CN114282224B - Double-channel rack-mounted server based on trusted architecture - Google Patents

Double-channel rack-mounted server based on trusted architecture Download PDF

Info

Publication number
CN114282224B
CN114282224B CN202111594368.1A CN202111594368A CN114282224B CN 114282224 B CN114282224 B CN 114282224B CN 202111594368 A CN202111594368 A CN 202111594368A CN 114282224 B CN114282224 B CN 114282224B
Authority
CN
China
Prior art keywords
trusted
terminal
processor
data
management module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111594368.1A
Other languages
Chinese (zh)
Other versions
CN114282224A (en
Inventor
高鹏
黄洪波
冯永西
杨伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN202111594368.1A priority Critical patent/CN114282224B/en
Publication of CN114282224A publication Critical patent/CN114282224A/en
Application granted granted Critical
Publication of CN114282224B publication Critical patent/CN114282224B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a double-channel rack-mounted server based on a trusted architecture, which comprises a first processor and a second processor, wherein the first processor and the second processor are respectively arranged on a main board, the first processor can work independently and also can work cooperatively with the second processor, and different processors are connected with different databases; the double-path rack type server is internally provided with a trusted framework, and the trusted framework comprises a trusted management module and a trusted storage module. According to the invention, the double processors and the double databases are arranged to separate the data of the common grade from the key data, when the equipment terminal requests access, the terminal is used for carrying out credibility grading, and different grading grades are given to the equipment terminal requesting access, so that when a person applies for the terminal to access a server, the key resource can be met, the data loss caused by unsafe environment can be prevented, the server access requirement of the staff can be met, and the enterprise data can be conveniently called.

Description

Double-channel rack-mounted server based on trusted architecture
Technical Field
The invention relates to the technical field of servers, in particular to a double-channel rack-mounted server based on a trusted architecture.
Background
A server is a type of computer that runs faster, is more loaded, and is more expensive than a normal computer. The server provides computing or application services to other clients in the network (e.g., terminals such as PCs, smartphones, ATM, and even large devices such as train systems). The server has high-speed CPU operation capability, long-time reliable operation, strong I/O external data throughput capability and better expansibility.
In order to accelerate work efficiency, more and more enterprises start to build enterprise-level servers, enterprise staff can carry out data interaction and data operation through an access server, the enterprise servers are often connected with databases in enterprises, the databases contain business secrets of the enterprises, research and development progress and other information, therefore, when the servers are accessed, the environments where terminals are located are required to be judged, access to the terminals which do not meet the access requirements is forbidden, however, enterprise staff often need to log into the enterprise servers outside, the access of the terminals is forbidden directly, the work efficiency is often influenced, and risks of leakage of the enterprise secrets are allowed.
Disclosure of Invention
Therefore, the invention provides a double-channel rack-mounted server based on a trusted architecture, which is used for solving the problems that in the prior art, when outside enterprise personnel access a company internal server, the direct prohibition of terminal access often affects the working efficiency, and the impersonation of access permission also has the risk of revealing enterprise secrets.
In order to achieve the above object, the present invention provides a dual-channel rack server based on trusted architecture, comprising,
the casing is provided with a plurality of grooves,
a main board disposed inside the main board;
the processor set comprises a first processor and a second processor, wherein the first processor and the second processor are respectively arranged on the main board, the first processor can work independently and also can work cooperatively with the second processor, and different processors are connected with different databases;
the storage module is arranged on the main board and is respectively connected with the first processor and the second processor;
the double-path rack server is internally provided with a trusted framework, and the trusted framework comprises a trusted management module and a trusted storage module;
the double-path rack server is internally provided with a trusted framework, and the trusted framework comprises a trusted management module and a trusted storage module; when the server receives the access request of the terminal X, the trusted framework performs credibility authentication on the terminal X, and starts processors of corresponding grades for credibility of different grades, and invokes database data connected with the started processors.
Further, the trusted memory module stores trusted address sets Z0, Z0 (Z1, Z2, … zn), Z1 is a first preset trusted address, Z2 is a second preset trusted address, … zn is an nth preset trusted address, n is a positive integer, the trusted management module obtains an address code zx of the terminal X, the trusted management module compares the zx with addresses in the trusted address set Z0,
when the stored address z i is the same as the address code zx, the trusted management module records that the address score of the terminal X is Fz1, i=1, 2, … n;
when the same address as the address code zx does not exist in Z0, the trusted management module records that the address of the terminal X is scored as Fz2.
Further, the trusted management module is provided with a first preset network type W1, a second preset network type W2,
the trusted management module obtains the network type of the environment where the terminal X is located, analyzes the network type,
when the environment network type of the terminal X is the first type of network W1, the trusted management module records that the network score of the terminal X is Fw1;
when the network type of the environment where the terminal X is located is the second type of network W2, the trusted management module records that the network score of the terminal X is Fw2.
Further, a first preset data processing grade evaluation score F1, a second preset data processing grade evaluation score F2, a first data interaction grade and a second data interaction grade are arranged in the trusted management module;
the trusted management module calculates a trusted score F of the terminal X, f= Fzj +fwk, j=1, 2, k=1, 2;
the trusted management module compares the calculated score F with a first preset data processing level evaluation score F1, a second preset data processing level evaluation score F2,
when F is smaller than F1, the trusted management module judges that the terminal X is not suitable for data access;
when F1 is more than F and less than or equal to F2, the trusted management module judges that the terminal X meets the first data interaction level requirement;
when F > F2, the trusted management module determines that the terminal X meets the second data interaction level requirement.
Further, the first processor is connected with the first database, and the second processor is respectively connected with the first database and the second database;
the first data interaction level means that only the first processor can be operated and only the data information in the first database can be called;
the second data interaction level means that the first processor and the second processor can be operated simultaneously, and data information in the first database and the second database is called.
When the terminal X meets the requirement of the second data interaction level, the data interaction level can be selected, the first processor is selected to be operated only and the data information in the first database can be called, or the first processor and the second processor are selected to be operated simultaneously and the data information in the first database and the data information in the second database are called;
after the fact that the terminal X can conduct data interaction is confirmed, personnel login verification is conducted, and after personnel login is successful, data interaction grade selection is conducted on the terminal X meeting the requirement of the second data interaction grade.
Further, when the terminal X only operates the first processor and can only call the data information in the first database, the data interaction tracing is performed on the interacted data, and when the interacted data needs to call the data information in the second database, the trusted management module determines the processing direction according to the data interaction level which is met by the terminal X.
Further, when the terminal X meets the first data interaction level requirement, the trusted management module stores the request for retrieval, sends the request to the administrator, and allows for one-time information retrieval after approval by the administrator.
Further, when the terminal X meets the second data interaction level requirement, the trusted management module temporarily starts the second processor, invokes the data information in the second database, and after the invoking is completed, the trusted management module disconnects the connection relationship between the second processor and the terminal X.
Further, when the first processor and the second processor are operated at the same time and the first database and the data information in the second database are called, the second processor can assist the first processor to perform data operation on the data in the first database, so that the data interaction speed between the terminal X and the first database is increased.
Compared with the prior art, the method has the beneficial effects that the double processors and the double databases are arranged to separate the data of the common level from the key data, when the equipment terminal requests access, the terminal is used for carrying out credibility grading, and different access authorities are given to the equipment terminal requesting access by different grading grades, so that when a person applies for the terminal to access a server, the key resource can be met, the data loss caused by unsafe environment can be prevented, the server access requirement of the staff can be met, and the enterprise data can be conveniently called.
Further, a trusted address collection Z0 is stored in the trusted storage module, the trusted management module obtains an address code zx of the terminal X, and compares the address code zx with an address in the trusted address collection Z0; when the codes of the equipment are not in the trusted address aggregation set, the server is not authenticated to the terminal X in the early stage, a lower trust score is given to the terminal X, and the score judgment is carried out on the terminal X according to whether the terminal X is authenticated or not, so that the reliability score of the terminal is more accurate.
Further, a first preset network type W1 and a second preset network type W2 are set in the trusted management module, the trusted management module obtains the environment network type where the terminal X is located and analyzes the network type, in the invention, the first type of network is a local area network approved by the server, the second type of network is a common wide area network, and the terminal X is scored and judged according to the network type, so that the reliability scoring of the terminal is more accurate.
Further, a first preset data processing grade evaluation score F1 and a second preset data processing grade evaluation score F2 are arranged in the trusted management module, the trusted management module calculates a trusted score F of the terminal X, the trusted management module compares the calculated score F with the first preset data processing grade evaluation score F1 and the second preset data processing grade evaluation score F2, when the trusted score is too low, the environment where the terminal X is located is described as being worse, the risk of data loss is provided, therefore, the access of the terminal X is refused, when the score is medium, the environment where the terminal X is described as being lower, the minimum requirement of server access is satisfied, but the risk of certain data loss is considered, therefore, only the terminal X is allowed to access a part of database, only when the trusted score is high enough, the terminal X is allowed to access all data, the trusted score is carried out through the terminal, different access authorities are given to the equipment terminals requesting access, so that personnel can not only satisfy the requirement of protecting environment and preventing the enterprise from accessing the data loss, but also can satisfy the requirement of enterprise resources.
Further, the first processor is connected with the first database, and the second processor is respectively connected with the first database and the second database; the first data interaction level means that only the first processor can be operated and only the data information in the first database can be called; the second data interaction level means that the first processor and the second processor can be operated simultaneously, and data information in the first database and the second database is called. When the first processor and the second processor are operated at the same time and the data information in the first database and the second database is called, the second processor can assist the first processor to perform data operation on the data in the first database, so that the data interaction speed of the terminal X and the first database is increased. Through setting up dual processor, dual database separates ordinary grade's data and key data, when there is equipment terminal to request the access, carries out the credibility through the terminal and marks, gives different access authorities to the equipment terminal that requests the access to different grade, simultaneously, the quantity that ordinary data occupy in the enterprise needs unnecessary key data, therefore when second processor is accessed, it can handle the data information in the second database, can assist first processor to handle again the data of first database, reasonable planning the power of calculation for data processing is more rapid.
Further, for the terminal meeting the high-level data interaction condition, the terminal can be selected to be lowered by one level to perform data interaction, so that the terminal meeting the requirement of the second data interaction level can be set to perform data interaction of the first data interaction level only, the terminal is prevented from accessing data information in the second database, confidentiality is enhanced, and important data is prevented from being lost.
Further, when the terminal X only performs data interaction of the first data interaction level, but needs to mobilize data information of the second database, a processing direction is judged according to the data interaction level which is met by the terminal X, when the terminal X meets the requirement of the second data interaction level, the trusted management module temporarily starts the second processor, and after the data information in the second database is called, the trusted management module disconnects the connection relationship between the second processor and the terminal X, when the terminal X meets the requirement of the first data interaction level, the trusted management module stores the demand for calling and sends the demand to an administrator, and when the administrator approves the demand, one-time information calling is allowed, so that loss of key data is further prevented.
Drawings
FIG. 1 is a schematic diagram of a dual-channel rack server based on trusted architecture according to the present invention;
fig. 2 is a flowchart for determining a terminal connection database according to the present invention.
Detailed Description
In order that the objects and advantages of the invention will become more apparent, the invention will be further described with reference to the following examples; it should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are merely for explaining the technical principles of the present invention, and are not intended to limit the scope of the present invention.
It should be noted that, in the description of the present invention, terms such as "upper," "lower," "left," "right," "inner," "outer," and the like indicate directions or positional relationships based on the directions or positional relationships shown in the drawings, which are merely for convenience of description, and do not indicate or imply that the apparatus or elements must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention.
Furthermore, it should be noted that, in the description of the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those skilled in the art according to the specific circumstances.
Fig. 1 is a schematic structural diagram of a dual-channel rack server based on a trusted architecture according to the present invention;
the invention discloses a double-channel rack server based on a trusted architecture, which comprises,
the casing is provided with a plurality of grooves,
a main board 1 disposed inside the main board;
the processor set comprises a first processor 2 and a second processor 3, wherein the first processor 2 and the second processor 3 are respectively arranged on the main board 1, the first processor 2 can work independently and also can work together with the second processor 3, and different processors are connected with different databases;
a storage module 4 disposed on the main board 1 and connected to the first processor 2 and the second processor 3, respectively;
the double-path rack server is internally provided with a trusted framework, and the trusted framework comprises a trusted management module and a trusted storage module; when the server receives the access request of the terminal X, the trusted framework performs credibility authentication on the terminal X, and starts processors of corresponding grades for credibility of different grades, and invokes database data connected with the started processors.
According to the invention, the double processors and the double databases are arranged to separate the data of the common grade from the key data, when the equipment terminal requests access, the terminal is used for carrying out credibility grading, and different grading grades are given to the equipment terminal requesting access, so that when a person applies for the terminal to access a server, the key resource can be met, the data loss caused by unsafe environment can be prevented, the server access requirement of the staff can be met, and the enterprise data can be conveniently called.
Referring to fig. 2, fig. 2 is a flowchart of determining a terminal connection database according to the present invention.
Specifically, the trusted memory module stores trusted address sets Z0, Z0 (Z1, Z2, … zn), Z1 is a first preset trusted address, Z2 is a second preset trusted address, … zn is an nth preset trusted address, n is a positive integer, the trusted management module obtains an address code zx of the terminal X, the trusted management module compares the zx with the addresses in the trusted address set Z0,
when the stored address z i is the same as the address code zx, the trusted management module records that the address score of the terminal X is Fz1, i=1, 2, … n;
when the same address as the address code zx does not exist in Z0, the trusted management module records that the address of the terminal X is scored as Fz2.
The trusted address is the equipment code of the remote terminal, when the equipment code is in the trusted address aggregation set, the server is described to authenticate the terminal X in the early stage, and a higher trust score is given to the terminal X at the moment; when the codes of the equipment are not in the trusted address aggregation set, the server is not authenticated to the terminal X in the early stage, a lower trust score is given to the terminal X, and the score judgment is carried out on the terminal X according to whether the terminal X is authenticated or not, so that the reliability score of the terminal is more accurate.
Specifically, the trusted management module is provided with a first preset network type W1, a second preset network type W2,
the trusted management module obtains the network type of the environment where the terminal X is located, analyzes the network type,
when the environment network type of the terminal X is the first type of network W1, the trusted management module records that the network score of the terminal X is Fw1;
when the network type of the environment where the terminal X is located is the second type of network W2, the trusted management module records that the network score of the terminal X is Fw2.
In the invention, the first type of network is a local area network approved by the server, the second type of network is a common wide area network, and the terminal X is scored and judged according to the network type, so that the reliability scoring of the terminal is more accurate.
Specifically, a first preset data processing grade evaluation score F1, a second preset data processing grade evaluation score F2, a first data interaction grade and a second data interaction grade are arranged in the trusted management module;
the trusted management module calculates a trusted score F of the terminal X, f= Fzj +fwk, j=1, 2, k=1, 2;
the trusted management module compares the calculated score F with a first preset data processing level evaluation score F1, a second preset data processing level evaluation score F2,
when F is smaller than F1, the trusted management module judges that the terminal X is not suitable for data access;
when F1 is more than F and less than or equal to F2, the trusted management module judges that the terminal X meets the first data interaction level requirement;
when F > F2, the trusted management module determines that the terminal X meets the second data interaction level requirement.
When the credibility score is too low, the environment where the terminal X is located is severe, the risk of data loss exists, therefore, the access of the terminal X is refused, when the score is medium, the environment where the terminal X is located meets the minimum requirement of server access, but the risk of certain data loss is considered, therefore, only the terminal X is allowed to access part of the database, only when the credibility score is high enough, the terminal X is allowed to access all data, the credibility score is carried out through the terminal, different access authorities are given to the equipment terminals requesting access by different scoring grades, so that when personnel apply for the terminal to access the server, the important resources can be met, the data loss caused by unsafe environment can be prevented, the server access requirement of personnel can be met, and enterprise data can be conveniently called.
Specifically, the first processor is connected with the first database, and the second processor is respectively connected with the first database and the second database;
the first data interaction level means that only the first processor can be operated and only the data information in the first database can be called;
the second data interaction level means that the first processor and the second processor can be operated simultaneously, and data information in the first database and the second database is called.
Through setting up dual processor, dual database separates ordinary grade's data and key data, when there is equipment terminal to request the access, carries out the credibility through the terminal and marks, gives different access authorities to the equipment terminal that requests the access to different grade, simultaneously, the quantity that ordinary data occupy in the enterprise needs unnecessary key data, therefore when second processor is accessed, it can handle the data information in the second database, can assist first processor to handle again the data of first database, reasonable planning the power of calculation for data processing is more rapid.
Specifically, when the terminal X meets the requirement of the second data interaction level, the data interaction level can be selected, and only the first processor is selected to be operated and only the data information in the first database can be called, or the first processor and the second processor are selected to be operated simultaneously and the data information in the first database and the second database is called;
after the fact that the terminal X can conduct data interaction is confirmed, personnel login verification is conducted, and after personnel login is successful, data interaction grade selection is conducted on the terminal X meeting the requirement of the second data interaction grade.
The terminal meeting the high-level data interaction condition can select the terminal which is reduced by one level to perform data interaction, and the terminal meeting the requirement of the second data interaction level can be set to perform data interaction of the first data interaction level only, so that the terminal is prevented from accessing data information in the second database, confidentiality is enhanced, and important data is prevented from being lost.
Specifically, when the terminal X only operates the first processor and can only call the data information in the first database, the data interaction tracing is performed on the interacted data, and when the interacted data needs to call the data information in the second database, the trusted management module determines the processing direction according to the data interaction level which is met by the terminal X.
Specifically, when the terminal X meets the first data interaction level requirement, the trusted management module stores the request for retrieval, sends the request to the administrator, and allows one information retrieval after approval by the administrator.
Specifically, when the terminal X meets the second data interaction level requirement, the trusted management module temporarily starts the second processor, invokes the data information in the second database, and after the invoking is completed, the trusted management module disconnects the connection relationship between the second processor and the terminal X.
When the terminal X only carries out data interaction of the first data interaction level, but needs to mobilize the data information of the second database, the processing direction is judged according to the data interaction level which is met by the terminal X, when the terminal X meets the requirement of the second data interaction level, the trusted management module temporarily starts the second processor to mobilize the data information in the second database, after the data information in the second database is mobilized, the trusted management module disconnects the connection relation between the second processor and the terminal X, when the terminal X meets the requirement of the first data interaction level, the trusted management module stores the mobilization requirement and sends the requirement to an administrator, and after the administrator approves the request, the trusted management module allows one-time information mobilization, so that the loss of key data is further prevented.
Specifically, when the first processor and the second processor are operated at the same time and the first database and the data information in the second database are called, the second processor can assist the first processor to perform data operation on the data in the first database, so that the data interaction speed between the terminal X and the first database is increased.
Before the system of the server docking is started, the TPCM measures the codes, configurations and environments of each stage of the starting of the computing node, namely, the starting measurement is carried out before the starting. The main flow is as follows:
1) The TPCM controls the compute node CPU power when the system is started. The TPCM measures the BIOS.
2) If the BIOS measurement meets the expectations, the TPCM powers up the compute node CPU, which loads and executes
BIOS code. The BIOS metrics are not expected, and the TPCM may or may not allow the compute node CPU to power up depending on the policy.
3) Before executing any third party driver, the BIOS code intercepts the behavior by the TSB agent inserted in the BIOS code and informs the TPCM to measure the third party driver. The BIOS decides whether to continue to start the system according to the measurement control result.
4) Before executing BootLoader (e.g., GRUB) code, the BIOS code inserts the TSB agent into the BIOS code to intercept the behavior and inform the TPCM to measure the BootLoader.
5) TPCM measures BootLoader according to the parameters.
6) The TPCM decides whether to allow the BIOS to load the BootLoader based on the policy and metrics results. And returns the results to the agent in the BIOS. In the case of metric failure, the TPCM may or may not allow BootLoader to be executed.
7) The TSB agent in the BIOS determines whether to execute the BootLoader according to the returned result.
8) Before executing the kernel of the operating system, the BootLoader code intercepts the behavior by the TSB agent inserted in the BootLoader. The TPCM is notified to measure the operating system kernel and the OS boot environment.
9) The TPCM measures the operating system kernel and the OS boot environment according to the parameters.
10 TPCM decides whether to allow BootLoader to execute the operating system kernel based on the policy and metrics results. And returns the result to the agent in BootLoader. In the case of a metric failure, the TPCM may or may not allow execution of the operating system kernel.
11 BootLoader can further check in itramfs, operating system boot script (/ etc/rc) and programs through TPCM. The metrics of the boot script and program will be further refined later.
12 The TSB agent in BootLoader determines whether to execute the operating system kernel based on the returned result.
A boot metrics interface to send a boot metrics request by a metrics agent (BIOS/GRUB/UBOOT) to the TPCM; the TPCM actively acquires the measured data to calculate the measurement value after receiving the request, compares the measurement value with the measurement reference value, records the measurement state, and returns the measurement result and the control code. Refer to table 1.
TABLE 1
Figure BDA0003430121860000101
Figure BDA0003430121860000111
The metric phase sent in BIOS is now specified as 1000-1999, increasing in sequence. The metric stages sent in GRUB are 2000-2999, sequentially increasing.
In some special scenarios the launch metric interface employs a simplified version, see table 2.
TABLE 2
Figure BDA0003430121860000112
The request and return are encapsulated in a format, the communication mechanism transmits these encapsulated request messages and response messages, the request message format referring to table 3 and the response message format referring to table 4. B represents a byte.
TABLE 3 Table 3
Figure BDA0003430121860000113
-identifying: fixed value 0xC1
Message length: request message length
-command code: coding of each message (startup metric fixed value 1001)
-inputting parameters: determined by each command
TABLE 4 Table 4
Figure BDA0003430121860000121
-identifying: fixed value 0xC1
Message length: response message length
Return code/output data: the return code of the message. The start metric output is only this return code,
other interfaces may have more data returned.
Thus far, the technical solution of the present invention has been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of protection of the present invention is not limited to these specific embodiments. Equivalent modifications and substitutions for related technical features may be made by those skilled in the art without departing from the principles of the present invention, and such modifications and substitutions will be within the scope of the present invention.
The foregoing description is only of the preferred embodiments of the invention and is not intended to limit the invention; various modifications and variations of the present invention will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. A double-channel rack server based on a trusted architecture is characterized by comprising,
the casing is provided with a plurality of grooves,
a main board disposed inside the main board;
the processor set comprises a first processor and a second processor, wherein the first processor and the second processor are respectively arranged on the main board, the first processor can work independently and also can work cooperatively with the second processor, and different processors are connected with different databases;
the storage module is arranged on the main board and is respectively connected with the first processor and the second processor;
the double-path rack server is internally provided with a trusted framework, and the trusted framework comprises a trusted management module and a trusted storage module; when the server receives an access request of the terminal X, the trusted framework performs credibility authentication on the terminal X, and starts processors of corresponding grades for credibility of different grades, and invokes database data connected with the started processors;
the trusted memory module is internally provided with a trusted address collection Z0, Z0 (Z1, Z2, … zn), Z1 is a first preset trusted address, Z2 is a second preset trusted address, … zn is an nth preset trusted address, n is a positive integer, the trusted management module obtains an address code zx of the terminal X, the trusted management module compares the zx with the addresses in the trusted address collection Z0,
when the stored address zi is the same as the address code zx, the trusted management module records that the address score of the terminal X is Fz1, i=1, 2, … n;
when the address which is the same as the address code zx does not exist in Z0, the trusted management module records that the address score of the terminal X is Fz2;
the trusted management module is internally provided with a first preset network type W1, a second preset network type W2,
the trusted management module obtains the network type of the environment where the terminal X is located, analyzes the network type,
when the environment network type of the terminal X is the first type of network W1, the trusted management module records that the network score of the terminal X is Fw1;
when the environment network type of the terminal X is the second type network W2, the trusted management module records that the network score of the terminal X is Fw2;
the trusted management module is internally provided with a first preset data processing grade evaluation score F1, a second preset data processing grade evaluation score F2, a first data interaction grade and a second data interaction grade;
the trusted management module calculates a trusted score F of the terminal X, f= Fzj +fwk, j=1, 2, k=1, 2;
the trusted management module compares the calculated score F with a first preset data processing level evaluation score F1, a second preset data processing level evaluation score F2,
when F is smaller than F1, the trusted management module judges that the terminal X is not suitable for data access;
when F1 is more than F and less than or equal to F2, the trusted management module judges that the terminal X meets the first data interaction level requirement;
when F > F2, the trusted management module determines that the terminal X meets the second data interaction level requirement.
2. The trusted-architecture-based two-way rack server of claim 1, wherein the first processor is coupled to a first database and the second processor is coupled to the first database and a second database, respectively;
the first data interaction level means that only the first processor can be operated and only the data information in the first database can be called;
the second data interaction level means that the first processor and the second processor can be operated simultaneously, and data information in the first database and the second database is called.
3. The two-way rack-mounted server based on trusted architecture according to claim 2, wherein when the terminal X meets the second data interaction level requirement, data interaction level selection can be performed, and only the first processor is selected to be operated and only the data information in the first database is called, or the first processor and the second processor are selected to be operated simultaneously, and the data information in the first database and the second database is called;
after the fact that the terminal X can conduct data interaction is confirmed, personnel login verification is conducted, and after personnel login is successful, data interaction grade selection is conducted on the terminal X meeting the requirement of the second data interaction grade.
4. The dual-channel rack-mounted server based on trusted architecture of claim 3, wherein when the terminal X only operates the first processor and can only call the data information in the first database, the data interaction tracing is performed on the interacted data, and when the interacted data needs to call the data information in the second database, the trusted management module determines the processing direction according to the data interaction level which the terminal X accords with.
5. The two-way rack-mounted server according to claim 4, wherein the trusted management module stores the demand for retrieval when the terminal X meets the first data interaction level requirement, and sends the demand to the administrator, and allows one message retrieval when the administrator approves the demand.
6. The dual-channel rack server based on trusted architecture of claim 5, wherein when the terminal X meets the second data interaction level requirement, the trusted management module temporarily starts the second processor, invokes the data information in the second database, and after the invoking, the trusted management module disconnects the second processor from the terminal X.
7. The dual-channel rack server based on trusted architecture of claim 6, wherein when the first processor and the second processor are simultaneously operated and the first database and the data information in the second database are called, the second processor can assist the first processor to perform data operation on the data in the first database, so that the data interaction speed between the terminal X and the first database is increased.
CN202111594368.1A 2021-12-23 2021-12-23 Double-channel rack-mounted server based on trusted architecture Active CN114282224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111594368.1A CN114282224B (en) 2021-12-23 2021-12-23 Double-channel rack-mounted server based on trusted architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111594368.1A CN114282224B (en) 2021-12-23 2021-12-23 Double-channel rack-mounted server based on trusted architecture

Publications (2)

Publication Number Publication Date
CN114282224A CN114282224A (en) 2022-04-05
CN114282224B true CN114282224B (en) 2023-06-23

Family

ID=80875252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111594368.1A Active CN114282224B (en) 2021-12-23 2021-12-23 Double-channel rack-mounted server based on trusted architecture

Country Status (1)

Country Link
CN (1) CN114282224B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115166646B (en) * 2022-09-02 2022-11-11 深圳朗驰科技有限公司 Radar identification control system based on credible system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491072A (en) * 2013-09-06 2014-01-01 北京信息控制研究所 Boundary access control method based on double one-way separation gatekeepers
US9240988B1 (en) * 2013-09-27 2016-01-19 Emc Corporation Computer system employing dual-band authentication
CN107168829A (en) * 2017-05-15 2017-09-15 郑州云海信息技术有限公司 It is a kind of to ensure the method and system of the double BIOS secure and trusteds operations of server system
CN107480535A (en) * 2017-08-18 2017-12-15 郑州云海信息技术有限公司 The reliable hardware layer design method and device of a kind of two-way server
CN110061987A (en) * 2019-04-19 2019-07-26 武汉大学 A kind of access control method and device of based role and trusted end-user
CN111177692A (en) * 2019-11-29 2020-05-19 云深互联(北京)科技有限公司 Terminal credibility level evaluation method, device, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023885B (en) * 2012-11-26 2015-09-16 北京奇虎科技有限公司 Secure data processing method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491072A (en) * 2013-09-06 2014-01-01 北京信息控制研究所 Boundary access control method based on double one-way separation gatekeepers
US9240988B1 (en) * 2013-09-27 2016-01-19 Emc Corporation Computer system employing dual-band authentication
CN107168829A (en) * 2017-05-15 2017-09-15 郑州云海信息技术有限公司 It is a kind of to ensure the method and system of the double BIOS secure and trusteds operations of server system
CN107480535A (en) * 2017-08-18 2017-12-15 郑州云海信息技术有限公司 The reliable hardware layer design method and device of a kind of two-way server
CN110061987A (en) * 2019-04-19 2019-07-26 武汉大学 A kind of access control method and device of based role and trusted end-user
CN111177692A (en) * 2019-11-29 2020-05-19 云深互联(北京)科技有限公司 Terminal credibility level evaluation method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN114282224A (en) 2022-04-05

Similar Documents

Publication Publication Date Title
US10666441B2 (en) Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
US10135803B2 (en) Dynamic identity switching
US7865876B2 (en) Multiple trusted computing environments
CN101515316B (en) Trusted computing terminal and trusted computing method
US5566326A (en) Copy file mechanism for transferring files between a host system and an emulated file system
US5664098A (en) Dual decor capability for a host system which runs emulated application programs to enable direct access to host facilities for executing emulated system operations
US8874905B2 (en) Resource restriction systems and methods
KR102527949B1 (en) Secure Run Guest Owner  Environment  Control
US10083129B2 (en) Code loading hardening by hypervisor page table switching
US20070239979A1 (en) Method and apparatus to protect policy state information during the life-time of virtual machines
CN111159691B (en) Dynamic credibility verification method and system for application program
US5675771A (en) Mechanism for enabling emulation system users to directly invoke a number of host system facilities for executing host procedures either synchronously or asynchronously in a secure manner through automatically created shell mechanisms
CN107704308B (en) Virtual platform vTPM management system, trust chain construction method and device, and storage medium
US20160277498A1 (en) Location and boundary controls for storage volumes
CN111176794A (en) Container management method and device and readable storage medium
CN114282224B (en) Double-channel rack-mounted server based on trusted architecture
CN112947945B (en) Multi-type application release method and device, computer equipment and storage medium
CN112448956B (en) Authority processing method and device of short message verification code and computer equipment
CN111931157A (en) Access method, device, storage medium and computer equipment of single sign-on system
CN111177703B (en) Method and device for determining data integrity of operating system
US9633206B2 (en) Demonstrating integrity of a compartment of a compartmented operating system
CN117034257A (en) Information acquisition method, device, equipment and medium under virtualization management
EP4261723A1 (en) Data desensitization method and apparatus, and storage system
US9240988B1 (en) Computer system employing dual-band authentication
CN112464225A (en) Request processing method, request processing device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant