CN105446656A - Information processing device - Google Patents

Information processing device Download PDF

Info

Publication number
CN105446656A
CN105446656A CN201510502320.1A CN201510502320A CN105446656A CN 105446656 A CN105446656 A CN 105446656A CN 201510502320 A CN201510502320 A CN 201510502320A CN 105446656 A CN105446656 A CN 105446656A
Authority
CN
China
Prior art keywords
storage facilities
store controller
storage
facility information
bios
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510502320.1A
Other languages
Chinese (zh)
Other versions
CN105446656B (en
Inventor
沼田优希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp filed Critical Toshiba Corp
Publication of CN105446656A publication Critical patent/CN105446656A/en
Application granted granted Critical
Publication of CN105446656B publication Critical patent/CN105446656B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the invention relates to an information processing device. An information processing device is provided. When a computer (information processing device) is started, a storage device being permitted to connect is only able to be used by the information processing device. The information processing device comprises a storage medium configured to maintain the device information of the storage device being permitted to connect, and a storage controller configured to control the storage device. When the checking of hardware is started while passing BIOS, the storage controller comprises a function of obtaining device information from the storage medium; a function of obtaining the device information from the storage device connected with the storage controller; a function of controlling the BIOS to identify the storage device connected to the storage controller in the condition of determining whether the storage device being permitted to connect is connected or not according to the obtained device information and the obtained device information from the storage medium.

Description

Signal conditioning package
The application is by Japanese patent application 2014-192579 (applying date: 09/22/2014), and the right of priority enjoying this application.The application comprises its full content by referring to this application.
Technical field
Embodiments of the present invention relate to signal conditioning package.
Background technology
As the storage facilities (storagedevice) that the auxilary unit etc. of computing machine or server uses, there is HDD (HardDiskDrive) and SSD (SolidStateDrive).These equipment are for preserving the Large Volume Data of the system configuration information, image, music, moving image etc. of OS.But storage facilities has life-span part, in order to the long-term work of system and the long term maintenance of data, need periodic replacement storage facilities main body.
When changing storage facilities, if terminal user at random carries out the replacing of equipment, then interchangeability and quality etc. may have problems.Therefore, for exploitation side and publisher, specify the manufacturer as the equipment changing object and type sometimes.In addition, in recent years, from the view point of security, the situation that system operator must limit attachable storage facilities increases gradually.As the management method of this storage facilities, propose the method etc. utilizing digital signature to carry out authentication store device.
But, in management method in the past, contemplate situation about being connected with the computing machine started by memory storage, there is no certification and the confirmation of considering the guiding device (bootdevice) reading data when computer starting.
Summary of the invention
Problem to be solved by this invention is, provides a kind of signal conditioning package, and when computing machine (signal conditioning package) starts, the storage facilities of only licensed connection can be used by this signal conditioning package.
The signal conditioning package of embodiment possesses: storage medium, keeps the facility information of the storage facilities of licensed connection; And store controller, carry out the control of storage facilities.Store controller has: during hardware check when being started by BIOS and Basic Input or Output System (BIOS), obtain the function of facility information from storage medium; The function of its facility information is obtained from the storage facilities be connected with store controller; Based on the facility information obtained from storage facilities with from the facility information that storage medium obtains, when being judged as that the storage facilities of licensed connection connects, carry out controlling and making BIOS identify the function of the storage facilities be connected with store controller.
According to the signal conditioning package of above-mentioned formation, when computer starting, this computing machine only can use the licensed storage facilities connected to this computing machine.
Accompanying drawing explanation
Fig. 1 is the figure of the schematic configuration of the computing machine (signal conditioning package) representing the 1st embodiment.
The process flow diagram of the action in each portion when Fig. 2 is the computer starting representing the 1st embodiment.
Fig. 3 is the figure of the schematic configuration of the computing machine representing the 3rd embodiment.
Fig. 4 is the figure of the schematic configuration of the computing machine representing the 4th embodiment.
The process flow diagram of action when Fig. 5 is the computer starting representing the 4th embodiment.
Fig. 6 is the figure representing the formation the 1st embodiment and the 4th embodiment combined or the formation the 2nd embodiment and the 4th embodiment combined.
Fig. 7 is the figure representing the formation the 3rd embodiment and the 4th embodiment combined.
Embodiment
(the 1st embodiment)
First, the formation of the 1st embodiment is described with reference to Fig. 1.Fig. 1 is the figure of the schematic configuration of the computing machine (signal conditioning package) representing the 1st embodiment.
The computing machine 1 of present embodiment possesses therein: control part 11; The storage facilities 12 of HDD or SDD etc.; Store controller 13, carries out the control of storage facilities 12; Storage medium 14, keeps the information of the licensed storage facilities 12 to computing machine 1 connection; Alarm portion 15, when detect not licensed to computing machine 1 connect storage facilities 12, by warning tones or warning display etc. inform the user this situation.
Control part 11 comprises storer and the bus controllers etc. such as not shown CPU, ROM and RAM, controls computing machine 1 entirety.In store BIOS (BasicInput/OutputSystem) in the storer of control part 11, when starting (power supply connection), CPU performs the POST (PowerOnSelfTest) comprising hardware check etc. according to this BIOS.Alarm portion 15 possesses the display device of LED or liquid crystal etc. or loudspeaker etc., according to the set signal from store controller 13, exports warning display or warning tones.
Next, the action of the computing machine 1 of present embodiment is described with reference to Fig. 2.Fig. 2 is the process flow diagram of the action in each portion when illustrating that computing machine 1 starts.
First, after the power supply connection of computing machine 1, hardware check (S11) is carried out by the BIOS of control part 11.
When this hardware check, store controller 13 reads the facility information (type (pattern number) or sequence number etc.) (S12) of the licensed storage facilities to computing machine 1 connection from storage medium 14.
Then, store controller 13 reads its facility information (S13) from the storage facilities 12 be connected with this store controller 13.
Then, store controller 13 confirms whether the facility information of the storage facilities 12 be connected with this store controller 13 is present in storage medium 14 (S14).At this, store controller 13 compares by the facility information read from storage medium 14 with from the facility information that storage facilities 12 reads, thus carries out above-mentioned confirmation.
When the facility information that the confirmation result of S14 is connected storage facilities 12 is present in storage medium 14 (S14: yes), the storage facilities 12 be connected with this store controller 13 is licensed storage facilitiess connected to computing machine 1, and store controller 13 is set as that control part 11 can use storage facilities 12 (S15).At this moment, BIOS reads the data that the data of the Main Boot Record of storage facilities 12 etc. need via store controller 13.Its result, storage facilities 12 is identified by BIOS.
Then, perform common boot process (S16) by control part 11, computing machine 1 starts.
On the other hand, aforesaid confirmation result is that the facility information of the storage facilities 12 be connected with store controller 13 is not when being present in storage medium 14 (S14: no), storage facilities 12 is not licensed storage facilitiess connected to computing machine 1, store controller 13 sends the signal (S17) making it export alarm (warning display or warning tones) to alarm portion 15, and is set as that control part 11 can not use storage facilities 12 (S18).In this case, export alarm from alarm portion 15, storage facilities 12 is not identified by BIOS.
As described above, in the present embodiment, only confirm to be that the licensed storage facilities 12 of storage facilities connected to computing machine 1 can use, alarm is exported, so the problem of the quality that produces of the storage facilities that storage facilities terminal user or maintenance person etc. can being avoided at random to connect do not implement quality test or interchangeability are failed to understand or interchangeability when being connected to the storage facilities of not licensed connection.
(the 2nd embodiment)
The computing machine (signal conditioning package) of following explanation the 2nd embodiment.
The formation of present embodiment is except unloading except (dismantled and assembled) from computing machine 1 by storage medium 14, identical with the formation of aforesaid 1st embodiment.In the present embodiment, the action of computing machine 1 also in a same manner as in the first embodiment.In addition, as storage medium 14, USB storage or SD card memory etc. can be adopted.In addition, the interface corresponding with the storage medium 14 adopted is provided with on computer 1.
In the present embodiment, because storage medium 14 can unload from computing machine 1, so the storage facilities adding licensed connection when new and facility information that storage medium 14 keeps are updated, also the facility information preserved in storage medium 14 can be rewritten, or by the storage medium 14 before renewal is replaced by the new storage medium 14 that have updated kept facility information, even if when need storage facilities 12 to be replaced by promptly newly be have granted the storage facilities of connection, also need not carry out putting maintenance into practice operation by spended time.
(the 3rd embodiment)
Next, the computing machine (signal conditioning package) of the 3rd embodiment is described with reference to Fig. 3.Fig. 3 is the figure of the schematic configuration of the computing machine representing the 3rd embodiment.
The difference of present embodiment and the 1st embodiment and the 2nd embodiment is, also arranges the network communication unit 16 being used for being connected with LAN or WAN.In addition, in the present embodiment, when device information update etc., the control part 11 of computing machine 1 or store controller 13 obtain the facility information of the licensed storage facilities to computing machine 1 connection as required from the server (not shown) of outside via network communication unit 16, and the device information update that will keep in storage medium 14.Other actions are same with the 1st embodiment and the 2nd embodiment.In the present embodiment, even if when needing storage facilities 12 to be replaced by promptly newly to be have granted storage facilities 12 of connection, also putting maintenance into practice operation need not be carried out by spended time.
(the 4th embodiment)
Next, the computing machine (signal conditioning package) of the 4th embodiment is described with reference to Fig. 4.Fig. 4 is the figure of the schematic configuration of the computing machine representing the 4th embodiment.
As shown in Figure 4, possess in the inside of computing machine 1: control part 11; Encrypt the storage facilities 12 of particular data; Store controller 13, carries out the control of storage facilities 12; Decryption part 17, for the data deciphering by encryption; And alarm portion 15, when detecting that storage facilities 12 is not licensed storage facilitiess to computing machine 1 connection, inform the user this situation by warning tones or warning display etc.The computing machine 1 of present embodiment does not need the storage medium 14 in the 1st embodiment and the 2nd embodiment or the network communication unit 16 in the 3rd embodiment.
In addition, the key of decryption part 17 store decrypted and the known data (being recited as confirmation data below) for judging whether normal deciphering.Confirmation data are such as digital signature.In addition, in the present embodiment, cipher mode is arbitrary.In addition, in above-mentioned " having encrypted the storage facilities 12 of particular data ", the in store enciphered data that the data (Main Boot Record (MBR) etc.) that read from storage facilities 12 of BIOS when starting and above-mentioned confirmation data encryption are obtained, and the data whether in store expression has encrypted.
Next, the action of the computing machine 1 of present embodiment is described with reference to Fig. 5.Fig. 5 is the process flow diagram of action when illustrating that the computing machine 1 of present embodiment starts.
First, after the power supply connection of computing machine 1, hardware check (S21) is carried out by the BIOS of control part 11.At this moment, store controller 13 confirms whether above-mentioned enciphered data is present in storage facilities 12.
For this reason, first store controller 13 reads the data (S22) representing and whether encrypted from storage facilities 12.
The data read in S22 do not represent (S23: no) when encrypting, store controller 13 sends and makes alarm portion 15 export the signal (S28) of alarm, and is set as that control part 11 can not use storage facilities 12 (S29).In this case, be not decrypted process, export alarm from alarm portion 15, storage facilities 12 is not identified by BIOS.
On the other hand, the situation (S23: yes) that the data representation read in S22 has been encrypted, store controller 13 makes decryption part 17 perform the decryption processing (S24) of enciphered data.
Then, in data after being deciphered by decryption part 17, when the confirmation data consistent that confirmation data and decryption part 17 keep (namely, be judged as the situation having (legal) enciphered data in storage facilities 12) (S25: yes), the storage facilities 12 be connected with this store controller 13 is licensed storage facilitiess connected to computing machine 1, and store controller 13 is set as that control part 11 can use storage facilities 12 (S26).At this moment, BIOS reads the data that the data of the Main Boot Record of storage facilities 12 etc. need via store controller 13.As a result, storage facilities 12 is identified by BIOS.
Then, perform common boot process (S27) by control part 11, computing machine 1 starts.
On the other hand, in data after being deciphered by decryption part 17, when the confirmation data that confirmation data and decryption part 17 keep are inconsistent (S25: no), store controller 13 is judged as not having enciphered data in storage facilities 12, storage facilities 12 is not licensed storage facilitiess connected to computing machine 1, sending makes alarm portion 15 export the signal (S28) of alarm, and is set as that control part 11 can not use storage facilities 12 (S29).In this case, export alarm from alarm portion 15, storage facilities 12 is not identified by BIOS.
In addition, decryption part 17 can also load as a part for the function of store controller 13, also can arrange as the equipment different from store controller 13.In addition, about confirming the function (process of S23, S25) that whether there is encrypted particular data in storage facilities 12, can be arranged in store controller 13, also can be arranged in decryption part 17.
As described above, present embodiment is same with 1st ~ 3 embodiments, only confirm to be that the licensed storage facilities 12 of storage facilities connected to computing machine 1 can use, when the storage facilities linking not licensed connection, also export alarm, so the problem of the quality that produces of the storage facilities that storage facilities terminal user or maintenance person etc. can being avoided at random to connect do not implement quality test or interchangeability are failed to understand or interchangeability.
In addition, in 1st ~ 3 embodiments, whenever having added the licensed storage facilities connected to computing machine 1, just need to upgrade the facility information kept in storage medium 14, but in the present embodiment, the particular data encrypted when the licensed storage facilities connected to computing machine 1 being kept to manufacture or the shipment process of this storage facilities by the manufacturer etc. of computing machine 1, does not need the storage medium 14 in 1st ~ 3 embodiments.
In addition, in the present embodiment, arrange based on representing the inspection of data and the audit function in 2 stages based on the inspection of confirmation data of whether having encrypted.In last inspection, if do not have to represent the data of having encrypted, then export alarm immediately, make control part 11 can not use storage facilities 12, so need not heavy decryption processing be carried out, just incongruent storage facilities 12 can be got rid of.In addition, even if the storage facilities deliberately setting the data that expression has been encrypted by the third party is connected to computing machine 1, in the present embodiment, by also getting rid of based on the inspection of the confirmation data along with decryption processing.
(other embodiments)
Also can be, by by the 1st shown in Fig. 6 or the 2nd embodiment and the combination of the 4th embodiment, or by the 3rd embodiment shown in Fig. 7 and the combination of the 4th embodiment, about the confirmation whether storage facilities of licensed connection has connected, based on the facility information obtained from the storage facilities 12 be connected with aforesaid store controller 13 with confirm from the facility information that storage medium 14 obtains, simultaneously based on representing the data of whether having encrypted and the data after decrypt encrypted data and confirmation data being confirmed.The licensed storage facilities connected to computing machine 1 may be changed after this equipment shipment (circulation), or the facility information of storage medium 14 is at will changed, but by carrying out duplication check based on two kinds of information like this, the connection of incongruent storage facilities more strictly can be got rid of.
As described above, according to above-mentioned each embodiment, when computer starting, the storage facilities having only had licensed to connect to this computing machine can be used by this computing machine.
Be explained above several embodiment of the present invention, but these embodiments are just pointed out as an example, be not intended to limit scope of invention.These new embodiments can be implemented in other various modes, in the scope of purport not departing from invention, can carry out various omission, displacement, change.These embodiments and distortion thereof are included in scope of invention and purport, are also contained in invention described in claim and equivalency range thereof.

Claims (7)

1. a signal conditioning package, possesses:
Storage medium, keeps the facility information of the storage facilities of licensed connection; And
Store controller, carries out the control of storage facilities,
During hardware check when being started by BIOS and Basic Input or Output System (BIOS), described store controller has following function:
The function of described facility information is obtained from described storage medium;
The function of its facility information is obtained from the storage facilities be connected with described store controller; And
Based on the facility information obtained from described storage facilities with being judged as from the facility information that described storage medium obtains the storage facilities being connected to licensed connection, carry out controlling to make described BIOS identify the function of the storage facilities be connected with described store controller.
2. signal conditioning package as claimed in claim 1,
Described storage medium can dismounting relative to described signal conditioning package.
3. signal conditioning package as claimed in claim 1,
Described store controller has and obtains via external network the described facility information that is updated and upgrade the function of the facility information of described storage medium.
4. a signal conditioning package, possesses:
Store controller, carries out the control of storage facilities; And
Decryption part, carries out the deciphering of the enciphered data of the storage facilities be connected with described store controller,
During hardware check when being started by BIOS and Basic Input or Output System (BIOS), described store controller has following function:
The data representation whether expression of preserving in the storage facilities be connected with described store controller has encrypted has been encrypted and has been judged as according to the data obtained by described decrypt encrypted data the storage facilities being connected to licensed connection, carry out controlling to make described BIOS identify the storage facilities be connected with described store controller.
5. the signal conditioning package according to any one of claims 1 to 3,
Possess decryption part, this decryption part carries out the deciphering of the enciphered data of the storage facilities be connected with described store controller,
During hardware check when being started by BIOS, described store controller has following function:
Be judged as being connected to the storage facilities of licensed connection based on the facility information obtained from described storage facilities and the facility information obtained from described storage medium and the data representation whether expression of preserving in the storage facilities be connected with described store controller has encrypted has been encrypted and then has been judged as according to the data obtained by described decrypt encrypted data by described decryption part the storage facilities being connected to licensed connection when, carry out controlling to make described BIOS identify the storage facilities be connected with described store controller.
6. the signal conditioning package according to any one of Claims 1 to 4,
Possesses alarm portion, for exporting alarm when being judged as that the storage facilities of not licensed connection is connected with described store controller.
7. signal conditioning package as claimed in claim 5,
Possesses alarm portion, for exporting alarm when being judged as that the storage facilities of not licensed connection is connected with described store controller.
CN201510502320.1A 2014-09-22 2015-08-14 Information processing unit Expired - Fee Related CN105446656B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2014-192579 2014-09-22
JP2014192579A JP6293629B2 (en) 2014-09-22 2014-09-22 Information processing device

Publications (2)

Publication Number Publication Date
CN105446656A true CN105446656A (en) 2016-03-30
CN105446656B CN105446656B (en) 2018-08-14

Family

ID=55556916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510502320.1A Expired - Fee Related CN105446656B (en) 2014-09-22 2015-08-14 Information processing unit

Country Status (3)

Country Link
JP (1) JP6293629B2 (en)
KR (1) KR20160034798A (en)
CN (1) CN105446656B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3424433A1 (en) * 2017-07-06 2019-01-09 Koninklijke Philips N.V. Methods and systems for processing an ultrasound image
JP7356483B2 (en) * 2021-10-18 2023-10-04 株式会社日立製作所 Information processing device, authenticity verification method, and program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040022439A (en) * 2001-06-29 2004-03-12 시큐어 시스템스 리미티드 Security system and method for computers
CN1512360A (en) * 2002-12-31 2004-07-14 台均实业有限公司 Safety authentication method for movable storage device and read and write identification device
CN101620541A (en) * 2008-06-30 2010-01-06 株式会社东芝 Information processing apparatus and boot method thereof
CN101620657A (en) * 2008-06-30 2010-01-06 株式会社东芝 Information processing apparatus and security protection method
KR20130064521A (en) * 2011-12-08 2013-06-18 삼성전자주식회사 Data storage device and data management method thereof

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8667580B2 (en) * 2004-11-15 2014-03-04 Intel Corporation Secure boot scheme from external memory using internal memory
JP2008192126A (en) * 2007-01-12 2008-08-21 Konica Minolta Business Technologies Inc Information processor and program
JP2009271637A (en) * 2008-05-01 2009-11-19 Hitachi Ltd Storage device and its drive startup method
JP5035385B2 (en) * 2010-04-26 2012-09-26 富士通株式会社 Program, limiting method and computer
EP2671184A1 (en) * 2011-02-01 2013-12-11 MCCI Corporation Security arrangements for extended usb protocol stack of a usb host system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040022439A (en) * 2001-06-29 2004-03-12 시큐어 시스템스 리미티드 Security system and method for computers
CN1512360A (en) * 2002-12-31 2004-07-14 台均实业有限公司 Safety authentication method for movable storage device and read and write identification device
CN101620541A (en) * 2008-06-30 2010-01-06 株式会社东芝 Information processing apparatus and boot method thereof
CN101620657A (en) * 2008-06-30 2010-01-06 株式会社东芝 Information processing apparatus and security protection method
KR20130064521A (en) * 2011-12-08 2013-06-18 삼성전자주식회사 Data storage device and data management method thereof

Also Published As

Publication number Publication date
JP2016062551A (en) 2016-04-25
JP6293629B2 (en) 2018-03-14
CN105446656B (en) 2018-08-14
KR20160034798A (en) 2016-03-30

Similar Documents

Publication Publication Date Title
KR20210131444A (en) Identity creation for computing devices using physical copy protection
JPWO2010134192A1 (en) Electronic device, key generation program, recording medium, and key generation method
CN101308538B (en) Method and apparatus for checking integrity of firmware
JP5736994B2 (en) Information processing apparatus, validity verification method, and program
JP2008226158A (en) Information processing device, software update method, and image processing device
US10664263B2 (en) Software management system, software updater, software updating method, and non-transitory computer-readable storage medium storing software update program
JP2006295872A (en) Formation method of device-dependent key, confidential information lsi equipped with secret information function using the method, host equipment using the lsi, record medium with authentication function used for the host equipment, and mobile terminal with recording medium equipped with authentication function
CN104200156A (en) Trusted cryptosystem based on Loongson processor
TW201820818A (en) Method and device for configuring terminal master key
CN100334519C (en) Method for establishing credible input-output channels
CN103347017A (en) Data processing method and system on chip
CN105446656A (en) Information processing device
CN110932853B (en) Key management device and key management method based on trusted module
CN105354497A (en) Computer protection apparatus and method
CN105404470A (en) Data storage method, data security apparatus and data storage system
CN106062759B (en) License Info managing device, license information management method and computer readable storage medium
US10187379B2 (en) Control apparatus and control apparatus system
CN103377327A (en) PHP program protection method and system
KR101276217B1 (en) Data recovery system and method for hard disk using encryption scheme
CN112926101B (en) Disk partition encryption method, system, device and computer readable medium
CN105656866A (en) Data encryption method and system
CN112825093B (en) Security baseline checking method, host, server, electronic device and storage medium
CN109583196B (en) Key generation method
US9323951B2 (en) Encrypted warranty verification and diagnostic tool
JP2015232742A (en) User authentication method and ejection molding machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180814