CN107528829B - BMC chip, server side and remote monitoring management method thereof - Google Patents

BMC chip, server side and remote monitoring management method thereof Download PDF

Info

Publication number
CN107528829B
CN107528829B CN201710638536.XA CN201710638536A CN107528829B CN 107528829 B CN107528829 B CN 107528829B CN 201710638536 A CN201710638536 A CN 201710638536A CN 107528829 B CN107528829 B CN 107528829B
Authority
CN
China
Prior art keywords
bmc chip
server
verification password
secret key
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710638536.XA
Other languages
Chinese (zh)
Other versions
CN107528829A (en
Inventor
赵修齐
袁涛
高劲松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Goke Microelectronics Co Ltd
Original Assignee
Hunan Goke Microelectronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Goke Microelectronics Co Ltd filed Critical Hunan Goke Microelectronics Co Ltd
Priority to CN201710638536.XA priority Critical patent/CN107528829B/en
Publication of CN107528829A publication Critical patent/CN107528829A/en
Application granted granted Critical
Publication of CN107528829B publication Critical patent/CN107528829B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides a BMC chip, which comprises a system bus, a BMC chip and a BMC chip, wherein the system bus is communicated with each functional unit; the memory module is used for storing a preset secret key and the ID of the BMC chip; the mainboard control interface unit is used for connecting a server mainboard to realize communication; the network end module is used for connecting the client to receive a connection request and a verification password sent by the client; the main processor is used for controlling the mainboard control interface unit to be connected with the server mainboard to realize communication control; and the safety subsystem is used for reading the preset secret key stored in the storage module, the ID of the BMC chip and the verification password received by the network end module, and verifying the verification password according to a preset rule. The invention also provides a server side and a server side remote monitoring management method. Compared with the related technology, the BMC chip, the server side and the remote monitoring and management method thereof have high safety and good reliability.

Description

BMC chip, server side and remote monitoring management method thereof
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a BMC chip, a server side and a remote monitoring and management method thereof.
Background
With the prevalence of the internet era, more and more communication devices become a part of people's lives. Meanwhile, communication security is also a concern, and the concern directly affects the use of communication equipment.
Currently, with the development and application of cloud computing, the demand of hardware server devices is also developed from an initial single or small demand mode to a large-scale and large-batch demand mode to date. With the development of server technology, a server with out-of-band Management functions, which uses a Baseboard Management Controller (BMC) as a core, is also more widely used and has more and more powerful functions. The development from in-band management to out-of-band management is server management, and the development from management of several server motherboards is monitoring and management of group server motherboards, so that monitoring and management of large server groups through networks has become a main approach, and the safety and reliability of monitoring and management of server motherboards through networks are also increasingly important.
Therefore, there is a need to provide a new BMC chip, a server and a remote monitoring management method thereof to solve the above problems.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a BMC chip with good safety and reliability, a server side and a remote monitoring management method thereof.
The invention provides a BMC chip, which comprises a system bus, a BMC chip and a control unit, wherein the system bus is used for being connected with each functional unit and realizing the mutual communication of each functional unit; the storage module is used for storing a preset secret key and the ID of the BMC chip; the mainboard control interface unit is used for connecting a server mainboard to realize communication; the network end module is used for connecting the client to receive a connection request and a verification password sent by the client and connecting the client with the BMC chip to realize communication verification; the main processor is used for controlling the mainboard control interface unit to be connected with the server mainboard to realize communication control; and the safety subsystem is used for reading the preset secret key stored in the storage module, the ID of the BMC chip and the verification password received by the network end module, and encrypting the preset secret key and the ID of the BMC chip according to a preset rule so as to realize the verification of the verification password.
Preferably, the security subsystem includes an auxiliary processor and an encryption engine, which are communicatively connected to each other, and the auxiliary processor is configured to read the preset key, the ID of the BMC chip, and the verification password; and the encryption engine encrypts the preset secret key and the ID of the BMC chip according to a preset rule and then realizes the verification of the verification password.
Preferably, the BMC chip further includes: the peripheral interface unit is used for connecting a peripheral circuit of the server mainboard; and the display system is used for displaying the communication connection information of the peripheral connection port unit and the mainboard control interface unit, and the network end module is also used for feeding back the communication connection information to the client.
Preferably, the display system includes a VGA input/output line.
Preferably, the storage module is an EFUSE module.
The invention also provides a server side which comprises a central processing unit, a north bridge unit and a south bridge unit which are sequentially in communication connection, and the server side also comprises the BMC chip provided by the invention, and the BMC chip is in communication connection with the south bridge unit.
The invention also provides a server end remote monitoring and management method, wherein the server end comprises a BMC chip, and the method comprises the following steps:
the server end stores a preset secret key and the ID of the BMC chip;
the server side receives a connection request and a verification password sent by the client side;
the server side verifies the verification password: the server side verifies the verification password in a mode of encrypting the preset secret key and the ID of the BMC chip according to a preset rule;
and the server side sends request information corresponding to the connection request to the client side, so that the client side monitors and manages the server side.
Preferably, the BMC chip includes a security subsystem and a storage module;
storing the preset secret key and the ID of the BMC chip through the storage module;
and encrypting the preset secret key and the ID of the BMC chip according to a preset rule through the safety subsystem, and then verifying the verification password.
Preferably, the security subsystem comprises an auxiliary processor and an encryption engine which are in communication connection with each other; reading the preset secret key, the ID of the BMC chip and the verification password through the auxiliary processor; and encrypting the preset secret key and the ID of the BMC chip according to a preset rule by the encryption engine to realize the verification of the verification password.
Preferably, the BMC chip further includes a network end module, and the step of receiving, at the server end, the connection request and the verification password sent by the client includes the following steps:
receiving the verification password through the network terminal module and generating an interrupt to the auxiliary processor;
and the auxiliary processor reads the verification password of the network end module and reads the preset secret key in the storage module and the ID of the BMC chip.
Compared with the prior art, the BMC chip is provided with the security subsystem, the storage module stores the preset secret key and the ID of the BMC chip, after a connection request and a verification password sent by a client are sent, the auxiliary processor of the security subsystem is required to control the encryption engine to encrypt the preset secret key and the ID of the BMC chip according to a preset rule, verification of the verification password is achieved, the connection request of the client is achieved after the verification is passed, and the security and the reliability of the BMC chip are improved. The server and the server remote monitoring management method have higher safety and reliability.
Drawings
The present invention will be described in detail below with reference to the accompanying drawings. The foregoing and other aspects of the invention will become more apparent and more readily appreciated from the following detailed description, taken in conjunction with the accompanying drawings. In the drawings:
FIG. 1 is a block diagram of a BMC chip and client connection provided by the present invention;
FIG. 2 is a block diagram of a server according to the present invention;
FIG. 3 is a flow chart of a server-side remote monitoring management method according to the present invention;
FIG. 4 is a block diagram illustrating a sub-flow of step S2 of the remote monitoring and management method of the server side according to the present invention;
fig. 5 is a sub-flowchart of step S3 of the server-side remote monitoring management method according to the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings.
The embodiments/examples described herein are specific embodiments of the present invention, are intended to be illustrative of the concepts of the present invention, are intended to be illustrative and exemplary, and should not be construed as limiting the embodiments and scope of the invention. In addition to the embodiments described herein, those skilled in the art will be able to employ other technical solutions which are obvious based on the disclosure of the claims and the specification of the present application, and these technical solutions include those which make any obvious replacement or modification of the embodiments described herein, and all of which are within the scope of the present invention.
Fig. 1 is a block diagram of a connection structure between a BMC chip and a client according to the present invention. The invention provides a BMC (baseboard management controller) chip 100, which comprises a system bus 1, and a storage module 2, a mainboard control interface unit 3, a network end module 4, a main processor 5, a security subsystem 6, a peripheral interface unit 7 and a display system 8 which are respectively in communication connection with the system bus 1.
The system bus 1 is used for realizing the mutual communication among all the functional units. The system bus 1 may also include any number of interconnected buses and bridges.
The storage module 2 is configured to store a preset key and an ID of the BMC chip. In this embodiment, the storage module 2 is an EFUSE module. And the preset secret key and the ID of the BMC chip are written in through a one-time programming module. Different BMC chips have different IDs, the unique ID of the BMC chip 100 and the preset key are stored through the storage module 2 to ensure that different chips have different verification modes, and the safety and the reliability of the BMC chip 100 are improved.
The motherboard control interface unit 3 is used for connecting a server motherboard (not shown) to realize communication. For example, the main processor 5 controls the main board control interface unit 3 to implement supervision and management on a server system. For example, the motherboard control interface unit 3 is connected to a south bridge unit of a server motherboard via PCIE or USB interfaces to implement communication.
The network end module 4 is configured to connect to the client 10 to receive a connection request and a verification password sent by the client 10 and connect to the BMC chip 100 to implement communication verification. That is, the client 10 realizes the connection communication connection with the BMC chip 100 through the network module 4, and when the client 10 needs to communicate with the BMC chip 100, a connection request and a verification password are sent and received by the network module 4. Meanwhile, the network end module 4 is further configured to receive a connection request and an authentication password sent by the client 10 and then generate an interrupt to the security subsystem 6. In this embodiment, the network end module 4 includes an Ethernet controller, a PHY physical layer, and the like.
The main processor 5 is used for controlling the mainboard control interface unit 3 to connect with a server mainboard to realize communication control, and is used for controlling each functional unit to execute related programs. For example, the main processor 5 is an ARM CPU.
The security subsystem 6 is configured to read the preset key stored in the storage module 2, the ID of the BMC chip, and the verification password received by the network side module 4, and encrypt the preset key and the ID of the BMC chip according to a preset rule to verify the verification password, so that the security of the BMC chip 100 is higher.
In this embodiment, specifically, the security subsystem 6 includes an auxiliary processor 61 and an encryption engine 62, which are communicatively connected to each other.
The auxiliary processor 61 is configured to read the preset key, the ID of the BMC chip, and the verification password. After the network end module 4 receives the connection request and the verification password sent by the client 10, the network end module 4 generates an interrupt to the auxiliary processor 61, so that the auxiliary processor 61 reads the verification password.
In the present embodiment, the auxiliary processor 61 is an independent safety CPU, and has a high level of safety.
And the encryption engine 62 encrypts the preset secret key and the ID of the BMC chip according to a preset rule to verify the verification password. For example, if the verification is passed, the main processor 5 implements remote monitoring and management of the client 10 on a server using the BMC chip 100 through a connection request of the client 10.
The peripheral interface unit 7 is used for connecting a peripheral circuit of a server motherboard to realize control of each function and interface. In this embodiment, the peripheral interface unit 7 includes interfaces such as IIC, SPI, SDIO, and the like.
The display system 8 is configured to display communication connection information between the peripheral connection port unit and the motherboard control interface unit 3, and feed back the communication connection information to the client 10 through the network side module 4. In this embodiment, the display system 8 includes a VGA input/output line.
Please refer to fig. 2, which is a block diagram of a server according to the present invention. The invention further provides a server 200, which comprises a central processing unit 201, a north bridge unit 202, a south bridge unit 203 and the BMC chip 100 provided by the invention, which are sequentially in communication connection, wherein the BMC chip 100 is in communication connection with the south bridge unit 203. Specifically, the BMC chip 100 is connected to the south bridge unit 203 of the server 200 through the motherboard control interface unit 3 via interfaces such as PCIE or USB, so as to implement communication.
In this embodiment, the structure of the BMC chip 100 is described in detail in the above description, and is not described herein again.
The server 200 has a high security by installing the BMC chip 100, which includes the auxiliary processor 61 of the security subsystem 6 as an independent security CPU. When the client 20 needs to remotely monitor the server 200, a verification password needs to be provided for verification, and the state of the relevant device or the switch of the control device can be checked only after the verification, so that the system security of the server 200 is ensured from the source of the BMC chip 100.
Please refer to fig. 3, which is a flowchart illustrating a remote monitoring and managing method of a server according to the present invention. The present invention also provides a server-side remote monitoring and management method, where the server side includes a BMC chip, and in this embodiment, the server side 200 and the BMC chip 100 provided in the present invention are taken as examples for description, and the method includes the following steps:
step S1, the server 200 stores a preset key and the ID of the BMC chip:
in this step, the preset key and the ID of the BMC chip are specifically stored by the storage module 2. The storage module 2 is an EFUSE module. And the preset secret key and the ID of the BMC chip are written in through a one-time programming module to realize storage.
Because different BMC chips have different IDs, the unique ID and the preset key of the BMC chip 100 are stored in the storage module 2 to ensure that different chips have different verification methods, thereby increasing the security and reliability of the BMC chip 100.
Step S2, the server 200 receives the connection request and the verification password sent by the client 100:
referring to fig. 4, a sub-flow diagram of step S2 of the server-side remote monitoring management method according to the present invention is shown. The method specifically comprises the following steps:
step S21, receiving the verification password through the network side module 4, and generating an interrupt to the auxiliary processor 61.
Step S22, the auxiliary processor 61 reads the verification password on the network end module 4, and reads the preset key and the ID of the BMC chip in the storage module 2.
Step S3, the server 200 verifies the verification password:
specifically, the server 200 verifies the verification password by encrypting the preset key and the ID of the BMC chip according to a preset rule.
In this step, the server 200 specifically encrypts the preset key and the ID of the BMC chip according to a preset rule through the security subsystem 6 of the BMC chip 100, and then verifies the verification password.
Please refer to fig. 5, which is a sub-flowchart of step S3 of the remote monitoring and management method of the server side according to the present invention. The method comprises the following specific steps:
step S31, reading the preset key, the ID of the BMC chip, and the verification password by the auxiliary processor 61.
Step S32, the encryption engine 62 encrypts the preset key and the ID of the BMC chip according to a preset rule, and then verifies the verification password.
If the verification is passed, the flow proceeds to step S4;
if the verification fails, the server 200 rejects the connection request of the client; or the client continues to send the connection request and the authentication password, and proceeds to step S2.
Step S4, the server 200 sends request information corresponding to the connection request to the client 100, so as to implement monitoring and management of the server 200 by the client 100.
In this step, the display system 8 feeds back information of the peripheral interface unit 7 connected to the peripheral circuit of the server motherboard, including interface connection information such as IIC, SPI, SDIO, and communication connection information of the peripheral interface unit 7 and the motherboard control interface unit 3, including VGA input/output lines, to the client 10 via the network side module 4. The client 10 can check the state of the relevant device or the information such as the switch of the control device, so as to realize that the client 10 remotely monitors and manages the system of the server 200. The system security of the server 200 is ensured from the source of the BMC chip 100.
It should be noted that the system bus 1 may include any number of interconnected buses and bridges. The system bus 1 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. For different user devices, the peripheral interface unit 7 may also be an interface capable of externally connecting and connecting a desired device, and the connected device includes but is not limited to a keypad, a display, a mouse, and the like.
The main processor 5 is responsible for managing the system bus and general processing, and the storage module 2 may also store data used by the main processor 5 in performing operations.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be physically included alone, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute some steps of the transceiving method according to various embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It should be noted that the above-mentioned embodiments described with reference to the drawings are only intended to illustrate the present invention and not to limit the scope of the present invention, and it should be understood by those skilled in the art that modifications and equivalent substitutions can be made without departing from the spirit and scope of the present invention. Furthermore, unless the context indicates otherwise, words that appear in the singular include the plural and vice versa. Additionally, all or a portion of any embodiment may be utilized with all or a portion of any other embodiment, unless stated otherwise.
Compared with the prior art, the BMC chip is provided with the security subsystem, the storage module stores the preset secret key and the ID of the BMC chip, after a connection request and a verification password sent by a client are sent, the auxiliary processor of the security subsystem is required to control the encryption engine to encrypt the preset secret key and the ID of the BMC chip according to a preset rule, verification of the verification password is achieved, the connection request of the client is achieved after the verification is passed, and the security and the reliability of the BMC chip are improved. The server and the server remote monitoring management method have higher safety and reliability. The method has better safety and strong reliability in the safety problem of common internet application, particularly when the equipment of the application system of various intelligent equipment manufacturers needs to perform stateless communication with the server side of the internet.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (7)

1. A BMC chip is provided, which comprises
The system bus is used for being connected with each functional unit and realizing the mutual communication of each functional unit;
the storage module is used for storing a preset secret key and the ID of the BMC chip;
the mainboard control interface unit is used for connecting a server mainboard to realize communication;
the network end module is used for connecting the client to receive a connection request and a verification password sent by the client and connecting the client with the BMC chip to realize communication verification;
the main processor is used for controlling the mainboard control interface unit to be connected with the server mainboard to realize communication control; and
the security subsystem is used for reading the preset secret key stored in the storage module, the ID of the BMC chip and the verification password received by the network end module, encrypting the preset secret key and the ID of the BMC chip according to a preset rule to realize verification of the verification password, and comprises an auxiliary processor and an encryption engine which are in communication connection with each other, wherein the auxiliary processor is used for reading the preset secret key, the ID of the BMC chip and the verification password; the encryption engine encrypts the preset secret key and the ID of the BMC chip according to a preset rule and then verifies the verification password; the auxiliary processor is an independent secure CPU.
2. The BMC chip of claim 1, wherein the BMC chip further comprises:
the peripheral interface unit is used for connecting a peripheral circuit of the server mainboard; and
and the display system is used for displaying the communication connection information of the peripheral connection port unit and the mainboard control interface unit, and the network end module is also used for feeding back the communication connection information to the client.
3. The BMC chip of claim 2, wherein the display system includes a VGA input/output line.
4. The BMC chip of claim 1, wherein the storage module is an EFUSE module.
5. A server side, comprising a central processing unit, a north bridge unit and a south bridge unit which are sequentially connected in a communication manner, wherein the server side further comprises a BMC chip according to any one of claims 1-4, and the BMC chip is connected with the south bridge unit in a communication manner.
6. A server end remote monitoring management method is provided, wherein the server end comprises a BMC chip, and the method is characterized by comprising the following steps:
the server end stores a preset secret key and the ID of the BMC chip;
the server side receives a connection request and a verification password sent by the client side;
the server side verifies the verification password: the server side verifies the verification password in a mode of encrypting the preset secret key and the ID of the BMC chip according to a preset rule;
the server side sends request information corresponding to the connection request to the client side, and monitoring management of the client side on the server side is achieved;
the BMC chip comprises a security subsystem and a storage module;
storing the preset secret key and the ID of the BMC chip through the storage module;
the safety subsystem encrypts the preset secret key and the ID of the BMC chip according to a preset rule and then verifies the verification password;
the security subsystem comprises an auxiliary processor and an encryption engine which are in communication connection with each other;
reading the preset secret key, the ID of the BMC chip and the verification password through the auxiliary processor;
the preset secret key and the ID of the BMC chip are encrypted through the encryption engine according to a preset rule, and then the verification of the verification password is achieved;
the auxiliary processor is an independent secure CPU.
7. The server-side remote monitoring and management method according to claim 6, wherein the BMC chip further comprises a web-side module, and the steps of receiving a connection request and a verification password sent by a client at the server side specifically comprise the following steps:
receiving the verification password through the network terminal module and generating an interrupt to the auxiliary processor;
and the auxiliary processor reads the verification password of the network end module and reads the preset secret key in the storage module and the ID of the BMC chip.
CN201710638536.XA 2017-07-31 2017-07-31 BMC chip, server side and remote monitoring management method thereof Active CN107528829B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710638536.XA CN107528829B (en) 2017-07-31 2017-07-31 BMC chip, server side and remote monitoring management method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710638536.XA CN107528829B (en) 2017-07-31 2017-07-31 BMC chip, server side and remote monitoring management method thereof

Publications (2)

Publication Number Publication Date
CN107528829A CN107528829A (en) 2017-12-29
CN107528829B true CN107528829B (en) 2021-07-27

Family

ID=60680239

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710638536.XA Active CN107528829B (en) 2017-07-31 2017-07-31 BMC chip, server side and remote monitoring management method thereof

Country Status (1)

Country Link
CN (1) CN107528829B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229209B (en) * 2018-01-02 2021-11-12 湖南国科微电子股份有限公司 BMC chip with double CPU frameworks and autonomous security improving method thereof
CN108833593A (en) * 2018-07-26 2018-11-16 郑州云海信息技术有限公司 Smart machine monitoring device and monitoring method, system, equipment, computer media
CN109144910A (en) * 2018-10-09 2019-01-04 郑州云海信息技术有限公司 A kind of method and device that the inside serial ports with storage equipment is communicated
CN109784098B (en) * 2019-01-23 2023-01-17 湖南国科微电子股份有限公司 Encryption device of AI accelerator and data processing method thereof
CN112182666A (en) * 2020-09-27 2021-01-05 山东超越数控电子股份有限公司 BMC software encryption registration method and tool based on BMC management board
CN113360921A (en) * 2021-05-08 2021-09-07 山东英信计算机技术有限公司 Encryption protection system and server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222340A (en) * 2006-12-27 2008-07-16 国际商业机器公司 Method of power state control for a clientbladetm in a bladecentertm system
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
CN104410636A (en) * 2014-12-01 2015-03-11 浪潮集团有限公司 Method for enhancing security of BMC/SMC in cloud computing system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7506363B2 (en) * 2004-08-26 2009-03-17 Ineternational Business Machines Corporation Methods, systems, and computer program products for user authorization levels in aggregated systems
CN104036595B (en) * 2013-03-08 2016-11-16 乐金信世股份有限公司 The Automatic teller machine of reimbursement, method and system is received for the fee
CN105955858A (en) * 2016-05-10 2016-09-21 浪潮电子信息产业股份有限公司 Method and device for testing log recording function of BMC (Baseboard Management Controller)

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222340A (en) * 2006-12-27 2008-07-16 国际商业机器公司 Method of power state control for a clientbladetm in a bladecentertm system
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
CN104410636A (en) * 2014-12-01 2015-03-11 浪潮集团有限公司 Method for enhancing security of BMC/SMC in cloud computing system

Also Published As

Publication number Publication date
CN107528829A (en) 2017-12-29

Similar Documents

Publication Publication Date Title
CN107528829B (en) BMC chip, server side and remote monitoring management method thereof
CN106549750B (en) With the method implemented by computer and use its system and computer program product
TWI747836B (en) Device birth certificate
US9998464B2 (en) Storage device security system
US10318736B2 (en) Validating operating firmware of a periperhal device
TWI277904B (en) Method, recording medium and system for protecting information
CN111052118A (en) Hardware-implemented firmware security
US9367510B2 (en) Backplane controller for handling two SES sidebands using one SMBUS controller and handler controls blinking of LEDs of drives installed on backplane
JP2021083110A (en) In-vehicle electronic control unit upgrade method, device, apparatus, and vehicle system
US20180288049A1 (en) Data access interface for clustered devices
TWI677250B (en) Network system and authenticating method
CN117112474B (en) Universal trusted substrate management method and system
US10049029B1 (en) Networked multi-interface host debugger
CN103093139B (en) Integrated circuit (IC) card intelligent gas meter information safety management module
US11190519B2 (en) Dock administration using a token
US11416615B2 (en) Configuring trusted remote management communications using UEFI
TW202026938A (en) System and method to recover fpga firmware over a sideband interface
US11146389B2 (en) Method and apparatus for ensuring integrity of keys in a secure enterprise key manager solution
CN111783120A (en) Data interaction method, computing device, BMC chip and electronic device
US20230126468A1 (en) Information handling system bus out of band message access control
US11907373B2 (en) Validation of fixed firmware profiles for information handling systems
JP2023060451A (en) Information processing device, authenticity verification method, and program
CN115061826A (en) Component communication method and computing device
CN113434324A (en) Abnormal information acquisition method, system, device and storage medium
CN103236113B (en) IC-card intelligent electric energy meter information security management module

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant