CN113127034B - BMC-based board card updating method, system, equipment and medium - Google Patents

BMC-based board card updating method, system, equipment and medium Download PDF

Info

Publication number
CN113127034B
CN113127034B CN202110381353.0A CN202110381353A CN113127034B CN 113127034 B CN113127034 B CN 113127034B CN 202110381353 A CN202110381353 A CN 202110381353A CN 113127034 B CN113127034 B CN 113127034B
Authority
CN
China
Prior art keywords
production information
bit
replaceable unit
field replaceable
sixteen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110381353.0A
Other languages
Chinese (zh)
Other versions
CN113127034A (en
Inventor
张家豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Yingxin Computer Technology Co Ltd
Original Assignee
Shandong Yingxin Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Yingxin Computer Technology Co Ltd filed Critical Shandong Yingxin Computer Technology Co Ltd
Priority to CN202110381353.0A priority Critical patent/CN113127034B/en
Publication of CN113127034A publication Critical patent/CN113127034A/en
Application granted granted Critical
Publication of CN113127034B publication Critical patent/CN113127034B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a BMC-based board card updating method, a system, equipment and a storage medium, wherein the method comprises the following steps: writing the original production information of all the boards into a first field replaceable unit, recording the original production information into a server, encrypting the original production information, and writing the encrypted original production information into a second field replaceable unit; in response to the update authentication of the board to be tested, switching the communication line between the BMC and the first field replaceable unit to the second field replaceable unit, and acquiring encrypted production information corresponding to the board to be tested from the second field replaceable unit; decrypting the encrypted production information, and matching the decrypted production information with the original production information in the server; and updating the board to be tested in response to the decrypted production information being matched with the corresponding original production information. The invention can judge the effectiveness of the board card to be tested and update the effectiveness correspondingly through the switching between the first field replaceable unit and the second field replaceable unit.

