期刊文献+

基于UEFI的SMBIOS设计与研究 被引量:2

Research and design of SMBIOS base on UEFI
下载PDF
导出
摘要 为加速计算机固件中SMBIOS部分开发与定制化,提出了SMBIOS系统架构,将核心服务和数据表定制分离。设计了基于UEFI规范的实现方案,以协议的方式提供核心服务,并采用独立模块将该协议注册到UEFI系统;另一模块将调用核心服务,将已收集到的计算机系统信息,根据工业规范和定制化需求组织数据表内容。以定制化的数据表类型3为例,分别在UEFI Shell和Win32控制台中,采用调用Win32系统函数和WMI的方式查看了SMBIOS内容,表明了架构的可实现性,设计的的准确性和有效性。 To speed up the development and customization about SMBIOS in computer firmware, the SMBIOS system framework is proposed, the core services and structure table are separated by this framework. The implementation scheme based on UEFI standard is designed. Core services are provided as protocol and resisted to UEFI system by independent module. The SMBIOS structure table is constructed by the collected computer system information that satisfied the industrial standard and customized demands. Core services protocol will be called in order to construct the table in another independent module. Structure table (type 3) is customized for sample to do experiment. The test application that Win32 API or WMI being called in it is running in UEFI shell and win32 console environment demonstrate the SMBIOS table content. The example is presented to prove the realiz- ability of the framework and the accuracy and efficiency of the proposed design.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第9期3348-3352,共5页 Computer Engineering and Design
基金 2012年北京工业职业技术学院青年基金项目(BGZYQN201212)
关键词 可扩展固件接口 系统管理基本输入输出系统 SMBIOS协议 模块化设计 入口结构 UEFI system management basic input output system~ SMBIOS protocol~ module design entry point structure
  • 相关文献

参考文献1

二级参考文献5

  • 1周振柳,许榕生.对计算机BIOS固件进行安全风险检测的系统和方法..中国:100451987[P].2009-01-14[2010-07-12].
  • 2DMTF,Inc..System Management BIOS(SMBIOS)Reference Specification,v2.5[EB/OL].(2006-09-05).http://www.dmtf.org/sites/default/files/standards/documents/DSP0134v2.5Final.pdf.
  • 3DMTF,Inc..Desktop Management Interface Specification,v2.0[EB/OL].(1998-06-24).http://asia.edu.tw/~rikki/neta/DMI2_0s_specification.pdf.
  • 4Intel Corp..Intel Architecture Software Developer's Manual[EB/OL].(2010-09-13).http://www.ithov.com/book/hardware/hardwarepro/40772.shtml.
  • 5白莉莉,庞建民,张一弛,岳峰.基于关键应用编程接口图的恶意代码检测[J].计算机工程,2010,36(9):139-141. 被引量:3

共引文献2

同被引文献10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部