[go: up one dir, main page]

CN114611117A - Processing method and device and electronic equipment - Google Patents

Processing method and device and electronic equipment Download PDF

Info

Publication number
CN114611117A
CN114611117A CN202210299860.4A CN202210299860A CN114611117A CN 114611117 A CN114611117 A CN 114611117A CN 202210299860 A CN202210299860 A CN 202210299860A CN 114611117 A CN114611117 A CN 114611117A
Authority
CN
China
Prior art keywords
configuration information
information
electronic device
electronic equipment
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210299860.4A
Other languages
Chinese (zh)
Inventor
高晔
吕洪昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN202210299860.4A priority Critical patent/CN114611117A/en
Publication of CN114611117A publication Critical patent/CN114611117A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a processing method, a processing device and electronic equipment, wherein the method comprises the following steps: in response to a trigger signal, a designated component of the electronic equipment verifies the configuration information of the electronic equipment, wherein the designated component can work when the electronic equipment is in a power-off state or in a power-on stage; outputting target prompt information based on the verification result of the configuration information; the target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information.

Description

Processing method and device and electronic equipment
Technical Field
The present application relates to data processing technologies, and in particular, to a processing method and apparatus, and an electronic device.
Background
In the process from the off-line of a factory to the delivery of the PC to a client, some configuration information or components of the PC can be maliciously tampered or replaced, so that property security of the user is damaged, privacy of the user is leaked even in the later period, and the legitimate rights and interests of the user are damaged.
Disclosure of Invention
In view of this, the present application provides the following technical solutions:
a method of processing, comprising:
in response to a trigger signal, a designated component of the electronic equipment verifies the configuration information of the electronic equipment, wherein the designated component can work when the electronic equipment is in a power-off state or in a power-on stage;
outputting target prompt information based on the verification result of the configuration information;
the target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information.
Optionally, the verifying, by a specific component of an electronic device, configuration information of the electronic device in response to a trigger signal includes:
in response to obtaining a power-on signal or a power-on signal, verifying configuration information of the electronic equipment by a specified component of the electronic equipment; or the like, or, alternatively,
verifying configuration information of an electronic device by a designated component of the electronic device in response to obtaining a target signal, wherein the target signal comprises a signal generated by disassembling or assembling the electronic device;
wherein the designated component includes at least one of a boot system, an embedded controller or a baseboard management controller of the electronic device, and the configuration information includes at least one of hardware configuration information, software configuration information or verification environment configuration information of the electronic device.
Optionally, the verifying, by a specific component of the electronic device, the configuration information of the electronic device includes:
in response to obtaining the boot signal or the power-on signal, a boot system of the electronic device obtains the configuration information, and compares the configuration information with original configuration information, or performs hash verification on the configuration information based on the original configuration information, wherein the original configuration information is burned into a first secure area or uploaded to a second secure area when the electronic device leaves a factory, and the first secure area includes a storage area of the boot system; or the like, or, alternatively,
in response to obtaining the power-on signal or the power-on signal, obtaining, by a baseboard management controller of the electronic device, the configuration information, and comparing the configuration information with original configuration information, or performing hash verification on the configuration information based on the original configuration information, where the original configuration information is burned into a third secure area or uploaded to the second secure area when the electronic device leaves a factory, and the third secure area includes a storage area of the baseboard management controller; or the like, or, alternatively,
in response to obtaining the target signal, an embedded controller of an electronic device obtains first configuration information of the electronic device after being disassembled or assembled, and compares the first configuration information with original configuration information, or performs hash verification on the first configuration information based on the original configuration information, where the original configuration information is burned into a fourth secure area or uploaded to the second secure area when the electronic device leaves a factory, and the fourth secure area includes a storage area of the embedded controller.
Optionally, the verifying, by a specific component of the electronic device, the configuration information of the electronic device includes:
in response to obtaining the trigger signal, obtaining, by a boot system, a baseboard management controller, or an embedded controller of an electronic device, the configuration information, and obtaining order information for the electronic device;
and comparing the configuration information with the order information, or performing hash verification on the configuration information based on the order information, wherein the order information is created by the first object or the second object.
Optionally, the outputting target prompt information based on the verification result of the configuration information includes:
if the verification result represents that the configuration information of the electronic equipment is illegally changed, outputting first information by using an output component of the electronic equipment and/or outputting second information by using a communication component of the electronic equipment; or the like, or, alternatively,
if the verification result indicates that the configuration information of the electronic equipment passes verification, outputting first information by using an output component of the electronic equipment and/or outputting second information by using a communication component of the electronic equipment;
the content of the first information characterized under different verification results is different, and the content of the second information characterized under different verification results is different.
Optionally, wherein outputting the first information with an output component of the electronic device comprises:
outputting warning information and/or outputting an illegally modified record to the first object using the output means in case the configuration information is illegally modified; or the like, or, alternatively,
under the condition that the configuration information passes the verification, outputting a prompt of starting up for the first time and/or order information aiming at the electronic equipment to the first object by using the output component;
and/or the presence of a gas in the atmosphere,
wherein outputting second information with a communication component of the electronic device comprises:
in the case that the configuration information is illegally modified, outputting a prompt of order flaws and/or outputting a logistics tracking record and an illegally modified record to the second object by using the communication component; or the like, or, alternatively,
outputting, with the communication component, a prompt to the second object to complete an order for the electronic device if the configuration information is verified.
Optionally, the verifying, by a specific component of an electronic device, configuration information of the electronic device in response to a trigger signal includes:
in response to obtaining the configuration information to be updated pushed for the target component of the electronic equipment, verifying the configuration information to be updated.
Optionally, the method further comprises:
after the configuration information is verified, unlocking a component in a locked state in the electronic equipment so as to enable the component to be in a usable state;
and/or the presence of a gas and/or,
and after the configuration information passes the verification, closing or deleting the function of verifying the configuration information.
The application also discloses a processing apparatus, includes:
the configuration verification module is used for responding to a trigger signal and verifying configuration information of the electronic equipment by a specified component of the electronic equipment, wherein the specified component can work when the electronic equipment is in a power-off state or in a power-on stage;
the prompt output module is used for outputting target prompt information based on the verification result of the configuration information;
the target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information.
Further, the present application also discloses an electronic device, comprising;
a processor;
a memory for storing executable program instructions of the processor;
wherein the executable program instructions comprise: in response to a trigger signal, a designated component of the electronic equipment verifies the configuration information of the electronic equipment, wherein the designated component can work when the electronic equipment is in a power-off state or in a power-on stage; outputting target prompt information based on the verification result of the configuration information; the target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information.
Compared with the prior art, the embodiment of the application discloses a processing method, a processing device and electronic equipment, and the method comprises the following steps: in response to a trigger signal, a designated component of the electronic equipment verifies the configuration information of the electronic equipment, wherein the designated component can work when the electronic equipment is in a power-off state or in a power-on stage; outputting target prompt information based on the verification result of the configuration information; the target prompt message is used for prompting a first message to a first object and/or prompting a second message to a second object, and the first message and the second message are the same or different. According to the scheme, the detection and judgment of whether the electronic equipment is illegally tampered after leaving the factory is finished by the designated component, and the designated component does not depend on the working state of the electronic equipment in the detection and judgment process, so that an accurate detection result can be comprehensively and timely obtained and output, the use experience of a user can be optimized, and related parties can be assisted to timely solve the existing illegal tampering problem.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of a processing method disclosed in an embodiment of the present application;
fig. 2 is a flowchart illustrating verification of configuration information of an electronic device according to an embodiment of the present disclosure;
FIG. 3 is a flow chart of another processing method disclosed in embodiments of the present application;
FIG. 4 is a schematic diagram illustrating a flow chart of implementing an electronic device from a factory to a user according to an embodiment of the disclosure;
FIG. 5 is a schematic structural diagram of a processing apparatus according to an embodiment of the disclosure;
fig. 6 is a schematic structural diagram of an electronic device disclosed in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application can be applied to electronic equipment, the product form of the electronic equipment is not limited by the application, and the electronic equipment can include but is not limited to a smart phone, a tablet computer, wearable equipment, a Personal Computer (PC), a netbook and the like, and can be selected according to application requirements.
Fig. 1 is a flowchart of a processing method disclosed in an embodiment of the present application. Referring to fig. 1, the processing method may include:
step 101: in response to a trigger signal, configuration information of an electronic device is verified by a designated component of the electronic device.
The designated component can work when the electronic equipment is in a power-off state or in a power-on stage. Different from some components, such as a CPU, which can be normally used only after the electronic device is powered on, the operation of the specific component described in the present application does not depend on the operating state of the electronic device, and even in the power-off state or the power-on stage, the specific component can perform corresponding verification operation by using the power stored inside the electronic device or by using an external power supply method. In this embodiment of the application, the specific component may include, but is not limited to, a BIOS (Basic Input Output System), a UEFI (Unified Extensible Firmware Interface), an EFI (Extensible Firmware Interface), and the like, and may also be a component capable of operating in a shutdown state or a startup phase, such as an EC (embedded Controller), a BMC (Basic management Controller), and the like.
It should be noted that some components, such as the EC, may output data when the electronic device is not turned on, but it needs to acquire information of each device component to further determine whether the electronic device is illegally tampered; the process of obtaining information for individual device components may be implemented based on other components, such as the BIOS, and thus in this implementation, the specified component may include at least two components. Of course, other components, such as BMC, can independently complete the work of obtaining the information of each device component because they can work independently of EC and BIOS, in which case, the execution component may refer to a single component. In one embodiment, the EC may also be active to obtain information about components in the electronic device, without relying on the BIOS.
The trigger signal may be a trigger signal obtained passively by the electronic device when the user intentionally performs a certain operation, or a trigger signal generated autonomously by the electronic device when actively detecting a certain state or a certain signal. For example, the trigger signal may be a power-on signal, or may also be a signal that triggers detection verification caused by some manual operations, such as a signal that triggers detection verification when the electronic device is disassembled, powered on, or assembled; furthermore, in some more demanding applications, a signal to detect verification may be triggered even when the electronic device is unpacked, in contact with the skin, or when ambient sound above a certain value is detected. Of course, the obtaining or generating of the trigger signal is not limited to the above listed cases, and any case where illegal tampering may occur, whether hardware tampering or software tampering, may be considered within the scope of implementing the trigger signal, and this application does not impose any fixed limitation on this.
The configuration information of the electronic device may include hardware configuration information, such as information of a hard disk, a CPU, a memory, and the like, and may also include software configuration information, such as an operating system, image processing software, antivirus software, and the like; in addition, some setting items, operation logs and the like can be included, such as setting items of the BIOS and read-write records of the storage unit. Of course, in some other scenarios, the configuration information may also include data that has address matching information equal to the electronic device itself without a direct relationship.
The configuration information of the electronic device may be verified differently in different scenarios, for example, the verification may be performed by comparing the configuration information obtained at present with the configuration information obtained previously, or the verification may be performed based on comparing the configuration information obtained at present with the information obtained by other auxiliary judgment. In this embodiment, the verification performed on the configuration information of the electronic device may include, but is not limited to, validity verification, integrity verification, comparison verification with the initial information, and the like. The specific implementation of the verification of the configuration information will be described in detail in the following embodiments, and will not be described in detail herein.
After step 101, the process proceeds to step 102.
Step 102: and outputting target prompt information based on the verification result of the configuration information.
The purpose of verifying the configuration information of the electronic device is to determine whether the electronic device is illegally tampered in the process after leaving the factory and before the electronic device reaches the hands of the user, so that after a verification result is obtained, target prompt information needs to be timely output to prompt whether the electronic device of the first object and/or the second object is abnormal or not, timely processing is facilitated when the electronic device is abnormal, purchasing and using experience of the user is not affected, and timely processing of abnormal conditions is facilitated.
The target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information. In a specific implementation, the first object may be a buyer user and the second object may be a seller merchant. Correspondingly, the first information may be a first-time starting prompt, a non-first-time starting prompt, warning information, a verification result, and the like. The second information may be a prompt corresponding to the first information and sent to a merchant, and when it is determined that an illegal tampering behavior may exist, the second information may be used to preferentially send an early warning to the seller merchant, or may also be used to send prompt information to both the seller merchant and the buyer user.
In addition, since the seller and the merchant are far away and the buyer and the user may be the person who triggers the power on of the electronic device, the output modes corresponding to the output target prompt information may be different for different objects. For example, for a remote seller, target prompt information can be sent to a seller terminal in a network communication mode; and for the local electronic equipment, target prompt information can be output through the display screen. As described above, there are various implementation manners for the trigger signal, and different prompt contents exist for the target prompt information based on the actual situation, so that the output manner of the local target prompt information of the electronic device is different for the target prompt information of different prompt contents or different trigger signal scenarios. For example, when the trigger signal is a power-on signal, the target prompt information is displayed and output in a display screen output mode; for another example, when the trigger signal is a signal generated by detaching a device component, the electronic device may directly emit a warning sound through the buzzer.
According to the processing method, the specified component is used for detecting and judging whether the electronic equipment is illegally tampered after leaving the factory, and the specified component does not depend on the working state of the electronic equipment in the detection and judgment process, so that an accurate detection result can be comprehensively and timely obtained and output, the use experience of a user can be optimized, and related parties can be assisted to timely solve the existing illegal tampering problem.
In one implementation, the verifying, by a specific component of an electronic device, configuration information of the electronic device in response to a trigger signal may include: and in response to obtaining the starting signal or the power-on signal, verifying the configuration information of the electronic equipment by a specified component of the electronic equipment.
For example, after obtaining a power-on signal or a power-on signal, the electronic device enters a start-up stage, and in a process of starting up the operating system, the BIOS starts working, and obtains some hardware information, software information, and other configuration information of the electronic device, and further compares and verifies the obtained configuration information.
Alternatively, in another implementation, verifying, by a specific component of an electronic device, configuration information of the electronic device in response to a trigger signal may include: in response to obtaining a target signal, the configuration information of the electronic device is verified by a specific component of the electronic device, where the target signal includes a signal generated by disassembling or assembling the electronic device, for example, a sensor preset in the electronic device or in a component of the electronic device, and after the electronic device is disassembled or the component of the electronic device is assembled, the sensor detects a change in relevant information, and then triggers the signal, for example, a change in a positional relationship, a change in an object, and the like, to generate a detection signal.
It can be understood that, in a case that the electronic device is disassembled or assembled, it is likely that the electronic device is being maliciously replaced by some people, and therefore, in this case, the electronic device needs to check whether the current hardware configuration is the same as the original hardware configuration through the specified component in time, and if the current hardware configuration is the same as the original hardware configuration, it indicates that the hardware of the electronic device is not maliciously replaced; if the difference is not the same, the hardware of the electronic equipment is illegally detached or replaced.
Certainly, the above situation only relates to a scenario in which the hardware of the electronic device is tampered, in an actual situation, there may also be some scenarios in which the hardware of the electronic device is not replaced, but the configuration parameters of the hardware are read or modified, and the modification of the configuration parameters may possibly cause leakage of data in a process of using the electronic device by a user in a later period, and therefore, the situation needs to be considered in a tamper-proof range.
Thus, the target signal may include a signal triggered by a hardware read or a hardware unlock, in addition to the signal generated by the above-described disassembly or assembly of the electronic device. When the hardware of the electronic device is illegally read or unlocked, the configuration parameters of the electronic device may be maliciously modified or recorded, and certain potential safety hazards exist, so that when the hardware is read or unlocked, the electronic device also needs to verify corresponding configuration information in time through a specified component to determine whether the electronic device is maliciously tampered.
In the foregoing, the specific component may include at least one of a boot system, an embedded controller, or a baseboard management controller of the electronic device, and the configuration information may include at least one of hardware configuration information, software configuration information, or verification environment configuration information of the electronic device. The software configuration information may include, but is not limited to, setting information including setting items, and the setting items may be setting items of a BIOS, setting items of an OS, and the like.
The foregoing example has described a scenario of hardware configuration information and software configuration information for an electronic device, which may be a shipping address in one example for verification environment configuration information. For example, after receiving the trigger signal, the designated component of the electronic device may obtain current location information, and further determine whether the current location information and the shipping address are in the same area, and if so, may consider that the current event (which may be a power-on event, an assembly event, etc.) about the electronic device is a normal operation after a legitimate user receives the electronic device; and if the current position information and the receiving address do not belong to the same area, the current event related to the electronic equipment is considered to be an illegal tampering event.
In the foregoing, the verifying the configuration information of the electronic device by the specifying component of the electronic device may include: in response to obtaining the boot signal or the power-on signal, a boot system of the electronic device obtains the configuration information, and compares the configuration information with original configuration information, or performs hash verification on the configuration information based on the original configuration information, where the original configuration information is burned into a first secure area or uploaded to a second secure area when the electronic device leaves a factory, and the first secure area includes a storage area of the boot system.
Wherein the boot system may be a BIOS. Before the electronic device leaves a factory, the BIOS may burn configuration information of the electronic device, that is, the original configuration information, into a first secure area that cannot be modified by the outside, such as a secure area in a BIOS chip; and under the condition that the trigger signal is obtained after the electronic equipment leaves the factory, the BIOS re-executes the operation of obtaining the configuration information of the electronic equipment, compares the obtained configuration information with the original configuration information which is stored in the first safe area before, and determines whether the configuration information of the electronic equipment is changed or not based on the comparison result. The first secure area may be other hardware, such as a read only memory of other chips, such as a TPM (Trusted Platform Module) chip and an EC chip, besides the secure area in the BIOS chip. The second secure area is a storage area of the cloud.
In some implementations, the original configuration information is not directly stored, but is subjected to some processing, such as hash processing, so that when the configuration information obtained after the electronic device leaves the factory is subsequently verified, the configuration information needs to be subjected to hash verification based on the original configuration information and a verification result is obtained.
Alternatively, the verifying the configuration information of the electronic device by the specific component of the electronic device may include: in response to obtaining the power-on signal or the power-on signal, a baseboard management controller of the electronic device obtains the configuration information, and compares the configuration information with original configuration information, or performs hash verification on the configuration information based on the original configuration information, where the original configuration information is burned into a third secure area or uploaded to the second secure area when the electronic device leaves a factory, and the third secure area includes a storage area of the baseboard management controller.
In this implementation, before the electronic device leaves the factory, the baseboard management controller may store the configuration information of the electronic device in its own storage area, that is, the third secure area; and then under the condition that the trigger signal is obtained after the electronic equipment leaves the factory, the baseboard management controller executes the operation of obtaining the configuration information of the electronic equipment, then compares the obtained configuration information with the original configuration information which is stored in the first safe area before, and determines whether the configuration information of the electronic equipment changes or not based on the comparison result. For example, before the electronic device is shipped, the baseboard management controller detects that the obtained hard disk capacity is 200GB, and after the electronic device is shipped, several classes of management controllers detect that the obtained hard disk capacity is 160GB, it can be determined that the hard disk of the hard electronic device has been illegally replaced.
Alternatively, the verifying the configuration information of the electronic device by the specific component of the electronic device may include: in response to obtaining the target signal, an embedded controller of an electronic device obtains first configuration information of the electronic device after being disassembled or assembled, and compares the first configuration information with original configuration information, or performs hash verification on the first configuration information based on the original configuration information, where the original configuration information is burned into a fourth secure area or uploaded to the second secure area when the electronic device leaves a factory, and the fourth secure area includes a storage area of the embedded controller.
In this implementation, before the electronic device leaves the factory, the embedded controller stores the configuration information of the electronic device in its own storage area, that is, the fourth secure area; and then under the condition that the trigger signal is obtained after the electronic equipment leaves the factory, the embedded controller executes the operation of obtaining the configuration information of the electronic equipment, then compares the obtained configuration information with the original configuration information which is stored in the first safe area before, and determines whether the configuration information of the electronic equipment is changed or not based on the comparison result.
Fig. 2 is a flowchart of verifying configuration information of an electronic device according to an embodiment of the present disclosure. Referring to fig. 2, the verifying the configuration information of the electronic device by the specific component of the electronic device may include:
step 201: in response to obtaining the trigger signal, obtaining, by a boot system, a baseboard management controller, or an embedded controller of the electronic device, the configuration information, and obtaining order information for the electronic device, and entering step 202 or step 203.
Step 202: and comparing the configuration information with the order information.
In the foregoing, verifying the configuration information of the electronic device is to compare the currently obtained configuration information with original configuration information stored before the electronic device leaves the factory, and further determine whether the electronic device is illegally tampered; in the present implementation, whether the electronic device is illegally tampered is determined by comparing the currently obtained configuration information with the order information.
It can be understood that the order information usually includes some main configuration parameter information of the electronic device, such as the size of the hard disk, the main frequency of the CPU, the external frequency, and the like. After obtaining the configuration information of the electronic device, the configuration information may be checked against the configuration information recorded in the order information to determine whether there is a deviation. If the deviation exists, the electronic equipment is judged to be illegally tampered; if no deviation exists, the electronic equipment is still in the original configuration.
Step 203: performing hash verification on the configuration information based on the order information, the order information being created by the first object or the second object.
Referring to the foregoing, in some implementations, a certain hash correspondence exists between the order information and the configuration information, so when verifying the configuration information obtained after the electronic device leaves the factory, it is necessary to perform hash verification on the configuration information based on the order information and obtain a verification result.
In the embodiment, the configuration information of the electronic equipment after leaving the factory is verified through the order information, so that verification modes of the configuration information are enriched. The verification mode can also be combined with other verification modes to further ensure the accuracy of the verification result.
In one implementation, the outputting target prompt information based on the verification result of the configuration information may include: if the verification result represents that the configuration information of the electronic equipment is illegally changed, outputting first information by using an output component of the electronic equipment and/or outputting second information by using a communication component of the electronic equipment; and if the verification result indicates that the configuration information of the electronic equipment passes the verification, outputting first information by using an output component of the electronic equipment, and/or outputting second information by using a communication component of the electronic equipment.
The content of the first information characterized under different verification results is different, and the content of the second information characterized under different verification results is different.
After the configuration information of the electronic equipment is verified, no matter whether the verification result indicates that the electronic equipment is illegally tampered, target prompt information is output, wherein the target prompt information can be first information output to a buyer user or second information output to a seller merchant. For the first information, since the communication object is a user, the first information can be directly output through an output part of the electronic device; and for the second information, the communication object is the seller merchant, the remote location is located, and therefore the second information output is required to be transmitted to the remote location through the communication component. The output means may include, but is not limited to: display components, light assemblies, audio output components, and the like, which may include, but are not limited to: network communication components such as Bluetooth, wifi, RJ45, 4G/5G communication module and the like.
For example, in an example, when the verification result indicates that the configuration information of the electronic device passes the verification, voice data of "verification is correct and factory configuration is reserved by the device" may be output through the audio output component, where the voice data is the first information; meanwhile, the electronic equipment can also send the verified error-free second information to the terminal of the seller merchant through the wifi or 4G/5G communication module.
For another example, when the verification result indicates that the configuration information of the electronic device is illegally changed, in one example, the display component of the electronic device may output a prompt popup window indicating that the hard disk parameter is modified by being accessed, where the prompt content is the first information; meanwhile, the electronic equipment can also transmit the second information of the 'hard disk parameter is modified by being accessed' to the terminal of the seller merchant through a communication component such as an RJ45 or a 4G/5G communication module.
In the foregoing, outputting the first information by the output unit of the electronic device may include: outputting warning information and/or outputting an illegally modified record to the first object using the output means in case the configuration information is illegally modified; or, when the configuration information passes the verification, outputting a prompt of starting up for the first time and/or order information for the electronic equipment to the first object by using the output component.
The output or transmission of the first information and the second information may be transmitted simultaneously or separately in different implementations, and the implementation logic may be set based on an actual scene.
For example, when the electronic device has safely reached the hand of a legal user, the user executes a power-on operation, the designated component determines that the verification is passed by comparing the address of the order information with the address of the current device, and prompt information of "the power-on is performed for the first time and the system hardware is complete" can be output on the display screen, and/or the order information of the electronic device can be output on the display screen, so that the user can check and confirm conveniently.
For another example, in the transportation of the electronic device, when the electronic device is illegally detached, the designated component detects that the CPU model is different from the factory configuration model, and then a warning sound may be emitted through the audio output component, and/or a record of the illegal change may be output through the display component, that is, "the factory model of the CPU is" and the current detected model is ". Specifically, different implementation manners exist for outputting the illegally changed record, for example, the illegally changed record may be prompted by a popup in the BIOS setting item, or the illegally changed record may be edited into the order information, and the order information is directly displayed to the user when being displayed and output.
Outputting, with a communication component of the electronic device, second information may include: in the case that the configuration information is illegally modified, outputting a prompt of order flaws and/or outputting a logistics tracking record and an illegally modified record to the second object by using the communication component; or, in the case that the configuration information is verified, outputting a prompt for completing an order for the electronic device to the second object by using the communication component.
In the case where the electronic device determines that the CPU, the hard disk, the camera, or the like is replaced illegally, the notification of the order defect may be sent to the seller or the like through the communication means such as the bluetooth, the Wifi, the RJ45, or the 4G/5G communication module. Specifically, the second information indicating that the electronic device component is illegally detached may be sent to the seller merchant, so that the seller merchant can handle the abnormal situation in time, and the electronic device with the abnormal situation may not be continuously transported to the user. Optionally, the logistics tracking record of the electronic equipment order and the record of the illegal change can be simultaneously or independently output to the seller merchant, so that the merchant can trace and process illegal behaviors in time.
And under the condition that the configuration information passes the verification, the electronic equipment can output a prompt for completing an order of the electronic equipment to the second object through the network communication component, and the order service content is finished, so that a merchant can record and archive in time.
In one implementation, the verifying the configuration information of the electronic device by the specific component of the electronic device may include: in response to obtaining the configuration information to be updated pushed for the target component of the electronic equipment, verifying the configuration information to be updated.
Some parts of the electronic device may trigger the generation of an update prompt message, such as the configuration information to be updated, in certain states, such as a networking state, or when a certain function is used.
The configuration information to be updated comprises an update data packet, and related contents of update data, such as a signature, a length, a hash value and the like, are recorded in a header file in the update data packet. After receiving the configuration information to be updated, the signature, length, hash value, etc. in the header file may be verified. If any item of the verification results is wrong, the configuration information to be updated is illegally changed; and if all the items pass the verification, the configuration information to be updated is legal, and corresponding updating operation can be normally carried out on the basis of the configuration information to be updated. For example, if the length of the update data recorded in the header file is 1000 and the actually determined length of the update data is 1150, it indicates that the update data has been modified illegally, and there is a safety hazard, and the configuration information to be updated cannot be adopted.
In addition, some current configuration information of a component may also be recorded in the configuration information to be updated of a certain component, and the specifying component of the electronic device may compare the configuration information with original configuration information of the component recorded and saved before the electronic device leaves the factory, and if the configuration information is the same, it indicates that the component maintains the factory configuration; if not, the component is tampered or replaced.
Fig. 3 is a flowchart of another processing method disclosed in the embodiments of the present application. Referring to fig. 3, the processing method may include:
step 301: in response to a trigger signal, configuration information of an electronic device is verified by a designated component of the electronic device.
The designated component can work when the electronic equipment is in a power-off state or in a power-on stage.
Step 302: and outputting target prompt information based on the verification result of the configuration information.
The target prompt message is used for prompting a first message to a first object and/or prompting a second message to a second object, and the first message and the second message are the same or different.
Step 303: and after the configuration information is verified, unlocking a component in a locked state in the electronic equipment so as to enable the component to be in a usable state.
In electronic devices, some specific components (e.g., hard disks) have self-locking or self-encryption capabilities, and after the self-locking is activated, the components cannot be accessed by unauthorized processors or applications. The self-locking or self-encrypting described herein may include, but is not limited to, locking the operation, reading, or configuration change rights of the component itself. In one example, after all assembly and debugging operations of the electronic device are completed before the electronic device leaves a factory, for example, the BIOS of the electronic device sends an instruction to the hard disk, so that the hard disk starts a self-locking function, and returns key data to the BIOS, so that other components or applications that do not know the key data cannot normally access the hard disk. The realization can prevent the electronic equipment from being illegally accessed in the transportation process, and avoid the problem of user data safety possibly existing in the later period caused by malicious modification of the hard disk parameters. In the case that the electronic device is successfully transported to the user and the configuration information is verified, the result that the electronic device is not illegally tampered with is clear to the user. In order to facilitate subsequent normal use, the electronic equipment can control the hard disk to close the self-locking function.
In the above example, the operation of unlocking the component in the locked state is performed by the BIOS, that is, by the specified component, but this example does not set a fixed limit to the unlocking hardware. In other implementations, after the electronic device is started to enter the operating system, a specific application or administrator may perform an unlocking operation. For example, after entering the operating system, the administrator may implement unlocking control of the locked state components through the screen adjustable menu after the authorization is verified.
Based on the above embodiment, fig. 4 shows a schematic flow chart of the whole implementation of the electronic device from the factory to the user. Referring to fig. 4, in a factory stage, the BIOS stores hardware configuration information and software configuration information of the system in an SPI storage area on the motherboard, and after all pre-factory processes such as assembly, detection, and the like of the electronic device are completed, a flag may be set, and then the monitoring mechanism corresponding to the processing method according to the embodiment of the present application becomes effective. When a user receives the electronic equipment and starts up, the BIOS obtains configuration information on the system, the obtained configuration information is compared with configuration information obtained by factory stage detection, if the configuration information on the system is changed, the BIOS records the event, and the change information can be transmitted to the cloud end; in addition, the BIOS may also output a warning message through an output component such as a screen to notify the user that there is a change in the configuration information, or prompt the user that the boot is the next boot.
In other implementations, after the configuration information is verified, the method may further include a step of closing or deleting a function of verifying the configuration information. Wherein the implementation of the closing may comprise disabling.
In the event that the electronic device is successfully shipped to the user and the configuration information has been verified, the electronic device has determined, to the user, that it has not been tampered with illegally. In order to avoid that the subsequent electronic device repeatedly performs configuration information verification after receiving the trigger signal and outputs the target prompt information to cause interference to the user, in the implementation, the function of verifying the configuration information of the electronic device is closed after the configuration information passes the verification. The function of verifying the configuration information of the electronic device is turned off, which may be actively triggered by the electronic device or manually selected by a user to turn off the electronic device. In a specific implementation, the target prompt information output on the display screen may include prompt information inquiring whether to close the configuration verification, and the user may select "yes" or "no" triggerable object therein, so as to actively control the retention or closing of the configuration verification function. Alternatively, as described above, the implementation of unlocking the component, and the operation of closing or deleting the function of verifying the configuration information may be executed by the specified component, or may be executed by a specific application after the electronic device is started to enter the operating system.
While, for purposes of simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present application is not limited by the order of acts or acts described, as some steps may occur in other orders or concurrently with other steps in accordance with the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
The method is described in detail in the embodiments disclosed in the present application, and the method of the present application can be implemented by various types of apparatuses, so that an apparatus is also disclosed in the present application, and the following detailed description is given of specific embodiments.
Fig. 5 is a schematic structural diagram of a processing apparatus according to an embodiment of the present disclosure. Referring to fig. 5, the processing device 50 may include:
the configuration verification module 501 is configured to, in response to a trigger signal, verify configuration information of an electronic device by a specific component of the electronic device, where the specific component is capable of operating when the electronic device is in a power-off state or in a power-on stage.
A prompt output module 502, configured to output target prompt information based on the verification result of the configuration information.
The target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information.
In the processing apparatus of this embodiment, the detection and judgment on whether the electronic device is illegally tampered after leaving the factory is completed by the specifying component, and the specifying component does not depend on the operating state of the electronic device in the process of performing the detection and judgment, so that an accurate detection result can be comprehensively and timely obtained and output, the use experience of a user can be optimized, and a relevant party can be assisted to solve the existing illegal tampering problem in time.
In one implementation, the configuration verification module is specifically operable to: in response to obtaining a power-on signal or a power-on signal, verifying configuration information of the electronic equipment by a specified component of the electronic equipment; or, in response to obtaining a target signal, verifying configuration information of the electronic device by a designated component of the electronic device, the target signal including a signal generated by disassembling or assembling the electronic device.
Wherein the specific component comprises at least one of a boot system, an embedded controller or a baseboard management controller of the electronic device, and the configuration information comprises at least one of hardware configuration information, software configuration information or verification environment configuration information of the electronic device.
In one implementation, the configuration verification module is specifically operable to: in response to obtaining the boot signal or the power-on signal, a boot system of the electronic device obtains the configuration information, and compares the configuration information with original configuration information, or performs hash verification on the configuration information based on the original configuration information, wherein the original configuration information is burned into a first secure area or uploaded to a second secure area when the electronic device leaves a factory, and the first secure area includes a storage area of the boot system; or the like, or, alternatively,
in response to obtaining the power-on signal or the power-on signal, obtaining, by a baseboard management controller of the electronic device, the configuration information, and comparing the configuration information with original configuration information, or performing hash verification on the configuration information based on the original configuration information, where the original configuration information is burned into a third secure area or uploaded to the second secure area when the electronic device leaves a factory, and the third secure area includes a storage area of the baseboard management controller; or the like, or, alternatively,
in response to obtaining the target signal, an embedded controller of an electronic device obtains first configuration information of the electronic device after being disassembled or assembled, and compares the first configuration information with original configuration information, or performs hash verification on the first configuration information based on the original configuration information, where the original configuration information is burned into a fourth secure area or uploaded to the second secure area when the electronic device leaves a factory, and the fourth secure area includes a storage area of the embedded controller.
In one implementation, the configuration verification module includes: the information obtaining module is used for responding to the obtained trigger signal, obtaining the configuration information by a guide system, a substrate management controller or an embedded controller of the electronic equipment and obtaining order information aiming at the electronic equipment; an information comparison module, configured to compare the configuration information with the order information, or perform hash verification on the configuration information based on the order information, where the order information is created by the first object or the second object.
In one implementation, the prompt output module is specifically configured to: if the verification result represents that the configuration information of the electronic equipment is illegally changed, outputting first information by using an output component of the electronic equipment and/or outputting second information by using a communication component of the electronic equipment; or, if the configuration information of the electronic equipment represented by the verification result passes the verification, outputting first information by using an output component of the electronic equipment, and/or outputting second information by using a communication component of the electronic equipment; the content of the first information characterized under different verification results is different, and the content of the second information characterized under different verification results is different.
In one implementation, the prompting the output module to output the first information includes: outputting warning information and/or outputting an illegally modified record to the first object using the output means in case the configuration information is illegally modified; or, under the condition that the configuration information passes the verification, outputting a prompt of starting up for the first time and/or order information aiming at the electronic equipment to the first object by using the output component; and/or, the prompting output module outputting the second information comprises: in the case that the configuration information is illegally modified, outputting a prompt of order flaws and/or outputting a logistics tracking record and an illegally modified record to the second object by using the communication component; or, in the case that the configuration information is verified, outputting a prompt for completing an order for the electronic device to the second object by using the communication component.
In one implementation, the configuration verification module is specifically configured to: in response to obtaining the configuration information to be updated pushed for the target component of the electronic equipment, verifying the configuration information to be updated.
In one implementation, the processing device may further include: the unlocking control module is used for unlocking a part in a locking state in the electronic equipment after the configuration information is verified so as to enable the part to be in a usable state; and/or, the system may further include a function shutdown module, configured to shut down or delete the function verified for the configuration information after the configuration information is verified. .
The configuration verification module, the prompt output module, the information obtaining module, the information comparing module, the instruction sending module, the function closing module, and the like in the above embodiments are all stored in the memory as program modules, and the processor executes the program modules stored in the memory to implement corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program module from the memory. The kernel can be provided with one or more than one, and the processing of the return visit data is realized by adjusting the parameters of the kernel.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
In an exemplary embodiment, a computer-readable storage medium, which can be directly loaded into the internal memory of a computer and contains software codes, is provided, and the computer program can be loaded into the computer and executed to implement the steps shown in any embodiment of the processing method.
In an exemplary embodiment, a computer program product is also provided, which can be directly loaded into the internal memory of a computer and contains software codes, and the computer program can be loaded into the computer and executed to implement the steps of any of the above-described processing methods.
Further, the embodiment of the application provides electronic equipment. Fig. 6 is a schematic structural diagram of an electronic device disclosed in an embodiment of the present application. Referring to fig. 6, the electronic device includes at least one processor 601, and at least one memory 602 connected to the processor, a bus 603; the processor and the memory complete mutual communication through a bus; the processor is used for calling the program instructions in the memory to execute the processing method.
Wherein the program instructions comprise: in response to a trigger signal, a designated component of the electronic equipment verifies the configuration information of the electronic equipment, wherein the designated component can work when the electronic equipment is in a power-off state or in a power-on stage; outputting target prompt information based on the verification result of the configuration information; the target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of processing, comprising:
in response to a trigger signal, a designated component of the electronic equipment verifies the configuration information of the electronic equipment, wherein the designated component can work when the electronic equipment is in a power-off state or in a power-on stage;
outputting target prompt information based on the verification result of the configuration information;
the target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information.
2. The method of claim 1, wherein verifying, by a designated component of an electronic device, configuration information of the electronic device in response to a trigger signal comprises:
in response to obtaining a power-on signal or a power-on signal, verifying configuration information of the electronic equipment by a specified component of the electronic equipment; or the like, or, alternatively,
verifying configuration information of an electronic device by a designated component of the electronic device in response to obtaining a target signal, wherein the target signal comprises a signal generated by disassembling or assembling the electronic device;
wherein the specific component comprises at least one of a boot system, an embedded controller or a baseboard management controller of the electronic device, and the configuration information comprises at least one of hardware configuration information, software configuration information or verification environment configuration information of the electronic device.
3. The method of claim 2, the verifying, by a designated component of an electronic device, configuration information of the electronic device, comprising:
in response to obtaining the boot signal or the power-on signal, a boot system of the electronic device obtains the configuration information, and compares the configuration information with original configuration information, or performs hash verification on the configuration information based on the original configuration information, wherein the original configuration information is burned into a first secure area or uploaded to a second secure area when the electronic device leaves a factory, and the first secure area includes a storage area of the boot system; or the like, or, alternatively,
in response to obtaining the power-on signal or the power-on signal, obtaining, by a baseboard management controller of the electronic device, the configuration information, and comparing the configuration information with original configuration information, or performing hash verification on the configuration information based on the original configuration information, where the original configuration information is burned into a third secure area or uploaded to the second secure area when the electronic device leaves a factory, and the third secure area includes a storage area of the baseboard management controller; or the like, or, alternatively,
in response to obtaining the target signal, an embedded controller of an electronic device obtains first configuration information of the electronic device after being disassembled or assembled, and compares the first configuration information with original configuration information, or performs hash verification on the first configuration information based on the original configuration information, where the original configuration information is burned into a fourth secure area or uploaded to the second secure area when the electronic device leaves a factory, and the fourth secure area includes a storage area of the embedded controller.
4. The method of claim 2, the verifying, by a designated component of an electronic device, configuration information of the electronic device, comprising:
in response to obtaining the trigger signal, obtaining, by a boot system, a baseboard management controller, or an embedded controller of an electronic device, the configuration information, and obtaining order information for the electronic device;
and comparing the configuration information with the order information, or performing hash verification on the configuration information based on the order information, wherein the order information is created by the first object or the second object.
5. The method according to any one of claims 1 to 4, wherein outputting target prompt information based on the verification result of the configuration information comprises:
if the verification result represents that the configuration information of the electronic equipment is illegally changed, outputting first information by using an output component of the electronic equipment and/or outputting second information by using a communication component of the electronic equipment; or the like, or, alternatively,
if the verification result indicates that the configuration information of the electronic equipment passes verification, outputting first information by using an output component of the electronic equipment and/or outputting second information by using a communication component of the electronic equipment;
the content of the first information characterized under different verification results is different, and the content of the second information characterized under different verification results is different.
6. The method of claim 5, wherein outputting, with an output component of the electronic device, first information comprises:
outputting warning information and/or outputting an illegally modified record to the first object using the output means in case the configuration information is illegally modified; or the like, or, alternatively,
under the condition that the configuration information passes the verification, outputting a prompt of starting up for the first time and/or order information aiming at the electronic equipment to the first object by using the output component;
and/or the presence of a gas and/or,
wherein outputting second information with a communication component of the electronic device comprises:
in the case that the configuration information is illegally modified, outputting a prompt of order flaws and/or outputting a logistics tracking record and an illegally modified record to the second object by using the communication component; or the like, or, alternatively,
outputting, with the communication component, a prompt to the second object to complete an order for the electronic device if the configuration information is verified.
7. The method of claim 1, wherein verifying, by a designated component of an electronic device, configuration information of the electronic device in response to a trigger signal comprises:
in response to obtaining the configuration information to be updated pushed for the target component of the electronic equipment, verifying the configuration information to be updated.
8. The method of claim 5, further comprising:
after the configuration information is verified, unlocking a component in a locked state in the electronic equipment so as to enable the component to be in a usable state;
and/or the presence of a gas in the atmosphere,
and after the configuration information passes the verification, closing or deleting the function of verifying the configuration information.
9. A processing apparatus, comprising:
the configuration verification module is used for responding to a trigger signal, verifying configuration information of the electronic equipment by a specified component of the electronic equipment, wherein the specified component can work when the electronic equipment is in a power-off state or in a power-on stage;
the prompt output module is used for outputting target prompt information based on the verification result of the configuration information;
the target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information.
10. An electronic device, comprising:
a processor;
a memory for storing executable program instructions of the processor;
wherein the executable program instructions comprise: in response to a trigger signal, a designated component of the electronic equipment verifies the configuration information of the electronic equipment, wherein the designated component can work when the electronic equipment is in a power-off state or in a power-on stage; outputting target prompt information based on the verification result of the configuration information; the target prompting information is used for prompting first information to a first object and/or prompting second information to a second object, and the first information is the same as or different from the second information.
CN202210299860.4A 2022-03-25 2022-03-25 Processing method and device and electronic equipment Pending CN114611117A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210299860.4A CN114611117A (en) 2022-03-25 2022-03-25 Processing method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210299860.4A CN114611117A (en) 2022-03-25 2022-03-25 Processing method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN114611117A true CN114611117A (en) 2022-06-10

Family

ID=81865997

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210299860.4A Pending CN114611117A (en) 2022-03-25 2022-03-25 Processing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN114611117A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115480972A (en) * 2022-09-27 2022-12-16 高创(苏州)电子有限公司 Electronic device detection method, system, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105947469A (en) * 2016-07-11 2016-09-21 南京埃德伯格智能技术有限公司 Multifunctional intelligent environmental-friendly classification box
CN106096390A (en) * 2016-06-08 2016-11-09 合肥联宝信息技术有限公司 A kind of start-up control method and the electronic equipment of application the method
CN110889655A (en) * 2018-09-10 2020-03-17 北京嘀嘀无限科技发展有限公司 Method and device for sending prompt information, server and computer storage medium
US20210365560A1 (en) * 2018-06-29 2021-11-25 Zhengzhou Yunhai Information Technology Co., Ltd. Method, apparatus and device for sharing password between bios and operating system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096390A (en) * 2016-06-08 2016-11-09 合肥联宝信息技术有限公司 A kind of start-up control method and the electronic equipment of application the method
CN105947469A (en) * 2016-07-11 2016-09-21 南京埃德伯格智能技术有限公司 Multifunctional intelligent environmental-friendly classification box
US20210365560A1 (en) * 2018-06-29 2021-11-25 Zhengzhou Yunhai Information Technology Co., Ltd. Method, apparatus and device for sharing password between bios and operating system
CN110889655A (en) * 2018-09-10 2020-03-17 北京嘀嘀无限科技发展有限公司 Method and device for sending prompt information, server and computer storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115480972A (en) * 2022-09-27 2022-12-16 高创(苏州)电子有限公司 Electronic device detection method, system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
US11995182B2 (en) Baseboard management controller to perform security action based on digital signature comparison in response to trigger
JP4769608B2 (en) Information processing apparatus having start verification function
US20200302057A1 (en) Verifying controller code
US9542337B2 (en) Device side host integrity validation
US9256745B2 (en) Protecting operating system configuration values using a policy identifying operating system configuration settings
TWI559167B (en) A unified extensible firmware interface(uefi)-compliant computing device and a method for administering a secure boot in the uefi-compliant computing device
CN105608386A (en) Trusted computing terminal integrity measuring and proving method and device
US11503053B2 (en) Security management of an autonomous vehicle
EP3501158B1 (en) Interrupt synchronization of content between client device and cloud-based storage service
US10742412B2 (en) Separate cryptographic keys for multiple modes
CN104850792A (en) Establishment method and apparatus of trust chain of server
US20160147542A1 (en) Information processing apparatus, server apparatus, information processing system, control method, and computer program
CN110363011B (en) Method and apparatus for verifying security of UEFI-based BIOS
WO2025139716A1 (en) Firmware execution method, device and system, storage medium, and electronic device
CN111931192B (en) rootkit detection method and device and electronic equipment
CN114611117A (en) Processing method and device and electronic equipment
US20200244461A1 (en) Data Processing Method and Apparatus
US12353557B2 (en) Generating alerts for unexpected kernel modules
CN111858114B (en) Device starting exception handling and device starting control method, device and system
WO2016062080A1 (en) Profile protecting method and device, and storage medium
US20250168164A1 (en) Device verification system, device verification method, and recording medium
CN117648100B (en) Application deployment method, device, equipment and storage medium
CN113836542B (en) Trusted white list matching method, system and device
CN116108499A (en) Attack monitoring method and device
CN118013591A (en) File processing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination