certificate preset in the processor, and when the public key version number in the user certificate is determined to be larger than or equal to the public key version number of the user certificate preset in the processor, carrying out the trusted measurement on the user certificate.
- 6. The secure launch method according to claim 5, wherein when said user certificate is disabled and prohibited from use, further comprising: and upgrading the public key version number of the user certificate preset in the processor so that the public key version number of the user certificate preset in the processor is larger than the public key version number in the user certificate.
- 7. The method of claim 1 to 6, further comprising, before running the bios: adopting a preset manufacturer root certificate in the processor to perform credibility measurement on a manufacturer application certificate, wherein the manufacturer application certificate is stored in an external storage space of the processor; when the trusted measurement of the manufacturer application certificate passes, adopting the manufacturer application certificate to perform the trusted measurement on a manufacturer user certificate, wherein the manufacturer user certificate is stored in an external storage space of the processor, and comprises the user certificate or further comprises the intermediate certificate; The basic input output system is operated when a trusted measure of the manufacturer's credentials passes.
- 8. The secure launch method of claim 1 wherein said preset secure launch condition comprises said processor powering up.
- 9. The secure launch method of claim 1, wherein the country root certificate is stored in one-time programmable memory within the processor.
- 10. A secure launch device for use with a processor, comprising: The first trusted measurement module is used for responding to detection of a preset safe starting condition and adopting a national root certificate preset in the processor to perform trusted measurement on an intermediate certificate, wherein the intermediate certificate is stored in an external storage space of the processor; The second trusted measurement module is used for carrying out trusted measurement on the user certificate by adopting the intermediate certificate when the trusted measurement on the intermediate certificate passes, and the user certificate is stored in an external storage space of the processor; The third credibility measuring module is used for adopting the user certificate to carry out credibility measurement on the basic input and output system when the credibility measurement on the user certificate passes; And the operation module is used for operating the basic input and output system when the credibility measurement of the basic input and output system passes.
- 11. The secure launch apparatus according to claim 10, wherein said intermediate certificate comprises an intermediate root certificate; The first trusted measurement module is used for performing trusted measurement on the intermediate root certificate by adopting the national root certificate; The second trusted measurement module is configured to perform trusted measurement on the user certificate by using the intermediate application certificate.
- 12. The secure launch apparatus according to claim 11, wherein said intermediate certificate comprises an intermediate root certificate and further comprises an intermediate application certificate; the first trusted measurement module is further configured to perform trusted measurement on the intermediate application certificate by using the intermediate root certificate when the trusted measurement on the intermediate root certificate passes; The second trusted measurement module is configured to perform trusted measurement on the user certificate by using the intermediate application certificate.
- 13. The secure launch apparatus according to claim 10, wherein said user certificate further comprises user identification information, said processor further having preset therein user identification information; The second trusted measurement module is further configured to obtain user identification information in the user certificate when the intermediate certificate is used for performing trusted measurement on the user certificate, and before the user certificate is used for performing trusted measurement on the basic input/output system, compare the user identification information in the user certificate with user identification information preset in the processor, and pass the trusted measurement on the user certificate when the user identification information in the user certificate is determined to be consistent with the trusted user identification information preset in the processor.
- 14. The secure launch apparatus according to claim 10 wherein said user certificate comprises public key version number information, said processor further having preset public key version number information for said user certificate; The second trusted measurement module is further configured to obtain public key version number information in the user certificate when the intermediate certificate is used for performing trusted measurement on the user certificate, and before the user certificate is used for performing trusted measurement on the basic input/output system, compare the public key version number information in the user certificate with public key version number information of the user certificate preset in the processor, and pass the trusted measurement on the user certificate when the public key version number in the user certificate is determined to be greater than or equal to the public key version number of the user certificate preset in the processor.
- 15. The secure launch apparatus according to claim 14 and further comprising a public key version number upgrading unit for upgrading a public key version number of a user certificate preset in said processor such that the public key version number of the user certificate preset in said processor is greater than the public key version number in said user certificate when said user certificate is disabled from use.
- 16. The safety starter according to any one of claims 10 to 15, further comprising: A fourth trusted measurement module, configured to perform trusted measurement on a manufacturer application certificate by using a manufacturer root certificate preset in the processor before running the bios, where the manufacturer application certificate is stored in an external storage space of the processor; A fifth trusted measurement module, configured to perform, when the trusted measurement of the manufacturer application certificate passes, the trusted measurement on a manufacturer user certificate with the manufacturer application certificate, where the manufacturer user certificate is stored in an external storage space of the processor, and the manufacturer user certificate includes the user certificate or further includes the intermediate certificate; the operation module is used for operating the basic input and output system when the credibility measurement of the manufacturer certificate passes.
- 17. A computer device comprising at least one memory storing one or more computer-executable instructions and at least one processor invoking the one or more computer-executable instructions to perform the secure boot method of any of claims 1-9.
- 18. A computer program product comprising computer program/instructions which, when executed by a processor, is adapted to carry out a secure boot method according to any of claims 1 to 9.
- 19. A storage medium having one or more computer instructions stored thereon, the one or more computer instructions for implementing the secure boot method of any of claims 1-9.
Description
Safe starting method and related equipment Technical Field The embodiment of the invention relates to the technical field of computers, in particular to a safe starting method and related equipment. Background The method for starting the system based on the trusted root is gradually becoming the requirement in the relevant standards of the computer security technology (such as the security technical requirement and evaluation criterion of the GB/T39680-2020 server) in recent years, namely, the integrity of a Basic Input Output System (BIOS) needs to be measured in a trusted way when the system is powered on, and the BIOS can be operated after the trusted measurement is passed so as to prevent the attack on the BIOS. However, the existing secure boot method based on the trusted root still has the defects of reliability, creditability and authority, and reduces the experience of users. Disclosure of Invention The embodiment of the invention solves the problem of providing a safe starting method and related equipment, which can improve the reliability, the public trust and the authority of a trust chain. In order to solve the above problems, an embodiment of the present invention provides a secure boot method, which is applied to a processor, and includes: In response to detecting a preset safe starting condition, adopting a national root certificate preset in the processor to perform trusted measurement on an intermediate certificate, wherein the intermediate certificate is stored in an external storage space of the processor; when the trusted measurement of the intermediate certificate passes, adopting the intermediate certificate to perform the trusted measurement of the user certificate, wherein the user certificate is stored in an external storage space of the processor; When the credibility measurement of the user certificate passes, adopting the user certificate to perform credibility measurement on a basic input and output system; And when the credibility measurement of the basic input output system passes, operating the basic input output system. Optionally, the intermediate certificate comprises an intermediate root certificate; the adoption of the national root certificate preset in the processor for carrying out the trusted measurement on the intermediate certificate comprises the adoption of the national root certificate for carrying out the trusted measurement on the intermediate root certificate; The adoption of the intermediate certificate to perform the trusted measurement on the user certificate comprises the adoption of the intermediate root certificate to perform the trusted measurement on the user certificate. Optionally, the intermediate certificate further comprises an intermediate application certificate; When the trusted measurement of the intermediate root certificate passes, the secure launch method further comprises adopting the intermediate root certificate to perform the trusted measurement on the intermediate application certificate; When the trusted measurement of the intermediate application certificate passes, the adoption of the intermediate certificate to perform the trusted measurement on the user certificate comprises the adoption of the intermediate application certificate to perform the trusted measurement on the user certificate. Optionally, the user certificate includes user identification information, and the processor is further preset with the user identification information; When the intermediate certificate is adopted to carry out the trusted measurement on the user certificate, and before the user certificate is adopted to carry out the trusted measurement on the basic input and output system, the method further comprises the steps of obtaining user identification information in the user certificate, comparing the user identification information in the user certificate with user identification information preset in the processor, and when the user identification information in the user certificate is determined to be consistent with the trusted user identification information preset in the processor, carrying out the trusted measurement on the user certificate. Optionally, the user certificate includes public key version number information, and the processor is further preset with public key version number information of the user certificate; When the intermediate certificate is adopted to carry out the trusted measurement on the user certificate, and before the user certificate is adopted to carry out the trusted measurement on the basic input and output system, the method further comprises the steps of obtaining public key version number information in the user certificate, comparing the public key version number information in the user certificate with public key version number information of the user certificate preset in the processor, and when the public key version number in the user certificate is determined to be larger than or equal to the public key ve