Description

BMC-based board card updating method, system, equipment and medium
Technical Field
The present invention relates to the field of servers, and in particular, to a method, a system, a computer device, and a readable medium for updating boards based on a BMC.
Background
The current server multi-board card uses BMC to record the CODEs, and the CODEs of each board card are different. In design, each single board can only have a BMC recording mode, so that the problem of insufficient elasticity is caused, and the problem of insufficient elasticity is not enough to face the current deformation design of multiple SKUs (Stock Keeping Unit, stock units) of a single system. Therefore, a large number of boards with small changes are required to be manufactured, a large number of material numbers are required to be managed and controlled in stock, and the materials are easy to confuse.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method, a system, a computer device and a computer readable storage medium for updating a board card based on a BMC, which greatly reduces the number of similar boards and CMC (system management controller) boards designed for supporting different SKUs by switching a first replaceable unit and a second replaceable unit, automatically determines a CODE adapted to the BMC, automatically records the BMC CODE, and simultaneously newly adds an online determination encryption security mechanism, so that the security performance of the board card is higher.
Based on the above object, an aspect of the embodiment of the present invention provides a method for updating a board card based on a BMC, including the following steps: writing original production information of all the boards into a first field replaceable unit, recording the original production information into a server, encrypting the original production information, and writing the encrypted original production information into a second field replaceable unit; in response to updating authentication of the board to be tested, switching communication lines of the BMC and the first field replaceable unit to the second field replaceable unit, and acquiring encrypted production information corresponding to the board to be tested from the second field replaceable unit; decrypting the encrypted production information and matching the decrypted production information with the original production information in the server; and updating the board to be tested in response to the decrypted production information being matched with the corresponding original production information.
In some embodiments, said encrypting and writing said original production information to a second field replaceable unit comprises: and converting the original production information into ASCII codes, performing sixteen-bit encryption on the ASCII codes, and performing CRC (cyclic redundancy check) secondary encryption on the sixteen-bit numbers after encryption.
In some embodiments, the CRC twice encrypting the encrypted sixteen bits comprises: processing the encrypted sixteen digits according to the exclusive-or gate, and judging whether the processed sixteen digits are output as one or zero; in response to the processed sixteen-bit number output being one, flipping the data and shifting each bit of the data one bit to the right; and in response to the processed sixteen-bit number output being zero, holding the data unchanged and shifting each bit of the data one bit to the right.
In some embodiments, the decrypting the encrypted production information includes: and obtaining a public key in the second field replaceable unit, and decrypting the production information by combining a private key in the BMC.
In another aspect of the embodiment of the present invention, a system for updating a board card based on a BMC is provided, including: the recording module is configured to write the original production information of all the boards into the first field replaceable unit, record the original production information into the server, encrypt the original production information and write the encrypted original production information into the second field replaceable unit; the switching module is configured to respond to update authentication of the board card to be tested, switch the communication line between the BMC and the first field replaceable unit to the second field replaceable unit, and acquire encrypted production information corresponding to the board card to be tested from the second field replaceable unit; the decryption module is configured to decrypt the encrypted production information and match the decrypted production information with the original production information in the server; and the updating module is configured to respond to the fact that the decrypted production information is matched with the corresponding original production information, and update the board to be tested.
In some embodiments, the recording module is configured to: and converting the original production information into ASCII codes, performing sixteen-bit encryption on the ASCII codes, and performing CRC (cyclic redundancy check) secondary encryption on the sixteen-bit numbers after encryption.
In some embodiments, the recording module is configured to: processing the encrypted sixteen digits according to the exclusive-or gate, and judging whether the processed sixteen digits are output as one or zero; in response to the processed sixteen-bit number output being one, flipping the data and shifting each bit of the data one bit to the right; and in response to the processed sixteen-bit number output being zero, holding the data unchanged and shifting each bit of the data one bit to the right.
In some embodiments, the decryption module is configured to: and obtaining a public key in the second field replaceable unit, and decrypting the production information by combining a private key in the BMC.
In yet another aspect of the embodiment of the present invention, there is also provided a computer apparatus, including: at least one processor; and a memory storing computer instructions executable on the processor, which when executed by the processor, perform the steps of the method as above.
In yet another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium storing a computer program which, when executed by a processor, implements the method steps as described above.
The invention has the following beneficial technical effects: through the switching of the first replaceable unit and the second replaceable unit, the number of similar main boards and CMC (system management controller) boards designed for supporting different SKUs is greatly reduced, the BMC adaptive CODE is automatically judged, the BMC CODE is automatically recorded, and meanwhile an on-line judging encryption security mechanism is newly added, so that the security performance of the board card is higher.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are necessary for the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention and that other embodiments may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an embodiment of a method for updating boards based on a BMC according to the present invention;
FIG. 2 is a schematic diagram illustrating the operation of CRC32 encryption;
FIG. 3a is a circuit diagram of a first replaceable unit according to an embodiment of the present invention;
FIG. 3b is a circuit diagram of a second replaceable unit in an embodiment of the present invention;
FIG. 3c is a circuit diagram of reading information of the first replaceable unit or the second replaceable unit according to an embodiment of the present invention;
fig. 4 is a schematic hardware structure diagram of an embodiment of a computer device for updating a board card based on a BMC according to the present invention;
fig. 5 is a schematic diagram of an embodiment of a computer storage medium for updating boards based on a BMC according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention will be described in further detail with reference to the accompanying drawings.
It should be noted that, in the embodiments of the present invention, all the expressions "first" and "second" are used to distinguish two entities with the same name but different entities or different parameters, and it is noted that the "first" and "second" are only used for convenience of expression, and should not be construed as limiting the embodiments of the present invention, and the following embodiments are not described one by one.
Based on the above object, in a first aspect of the embodiment of the present invention, an embodiment of a method for updating a board card based on a BMC is provided. Fig. 1 is a schematic diagram of an embodiment of a method for updating a board card based on a BMC according to the present invention. As shown in fig. 1, the embodiment of the present invention includes the following steps:
s1, writing original production information of all boards into a first field replaceable unit, recording the original production information into a server, encrypting the original production information, and writing the encrypted original production information into a second field replaceable unit;
s2, in response to updating authentication of the board to be tested, switching a communication line between the BMC and the first field replaceable unit to a second field replaceable unit, and acquiring encrypted production information corresponding to the board to be tested from the second field replaceable unit;
s3, decrypting the encrypted production information, and matching the decrypted production information with original production information in a server; and
and S4, updating the board to be tested in response to the fact that the decrypted production information is matched with the corresponding original production information.
And writing the original production information of all the boards into the first field replaceable unit, recording the original production information into the server, encrypting the original production information, and writing the encrypted original production information into the second field replaceable unit. The original production information includes information such as production date, material number, serial number, etc., and in general, the first field replaceable unit (FRU 1) records the original production information of all boards, and the second field replaceable unit (FRU 2) records the encrypted production information of all boards.
In some embodiments, said encrypting and writing said original production information to a second field replaceable unit comprises: and converting the original production information into ASCII codes, performing sixteen-bit encryption on the ASCII codes, and performing CRC (Cyclic Redundancy Check ) secondary encryption on the sixteen-bit numbers after encryption. For example, digits or characters in the production information may be converted into ASCII codes and then into sixteen digits for encryption, the encryption method is not limited herein, and then the encrypted sixteen digits may be secondarily encrypted using CRC.
In some embodiments, the CRC twice encrypting the encrypted sixteen bits comprises: processing the encrypted sixteen digits according to the exclusive-or gate, and judging whether the processed sixteen digits are output as one or zero; in response to the processed sixteen-bit number output being one, flipping the data and shifting each bit of the data one bit to the right; and in response to the processed sixteen-bit number output being zero, holding the data unchanged and shifting each bit of the data one bit to the right.
Fig. 2 is a schematic diagram illustrating the operation of the CRC32 encryption method, and as shown in fig. 2, the sixteen digits are divided into four parts, the first part includes fifteenth and sixteenth digits, the second part is fourteenth, the third part is tenth and thirteenth digits, and the remaining digits are fourth part. The sixteenth bit is input, the fifteenth bit is output, and the output bit is exclusive-ored with the tap (i.e., the first bit). The output can be obtained after exclusive OR operation for several times, when the output is one, the data is overturned to the right to move to the next position, and the data is directly moved to the right to the next position without the position of the exclusive OR gate; when the output is zero, the number is moved directly to the right to the next position.
And in response to the update authentication of the board to be tested, switching the communication line between the BMC and the first field replaceable unit to the second field replaceable unit, and acquiring encrypted production information corresponding to the board to be tested from the second field replaceable unit. Decrypting the encrypted production information and matching the decrypted production information with the original production information in the server.
In some embodiments, the decrypting the encrypted production information includes: and obtaining a public key in the second field replaceable unit, and decrypting the production information by combining a private key in the BMC.
And updating the board to be tested in response to the decrypted production information being matched with the corresponding original production information. If the decrypted production information can be matched with the corresponding original production information, the board to be tested is a legal board, and whether the board to be tested is updated or not can be determined according to the version of the board to be tested.
It should be noted that, in the embodiments of the method for updating boards based on the BMC, the steps may be intersected, replaced, added and deleted, so that the method for updating boards based on the BMC by using these reasonable permutation and combination changes should also belong to the protection scope of the present invention, and the protection scope of the present invention should not be limited to the embodiments.
Based on the above object, a second aspect of the embodiment of the present invention provides a system for updating a board card based on a BMC, including: the recording module is configured to write the original production information of all the boards into the first field replaceable unit, record the original production information into the server, encrypt the original production information and write the encrypted original production information into the second field replaceable unit; the switching module is configured to respond to update authentication of the board card to be tested, switch the communication line between the BMC and the first field replaceable unit to the second field replaceable unit, and acquire encrypted production information corresponding to the board card to be tested from the second field replaceable unit; the decryption module is configured to decrypt the encrypted production information and match the decrypted production information with the original production information in the server; and the updating module is configured to respond to the fact that the decrypted production information is matched with the corresponding original production information, and update the board to be tested.
In some embodiments, the recording module is configured to: and converting the original production information into ASCII codes, performing sixteen-bit encryption on the ASCII codes, and performing CRC (cyclic redundancy check) secondary encryption on the sixteen-bit numbers after encryption.
In some embodiments, the recording module is configured to: processing the encrypted sixteen digits according to the exclusive-or gate, and judging whether the processed sixteen digits are output as one or zero; in response to the processed sixteen-bit number output being one, flipping the data and shifting each bit of the data one bit to the right; and in response to the processed sixteen-bit number output being zero, holding the data unchanged and shifting each bit of the data one bit to the right.
In some embodiments, the decryption module is configured to: and obtaining a public key in the second field replaceable unit, and decrypting the production information by combining a private key in the BMC.
FIG. 3a is a circuit diagram of a first replaceable unit according to an embodiment of the present invention; FIG. 3b is a circuit diagram of a second replaceable unit in an embodiment of the present invention; fig. 3c is a circuit diagram of reading information of the first replaceable unit or the second replaceable unit according to an embodiment of the present invention. As can be seen from fig. 3a-3c, in general, the BMC communicates with the fru1_data, and when the board to be tested is authenticated, the connection channel is switched so that the BMC communicates with the fru2_data. FRU_SELECT2 can be used for matching corresponding boards on the server according to the acquired production information.
In view of the above object, a third aspect of the embodiments of the present invention provides a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions being executable by the processor to perform the steps of: s1, writing original production information of all boards into a first field replaceable unit, recording the original production information into a server, encrypting the original production information, and writing the encrypted original production information into a second field replaceable unit; s2, in response to updating authentication of the board to be tested, switching a communication line between the BMC and the first field replaceable unit to a second field replaceable unit, and acquiring encrypted production information corresponding to the board to be tested from the second field replaceable unit; s3, decrypting the encrypted production information, and matching the decrypted production information with original production information in a server; and S4, updating the board to be tested in response to the fact that the decrypted production information is matched with the corresponding original production information.
In some embodiments, said encrypting and writing said original production information to a second field replaceable unit comprises: and converting the original production information into ASCII codes, performing sixteen-bit encryption on the ASCII codes, and performing CRC (cyclic redundancy check) secondary encryption on the sixteen-bit numbers after encryption.
In some embodiments, the CRC twice encrypting the encrypted sixteen bits comprises: processing the encrypted sixteen digits according to the exclusive-or gate, and judging whether the processed sixteen digits are output as one or zero; in response to the processed sixteen-bit number output being one, flipping the data and shifting each bit of the data one bit to the right; and in response to the processed sixteen-bit number output being zero, holding the data unchanged and shifting each bit of the data one bit to the right.
In some embodiments, the decrypting the encrypted production information includes: and obtaining a public key in the second field replaceable unit, and decrypting the production information by combining a private key in the BMC.
Fig. 4 is a schematic hardware structure diagram of an embodiment of the above-mentioned computer device for updating boards based on BMC according to the present invention.
Taking the example of the apparatus shown in fig. 4, the apparatus includes a processor 201 and a memory 202, and may further include: an input device 203 and an output device 204.
The processor 201, memory 202, input devices 203, and output devices 204 may be connected by a bus or other means, for example in fig. 4.
The memory 202 is used as a non-volatile computer readable storage medium, and can be used to store non-volatile software programs, non-volatile computer executable programs, and modules, such as program instructions/modules corresponding to the method for updating boards based on the BMC in the embodiments of the present application. The processor 201 executes various functional applications and data processing of the server by running nonvolatile software programs, instructions and modules stored in the memory 202, that is, a method for updating boards based on the BMC according to the above method embodiment is implemented.
Memory 202 may include a storage program area that may store an operating system, at least one application program required for functionality, and a storage data area; the storage data area may store data created according to the use of a method of updating boards based on the BMC, etc. In addition, memory 202 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some embodiments, memory 202 may optionally include memory located remotely from processor 201, which may be connected to the local module via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 203 may receive input information such as a user name and a password. The output device 204 may include a display device such as a display screen.
One or more program instructions/modules corresponding to the method for updating boards based on the BMC are stored in the memory 202, and when executed by the processor 201, the method for updating boards based on the BMC in any of the above method embodiments is executed.
Any embodiment of the computer device executing the method for updating the board card based on the BMC can achieve the same or similar effect as any corresponding embodiment of the method.
The invention also provides a computer readable storage medium storing a computer program which when executed by a processor performs the method as above.
Fig. 5 is a schematic diagram of an embodiment of the computer storage medium for updating a board card based on the BMC according to the present invention. Taking a computer storage medium as shown in fig. 5 as an example, the computer readable storage medium 3 stores a computer program 31 that when executed by a processor performs the above method.
Finally, it should be noted that, as will be appreciated by those skilled in the art, all or part of the processes in the methods of the embodiments described above may be implemented by a computer program to instruct related hardware, and the program of the method for updating boards based on the BMC may be stored in a computer readable storage medium, and the program may include the processes in the embodiments of the methods described above when executed. The storage medium of the program may be a magnetic disk, an optical disk, a read-only memory (ROM), a random-access memory (RAM), or the like. The computer program embodiments described above may achieve the same or similar effects as any of the method embodiments described above.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that as used herein, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The foregoing embodiment of the present invention has been disclosed with reference to the number of embodiments for the purpose of description only, and does not represent the advantages or disadvantages of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, and the program may be stored in a computer readable storage medium, where the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will appreciate that: the above discussion of any embodiment is merely exemplary and is not intended to imply that the scope of the disclosure of embodiments of the invention, including the claims, is limited to such examples; combinations of features of the above embodiments or in different embodiments are also possible within the idea of an embodiment of the invention, and many other variations of the different aspects of the embodiments of the invention as described above exist, which are not provided in detail for the sake of brevity. Therefore, any omission, modification, equivalent replacement, improvement, etc. of the embodiments should be included in the protection scope of the embodiments of the present invention.

Claims (6)

1. The board card updating method based on the BMC is characterized by comprising the following steps of:
writing original production information of all the boards into a first field replaceable unit, recording the original production information into a server, encrypting the original production information, and writing the encrypted original production information into a second field replaceable unit;
in response to updating authentication of the board to be tested, switching communication lines of the BMC and the first field replaceable unit to the second field replaceable unit, and acquiring encrypted production information corresponding to the board to be tested from the second field replaceable unit;
decrypting the encrypted production information and matching the decrypted production information with the original production information in the server; and
updating the board to be tested in response to the decrypted production information being matched with the corresponding original production information,
said encrypting said original production information and writing it to a second field replaceable unit comprises:
converting the original production information into ASCII codes, performing sixteen-bit encryption on the ASCII codes, performing CRC (cyclic redundancy check) secondary encryption on the sixteen-bit numbers after encryption,
the performing CRC secondary encryption on the sixteen digits after encryption comprises the following steps:
processing the encrypted sixteen digits according to the exclusive-or gate, and judging whether the processed sixteen digits are output as one or zero;
in response to the processed sixteen-bit number output being one, flipping the data and shifting each bit of the data one bit to the right; and
in response to the processed sixteen-bit number output being zero, the data is held unchanged and each bit of the data is shifted one bit to the right,
wherein the processing the encrypted sixteen digits according to the exclusive-or gate includes:
exclusive or is performed on the fifteenth bit and the first bit.
2. The method of claim 1, wherein decrypting the encrypted production information comprises:
and obtaining a public key in the second field replaceable unit, and decrypting the production information by combining a private key in the BMC.
3. A system for updating boards based on a BMC, comprising:
the recording module is configured to write the original production information of all the boards into the first field replaceable unit, record the original production information into the server, encrypt the original production information and write the encrypted original production information into the second field replaceable unit;
the switching module is configured to respond to update authentication of the board card to be tested, switch the communication line between the BMC and the first field replaceable unit to the second field replaceable unit, and acquire encrypted production information corresponding to the board card to be tested from the second field replaceable unit;
the decryption module is configured to decrypt the encrypted production information and match the decrypted production information with the original production information in the server; and
an updating module configured to update the board card to be tested in response to the decrypted production information matching the corresponding original production information,
the recording module is configured to:
converting the original production information into ASCII codes, performing sixteen-bit encryption on the ASCII codes, performing CRC (cyclic redundancy check) secondary encryption on the sixteen-bit numbers after encryption,
the recording module is configured to:
processing the encrypted sixteen digits according to the exclusive-or gate, and judging whether the processed sixteen digits are output as one or zero;
in response to the processed sixteen-bit number output being one, flipping the data and shifting each bit of the data one bit to the right; and
in response to the processed sixteen-bit number output being zero, the data is held unchanged and each bit of the data is shifted one bit to the right,
wherein the recording module is configured to:
exclusive or is performed on the fifteenth bit and the first bit.
4. A system according to claim 3, wherein the decryption module is configured for:
and obtaining a public key in the second field replaceable unit, and decrypting the production information by combining a private key in the BMC.
5. A computer device, comprising:
at least one processor; and
a memory storing computer instructions executable on the processor, which when executed by the processor, perform the steps of the method of any one of claims 1-2.
6. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method of any one of claims 1-2.
CN202110381353.0A 2021-04-09 2021-04-09 BMC-based board card updating method, system, equipment and medium Active CN113127034B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110381353.0A CN113127034B (en) 2021-04-09 2021-04-09 BMC-based board card updating method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110381353.0A CN113127034B (en) 2021-04-09 2021-04-09 BMC-based board card updating method, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN113127034A CN113127034A (en) 2021-07-16
CN113127034B true CN113127034B (en) 2024-02-09

Family

ID=76775542

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110381353.0A Active CN113127034B (en) 2021-04-09 2021-04-09 BMC-based board card updating method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN113127034B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013161210A (en) * 2012-02-03 2013-08-19 Nec Computertechno Ltd Information processing device, method for acquiring information, and program
CN104679567A (en) * 2015-03-17 2015-06-03 浪潮集团有限公司 Designing method for continuously storing FRU (Field Replaceable Unit) information
WO2018102382A1 (en) * 2016-11-29 2018-06-07 ZeroDB, Inc. Method and system for switching public keys in ciphertexts
CN108171088A (en) * 2017-12-26 2018-06-15 武汉大学 A kind of guard method of server hardware credibility and device based on BMC

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7203310B2 (en) * 2001-12-04 2007-04-10 Microsoft Corporation Methods and systems for cryptographically protecting secure content
US8249242B2 (en) * 2010-09-09 2012-08-21 Symbol Technologies, Inc. Secure call DTMF signaling
CN102571347B (en) * 2011-12-16 2016-05-25 华为技术有限公司 Method of calibration, device and the communication equipment of Field Replaceable Unit
US8990479B2 (en) * 2012-07-30 2015-03-24 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Using persistent memory regions within memory devices to collect serial presence detect and performance data
US9641339B2 (en) * 2013-07-31 2017-05-02 Arista Networks, Inc. System and method for authentication for field replaceable units
US9910664B2 (en) * 2015-05-04 2018-03-06 American Megatrends, Inc. System and method of online firmware update for baseboard management controller (BMC) devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013161210A (en) * 2012-02-03 2013-08-19 Nec Computertechno Ltd Information processing device, method for acquiring information, and program
CN104679567A (en) * 2015-03-17 2015-06-03 浪潮集团有限公司 Designing method for continuously storing FRU (Field Replaceable Unit) information
WO2018102382A1 (en) * 2016-11-29 2018-06-07 ZeroDB, Inc. Method and system for switching public keys in ciphertexts
CN108171088A (en) * 2017-12-26 2018-06-15 武汉大学 A kind of guard method of server hardware credibility and device based on BMC

Also Published As

Publication number Publication date
CN113127034A (en) 2021-07-16

Similar Documents

Publication Publication Date Title
CN109040090B (en) A kind of data ciphering method and device
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
US11183083B2 (en) Cryptographic device and memory based PUF
KR20150102827A (en) USER DEVICE PERFORMING PASSWROD BASED AUTHENTICATION AND PASSWORD Registration AND AUTHENTICATION METHOD THEREOF
CN110084599B (en) Key processing method, device, equipment and storage medium
CN113079001B (en) Key updating method, information processing apparatus, and key updating device
JP2018148434A (en) Key generation device and key generation method
US10223249B2 (en) Test methodology for detection of unwanted cryptographic key destruction
CN111984989B (en) Method, device, system and medium for self-checking publishing and accessing URL
US8798261B2 (en) Data protection using distributed security key
CN113127034B (en) BMC-based board card updating method, system, equipment and medium
CN117201120A (en) Information encryption method, device, computer equipment and storage medium
CN108427889A (en) Document handling method and device
CN111628863A (en) Data signature method and device, electronic equipment and storage medium
CN110880965A (en) Outgoing electronic document encryption method, system, terminal and storage medium
WO2019178981A1 (en) Password management method and device employing customized rules, terminal apparatus, and storage medium
CN105939192A (en) Data encryption method and device
CN106845253A (en) Historical operation recording of encrypted method and device
US10892890B2 (en) Hash offset based key version embedding
CN113591140B (en) Resource data tamper-proof method, system, computer equipment and storage medium
CN115333875B (en) Data sharing method, system, device and storage medium
JP7143841B2 (en) Authentication system, authentication device, terminal device, authentication method, and program
CN108777630B (en) Anti-repudiation method and device based on cloud computing network and readable storage medium
CN114238996A (en) Method and system for bypassing decryption of logging JavaScript
CN112948879A (en) Data destruction method, system, device and medium based on encrypted file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant