Напомена
Приступ овој страници захтева ауторизацију. Можете покушати да се пријавите или промените директоријуме.
Приступ овој страници захтева ауторизацију. Можете покушати да промените директоријуме.
Driver signing associates a digital signature with a driver package.
Windows device installation uses digital signatures to verify the integrity of driver packages and the identity of the vendor (software publisher) provider of the driver packages. In addition, the kernel-mode driver signing policy for 64-bit versions of Windows Vista and later versions of Windows specifies that a kernel-mode driver must be signed for the driver to load.
Caution
Starting in Windows 10 and Windows Server 2016, the Windows Hardware Developer Center Dashboard must sign kernel-mode drivers. The process requires an extended validation (EV) certificate. For more information, see Driver signing policy.
Starting in Windows 10 version 1507, all drivers signed by the Hardware Dev Center are SHA2 signed. For details specific to operating system versions, see Signing requirements by version.
Kernel-mode driver binaries embed-signed with dual (SHA1 and SHA2) certificates from a non-Microsoft certificate vendor for operating systems earlier than Windows 10 might not load. The binaries can also cause a system crash on Windows 10 and later. To fix this problem, install KB 3081436. The SHA hash values are provided in the More information - File hash information section of the KB article.
In this section
- Windows 10 in S mode driver requirements
- Managing the signing process
- Test-signing drivers during development and test
- Signing drivers for public release
- Troubleshooting install and load problems with signed driver packages
- Microsoft Security Advisory 2880823
For general information about driver signing on Windows Vista and later versions of Windows, see the white paper Digital signatures for kernel modules on systems running Windows Vista.