CN107145788A - A kind of BMC trusted configuration methods with access control function - Google Patents
A kind of BMC trusted configuration methods with access control function Download PDFInfo
- Publication number
- CN107145788A CN107145788A CN201710326890.9A CN201710326890A CN107145788A CN 107145788 A CN107145788 A CN 107145788A CN 201710326890 A CN201710326890 A CN 201710326890A CN 107145788 A CN107145788 A CN 107145788A
- Authority
- CN
- China
- Prior art keywords
- bmc
- trusted
- boot block
- reference value
- bios boot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The present invention provides a kind of BMC trusted configuration methods with access control function, and trusted function module, the unlatching of trusted function module, the configuration of a reference value, the presentation of BMC firmware trusted status and the presentation of BIOS trusted status are added in BMC web management interfaces.Integrity measurement is carried out to BMC firmwares and BIOS key codes during BMC electrifying startups, it is ensured that the integrality of program, so as to set up the credible performing environment of system platform.So as to be reinforced to BMC, the measurement of integrality is carried out to BMC firmwares and BIOS during BMC startup optimizations, ensure the integrality of program and be not implanted malicious code, it is established that the complete trust chain of BMC start-up courses, it is ensured that system platform performing environment it is credible.
Description
Technical field
The present invention relates to BMC fields, more particularly to a kind of BMC trusted configuration methods with access control function.
Background technology
BMC is baseboard management controller, and server field is widely used at present.Utilize virtual keyboard, interface, mouse
Mark, power supply etc. provide remote management capability for server.User monitors the physical features of server using BMC, such as each part
Temperature, voltage, fan operating state, power supply supply and cabinet invasion etc..BMC is used as management control relatively independent in server
Unit processed has security risk in itself, for example, be implanted malicious code, and user is carried out remotely using BMC to server in addition
, may be improper because of security configuration during management, such as low uneasy full operation of password complexity causes the safety wind in running
Danger.There is part raising in secure context as although the development BMC chip of information technology realizes, but in application process also
There is the raising of safety and confidence level, so the safety and confidence level that how to improve BMC chip are current assistant officer technologies to be solved
Problem.
The content of the invention
In order to overcome above-mentioned deficiency of the prior art, it is credible that the present invention provides a kind of BMC with access control function
Collocation method, BMC trusted configuration methods include:
Open BMC trusted function modules;
The BMC a reference values of configuration;
BMC firmware trusted status is presented;
BIOS trusted status is presented.
Preferably, step is opened trusted function module and also included:
Open the integrity measurement function of BMC firmwares and open the metric function of BIOS Boot Block integralities.
Preferably, opening trusted function module also includes:
Set corresponding trusted function module to open/close button in web management interface to select for user;
If selected close BMC trusted function modules, BMC does not perform BMC trusted function modules, only opened as common mode
Dynamic BMC.
Preferably, the BMC a reference values of step configuration also include:Using metric as a reference value and on the basis of being manually entered
Value;
Include using metric as a reference value:Franchise code input area is provided in web management interface;
User inputs franchise code in franchise code input area, and franchise code is the password that user is set, and only user oneself gathers around
Have, the operation to a reference value adds access control right, it is ensured that BMC management safety;
Value includes on the basis of being manually entered:There is provided in web management interface and be manually entered a reference value input area, for user
It is manually entered a reference value.
Preferably, step is presented BMC firmware trusted status and also included:
BMC firmware a reference values are presented;
BMC firmware metrics are presented;
The metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring;
BMC firmware a reference values, which are presented, to be included:The BMC firmware a reference values shown in web management interface be after dispatching from the factory by with
Uboot measurement Kernel and cryptographic Hash, the trusted agent program of trusted agent program that family is set measure BMC application program
Extend cryptographic Hash;The renewal of a reference value is carried out by presetting the configuration interface that trusted agent program is provided;
BMC firmware metrics, which are presented, to be included:The metric of the BMC firmwares shown in web management interface is Uboot measurements
Cryptographic Hash, the extension cryptographic Hash of trusted agent program measurement BMC application program of Kernel and trusted agent program.
Preferably, the metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison knot for presenting and configuring
Fruit includes:The a reference value of BMC firmwares and the metric of BMC firmwares are compared, according to a reference value of BMC firmwares and BMC firmwares
Metric comparison result, carry out configuration operation.
Preferably, carrying out configuration operation includes:
When a reference value of BMC firmwares is consistent with the metric comparison of BMC firmwares, prompt message is " credible ";
When a reference value of BMC firmwares and the metric of BMC firmwares compare inconsistent, prompt message is " insincere ", simultaneously
Display " the franchise code of input " and " updating BMC firmwares a reference value " two function buttons;
If selected " the franchise code of input " button carries out franchise startup, it is necessary to input franchise code, entering BMC firmwares can not
Letter state;
If selected " updating BMC firmwares a reference value " button, provides the input of BMC firmwares a reference value in web management interface
Area;
User inputs BMC firmware a reference values in BMC firmware a reference values input area, and BMC firmware a reference values are user's settings
Password, only user oneself possesses, and the operation to BMC firmware a reference values adds access control right, it is ensured that BMC management
Safety;
The a reference value of BMC firmwares is restarted after being provided with and the metric of BMC firmwares is compared.
Preferably, step is presented BIOS trusted status and also included:
After BMC firmwares confirm credible, the BIOS Boot Block opened in BMC start, and are opened in Web page
BIOS Boot Block trusted status is compared.
Preferably, step BIOS Boot Block trusted status is compared and also included:
BIOS Boot Block a reference value is presented;
BIOS Boot Block metric is presented;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured;
BIOS Boot Block a reference value, which is presented, to be included:The BIOS Boot Block benchmark shown in Web page
Value;The renewal of BIOS Boot Block a reference values is carried out by presetting the configuration interface that trusted agent program is provided;
BIOS Boot Block metric, which is presented, to be included:BMC trusted agents program measurement is shown in Web page
BIOS Boot Block cryptographic Hash;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured, according to
BIOS Boot Block a reference value and BIOS Boot Block cryptographic Hash are compared, and are configured according to comparing result
Operation.
Preferably, when BIOS Boot Block cryptographic Hash and BIOS Boot Block a reference value compare consistent, carry
It is " credible " to show information;
When BIOS Boot Block cryptographic Hash compares inconsistent with BIOS Boot Block a reference value, prompt message
For " insincere ", while showing " the franchise code of input " and " updating BIOS Boot Block a reference values ", make user's selection operation;
When selected " the franchise code of input ", the franchise code of input carries out franchise startup, enters BIOS Boot Block insincere
State, maintenance system relevant configuration;
When selected " updating BIOS Boot Block a reference values ", BIOS Boot Block are provided in web management interface
A reference value input area;
User inputs BIOS Boot Block a reference values, BIOS in BIOS Boot Block a reference values input area
Boot Block a reference values are the passwords that user is set, and only user oneself possesses, and the operation to a reference value adds access control
Authority processed, it is ensured that BMC management safety;
The a reference value that BIOS Boot Block metric and BIOS Boot Block are restarted after being provided with is compared
Pair and configuration.
As can be seen from the above technical solutions, the present invention has advantages below:
The present invention adds trusted function module in BMC web management interfaces, and the unlatching of trusted function module, a reference value are matched somebody with somebody
Put, the presentation of BMC firmware trusted status and the presentation of BIOS trusted status.During BMC electrifying startups to BMC firmwares and
BIOS key codes carry out integrity measurement, it is ensured that the integrality of program, so as to set up the credible performing environment of system platform.
So as to be reinforced to BMC, the measurement of integrality is carried out to BMC firmwares and BIOS during BMC startup optimizations, it is ensured that program
Integrality and be not implanted malicious code, it is established that the complete trust chain of BMC start-up courses, it is ensured that system platform perform
Environment it is credible,
Brief description of the drawings
In order to illustrate more clearly of technical scheme, it will make simple to the required accompanying drawing used in description below
Introduce on ground, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ordinary skill
For personnel, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the BMC trusted configuration method flow diagrams with access control function;
Fig. 2 is unlatching/closing schematic diagram of trusted function module;
Schematic diagram is presented in value configuration on the basis of Fig. 3;
Fig. 4 is the presentation mode schematic diagram of the franchise code of input;
Fig. 5 is the presentation mode schematic diagram for being manually entered a reference value;
Fig. 6 is presentation mode schematic diagram when BMC firmwares are credible;
Fig. 7 is presentation mode schematic diagram when BMC firmwares are insincere;
Presentation mode schematic diagram when Fig. 8 is BIOS Boot Block credible;
Presentation mode schematic diagram when Fig. 9 is BIOS Boot Block insincere.
Embodiment
, below will be with specific to enable goal of the invention, feature, the advantage of the present invention more obvious and understandable
Embodiment and accompanying drawing, the technical scheme that the present invention is protected are clearly and completely described, it is clear that implementation disclosed below
Example is only a part of embodiment of the invention, and not all embodiment.Based on the embodiment in this patent, the common skill in this area
All other embodiment that art personnel are obtained under the premise of creative work is not made, belongs to the model of this patent protection
Enclose.
The present embodiment provides a kind of BMC trusted configuration methods with access control function, matches somebody with somebody as shown in figure 1, BMC is credible
The method of putting includes:
S1:Open BMC trusted function modules;
S2:The BMC a reference values of configuration;
S3:BMC firmware trusted status is presented;
S4:BIOS trusted status is presented.
In the present embodiment, step is opened trusted function module and also included:Open BMC firmwares integrity measurement function with
And open the metric function of BIOS Boot Block integralities.
Specifically, as shown in Figure 2, setting corresponding trusted function module to open/close button in web management interface and supplying
User selects;If selected close BMC trusted function modules, BMC does not perform BMC trusted function modules, only as common mode
Start BMC.
In the present embodiment, the BMC a reference values of step configuration also include:As shown in Figure 3, a reference value is used as using metric
With the value on the basis of being manually entered;Include using metric as a reference value:Franchise code input area is provided in web management interface;
User inputs franchise code in franchise code input area, as shown in Figure 4, and franchise code is the password that user is set, only user from
Oneself possesses, and the operation to a reference value adds access control right, it is ensured that BMC management safety;As shown in Figure 5, with manual
Value includes on the basis of input:There is provided in web management interface and be manually entered a reference value input area, benchmark is manually entered for user
Value.
In the present embodiment, step is presented BMC firmware trusted status and also included:
BMC firmware a reference values are presented;
BMC firmware metrics are presented;
The metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring;
BMC firmware a reference values, which are presented, to be included:The BMC firmware a reference values shown in web management interface be after dispatching from the factory by with
Uboot measurement Kernel and cryptographic Hash, the trusted agent program of trusted agent program that family is set measure BMC application program
Extend cryptographic Hash;The renewal of a reference value is carried out by presetting the configuration interface that trusted agent program is provided;
BMC firmware metrics, which are presented, to be included:The metric of the BMC firmwares shown in web management interface is Uboot measurements
Cryptographic Hash, the extension cryptographic Hash of trusted agent program measurement BMC application program of Kernel and trusted agent program.
Wherein, the metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring
Including:The a reference value of BMC firmwares and the metric of BMC firmwares are compared, according to a reference value of BMC firmwares and BMC firmwares
The comparison result of metric, carries out configuration operation.
Carrying out configuration operation includes:As shown in Figure 7,
When a reference value of BMC firmwares is consistent with the metric comparison of BMC firmwares, prompt message is " credible ";
When a reference value of BMC firmwares and the metric of BMC firmwares compare inconsistent, prompt message is " insincere ", simultaneously
Display " the franchise code of input " and " updating BMC firmwares a reference value " two function buttons;
If selected " the franchise code of input " button carries out franchise startup, it is necessary to input franchise code, entering BMC firmwares can not
Letter state;
If selected " updating BMC firmwares a reference value " button, provides the input of BMC firmwares a reference value in web management interface
Area;
User inputs BMC firmware a reference values in BMC firmware a reference values input area, and BMC firmware a reference values are user's settings
Password, only user oneself possesses, and the operation to BMC firmware a reference values adds access control right, it is ensured that BMC management
Safety;The a reference value of BMC firmwares is restarted after being provided with and the metric of BMC firmwares is compared.
In the present embodiment, step is presented BIOS trusted status and also included:As shown in figs. 8 and 9,
After BMC firmwares confirm credible, the BIOS Boot Block opened in BMC start, and are opened in Web page
BIOS Boot Block trusted status is compared.
Step BIOS Boot Block trusted status, which is compared, also to be included:
BIOS Boot Block a reference value is presented;
BIOS Boot Block metric is presented;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured;
BIOS Boot Block a reference value, which is presented, to be included:The BIOS Boot Block benchmark shown in Web page
Value;The renewal of BIOS Boot Block a reference values is carried out by presetting the configuration interface that trusted agent program is provided;
BIOS Boot Block metric, which is presented, to be included:BMC trusted agents program measurement is shown in Web page
BIOS Boot Block cryptographic Hash;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured, according to
BIOS Boot Block a reference value and BIOS Boot Block cryptographic Hash are compared, and are configured according to comparing result
Operation.
When BIOS Boot Block cryptographic Hash compares consistent with BIOS Boot Block a reference value, prompt message is
" credible ";
When BIOS Boot Block cryptographic Hash compares inconsistent with BIOS Boot Block a reference value, prompt message
For " insincere ", while showing " the franchise code of input " and " updating BIOS Boot Block a reference values ", make user's selection operation;
When selected " the franchise code of input ", the franchise code of input carries out franchise startup, enters BIOS Boot Block insincere
State, maintenance system relevant configuration;
When selected " updating BIOS Boot Block a reference values ", BIOS Boot Block are provided in web management interface
A reference value input area;
User inputs BIOS Boot Block a reference values, BIOS in BIOS Boot Block a reference values input area
Boot Block a reference values are the passwords that user is set, and only user oneself possesses, and the operation to a reference value adds access control
Authority processed, it is ensured that BMC management safety;
The a reference value that BIOS Boot Block metric and BIOS Boot Block are restarted after being provided with is compared
Pair and configuration.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope caused.
Claims (10)
1. a kind of BMC trusted configuration methods with access control function, it is characterised in that BMC trusted configuration methods include:
Open BMC trusted function modules;
The BMC a reference values of configuration;
BMC firmware trusted status is presented;
BIOS trusted status is presented.
2. the BMC trusted configuration methods according to claim 1 with access control function, it is characterised in that
Step, which opens trusted function module, also to be included:
Open the integrity measurement function of BMC firmwares and open the metric function of BIOS Boot Block integralities.
3. the BMC trusted configuration methods according to claim 1 with access control function, it is characterised in that
Opening trusted function module also includes:
Set corresponding trusted function module to open/close button in web management interface to select for user;
If selected close BMC trusted function modules, BMC does not perform BMC trusted function modules, only started as common mode
BMC。
4. the BMC trusted configuration methods according to claim 1 with access control function, it is characterised in that
The BMC a reference values of step configuration also include:A reference value and the value on the basis of being manually entered are used as using metric;
Include using metric as a reference value:Franchise code input area is provided in web management interface;
User inputs franchise code in franchise code input area, and franchise code is the password that user is set, and only user oneself possesses, right
The operation of a reference value adds access control right, it is ensured that BMC management safety;
Value includes on the basis of being manually entered:There is provided in web management interface and be manually entered a reference value input area, it is manual for user
Input reference.
5. the BMC trusted configuration methods according to claim 1 with access control function, it is characterised in that
BMC firmware trusted status, which is presented, in step also includes:
BMC firmware a reference values are presented;
BMC firmware metrics are presented;
The metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring;
BMC firmware a reference values, which are presented, to be included:The BMC firmware a reference values shown in web management interface are to be set after dispatching from the factory by user
The Uboot measurement Kernel and cryptographic Hash, the trusted agent program of trusted agent program that put measure the extension of BMC application program
Cryptographic Hash;The renewal of a reference value is carried out by presetting the configuration interface that trusted agent program is provided;
BMC firmware metrics, which are presented, to be included:The metric of the BMC firmwares shown in web management interface is Uboot measurements Kernel
Cryptographic Hash, the extension cryptographic Hash of trusted agent program measurement BMC application program with trusted agent program.
6. the BMC trusted configuration methods according to claim 5 with access control function, it is characterised in that
The metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring includes:BMC consolidates
The a reference value of part and the metric of BMC firmwares are compared, according to a reference value of BMC firmwares and the ratio of the metric of BMC firmwares
To result, configuration operation is carried out.
7. the BMC trusted configuration methods according to claim 6 with access control function, it is characterised in that
Carrying out configuration operation includes:
When a reference value of BMC firmwares is consistent with the metric comparison of BMC firmwares, prompt message is " credible ";
When a reference value of BMC firmwares and the metric of BMC firmwares compare inconsistent, prompt message is " insincere ", is shown simultaneously
" the franchise code of input " and " updating BMC firmwares a reference value " two function buttons;
If selected " the franchise code of input " button carries out franchise startup, it is necessary to input franchise code, BMC firmwares are made to enter insincere shape
State;
If selected " updating BMC firmwares a reference value " button, provides BMC firmware a reference values input area in web management interface;
User inputs BMC firmware a reference values in BMC firmware a reference values input area, and BMC firmware a reference values are the close of user's setting
Code, only user oneself possesses, and the operation to BMC firmware a reference values adds access control right, it is ensured that BMC management peace
Entirely;
The a reference value of BMC firmwares is restarted after being provided with and the metric of BMC firmwares is compared.
8. the BMC trusted configuration methods according to claim 7 with access control function, it is characterised in that
BIOS trusted status, which is presented, in step also includes:
After BMC firmwares confirm credible, the BIOS Boot Block opened in BMC start, and open BIOS in Web page
Boot Block trusted status is compared.
9. the BMC trusted configuration methods according to claim 8 with access control function, it is characterised in that
Step BIOS Boot Block trusted status, which is compared, also to be included:
BIOS Boot Block a reference value is presented;
BIOS Boot Block metric is presented;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured;
BIOS Boot Block a reference value, which is presented, to be included:The BIOS Boot Block a reference values shown in Web page;
The renewal of BIOS Boot Block a reference values is carried out by presetting the configuration interface that trusted agent program is provided;
BIOS Boot Block metric, which is presented, to be included:The BIOS of BMC trusted agents program measurement is shown in Web page
Boot Block cryptographic Hash;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured, according to BIOS
Boot Block a reference value and BIOS Boot Block cryptographic Hash are compared, and configuration operation is carried out according to comparing result.
10. the BMC trusted configuration methods according to claim 9 with access control function, it is characterised in that
When BIOS Boot Block cryptographic Hash compares consistent with BIOS Boot Block a reference value, prompt message is " can
Letter ";
When BIOS Boot Block cryptographic Hash compares inconsistent with BIOS Boot Block a reference value, prompt message is
" insincere ", while display " the franchise code of input " and " updating BIOS Boot Block a reference values ", make user's selection operation;
When selected " the franchise code of input ", the franchise code of input carries out franchise startup, BIOS Boot Block is entered insincere shape
State, maintenance system relevant configuration;
When selected " updating BIOS Boot Block a reference values ", BIOS Boot Block benchmark are provided in web management interface
It is worth input area;
User inputs BIOS Boot Block a reference values, BIOS Boot in BIOS Boot Block a reference values input area
Block a reference values are the passwords that user is set, and only user oneself possesses, and the operation to a reference value adds access control power
Limit, it is ensured that BMC management safety;
The a reference value of metric and BIOS Boot Block that BIOS Boot Block are restarted after being provided be compared and
Configuration.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710326890.9A CN107145788A (en) | 2017-05-10 | 2017-05-10 | A kind of BMC trusted configuration methods with access control function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710326890.9A CN107145788A (en) | 2017-05-10 | 2017-05-10 | A kind of BMC trusted configuration methods with access control function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107145788A true CN107145788A (en) | 2017-09-08 |
Family
ID=59778012
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710326890.9A Pending CN107145788A (en) | 2017-05-10 | 2017-05-10 | A kind of BMC trusted configuration methods with access control function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107145788A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107526593A (en) * | 2017-08-28 | 2017-12-29 | 大唐高鸿信安(浙江)信息科技有限公司 | BMC customizing functions methods based on dynamic link library |
CN107729069A (en) * | 2017-10-12 | 2018-02-23 | 浪潮(北京)电子信息产业有限公司 | A kind of method, apparatus of clean boot video card, computer-readable recording medium |
CN109063489A (en) * | 2018-08-28 | 2018-12-21 | 郑州云海信息技术有限公司 | A kind of starting method and device |
CN109388442A (en) * | 2018-10-31 | 2019-02-26 | 郑州云海信息技术有限公司 | A kind of method, apparatus and computer equipment of batch configuration BMC user |
CN109669731A (en) * | 2018-12-28 | 2019-04-23 | 联想(北京)有限公司 | The service control method and device of substrate manager |
CN110020528A (en) * | 2019-04-11 | 2019-07-16 | 苏州浪潮智能科技有限公司 | A kind of BMC starting method, apparatus and electronic equipment and storage medium |
CN112114908A (en) * | 2020-11-20 | 2020-12-22 | 支付宝(杭州)信息技术有限公司 | Hardware platform, starting method and device thereof, and electronic equipment |
CN112346785A (en) * | 2019-08-06 | 2021-02-09 | 阿里巴巴集团控股有限公司 | Data processing method, device, system, storage medium and computer equipment |
CN112699346A (en) * | 2021-01-05 | 2021-04-23 | 本贸科技股份有限公司 | Method for reinforcing and protecting BMC chip firmware based on cryptographic chip SE |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9147086B1 (en) * | 2013-06-07 | 2015-09-29 | Amazon Technologies, Inc. | Trusted computing host |
CN106127056A (en) * | 2016-06-20 | 2016-11-16 | 浪潮电子信息产业股份有限公司 | Design method of domestic BMC chip trusted firmware |
CN106169054A (en) * | 2016-07-13 | 2016-11-30 | 浪潮电子信息产业股份有限公司 | Access control method based on trusted state |
-
2017
- 2017-05-10 CN CN201710326890.9A patent/CN107145788A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9147086B1 (en) * | 2013-06-07 | 2015-09-29 | Amazon Technologies, Inc. | Trusted computing host |
CN106127056A (en) * | 2016-06-20 | 2016-11-16 | 浪潮电子信息产业股份有限公司 | Design method of domestic BMC chip trusted firmware |
CN106169054A (en) * | 2016-07-13 | 2016-11-30 | 浪潮电子信息产业股份有限公司 | Access control method based on trusted state |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107526593B (en) * | 2017-08-28 | 2020-04-10 | 大唐高鸿信安(浙江)信息科技有限公司 | BMC function customizing method based on dynamic link library |
CN107526593A (en) * | 2017-08-28 | 2017-12-29 | 大唐高鸿信安(浙江)信息科技有限公司 | BMC customizing functions methods based on dynamic link library |
CN107729069A (en) * | 2017-10-12 | 2018-02-23 | 浪潮(北京)电子信息产业有限公司 | A kind of method, apparatus of clean boot video card, computer-readable recording medium |
CN109063489A (en) * | 2018-08-28 | 2018-12-21 | 郑州云海信息技术有限公司 | A kind of starting method and device |
CN109388442A (en) * | 2018-10-31 | 2019-02-26 | 郑州云海信息技术有限公司 | A kind of method, apparatus and computer equipment of batch configuration BMC user |
CN109669731A (en) * | 2018-12-28 | 2019-04-23 | 联想(北京)有限公司 | The service control method and device of substrate manager |
CN109669731B (en) * | 2018-12-28 | 2022-03-25 | 联想(北京)有限公司 | Service control method and device of baseboard manager |
CN110020528A (en) * | 2019-04-11 | 2019-07-16 | 苏州浪潮智能科技有限公司 | A kind of BMC starting method, apparatus and electronic equipment and storage medium |
CN112346785A (en) * | 2019-08-06 | 2021-02-09 | 阿里巴巴集团控股有限公司 | Data processing method, device, system, storage medium and computer equipment |
WO2021023173A1 (en) * | 2019-08-06 | 2021-02-11 | 阿里巴巴集团控股有限公司 | Data processing method, apparatus and system, storage medium, and computer device |
CN112346785B (en) * | 2019-08-06 | 2024-05-14 | 阿里巴巴集团控股有限公司 | Data processing method, device, system, storage medium and computer equipment |
CN112114908A (en) * | 2020-11-20 | 2020-12-22 | 支付宝(杭州)信息技术有限公司 | Hardware platform, starting method and device thereof, and electronic equipment |
CN112699346A (en) * | 2021-01-05 | 2021-04-23 | 本贸科技股份有限公司 | Method for reinforcing and protecting BMC chip firmware based on cryptographic chip SE |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107145788A (en) | A kind of BMC trusted configuration methods with access control function | |
US11520894B2 (en) | Verifying controller code | |
CN107506663A (en) | Server security based on credible BMC starts method | |
US8726393B2 (en) | Cyber security analyzer | |
CN106384052A (en) | Method for realizing BMC U-boot trusted boot control | |
CN106127056A (en) | Design method of domestic BMC chip trusted firmware | |
KR101768583B1 (en) | Secure battery authentication | |
US9990255B2 (en) | Repairing compromised system data in a non-volatile memory | |
US9852298B2 (en) | Configuring a system | |
US7930527B2 (en) | Information processing apparatus and time and date information change method | |
US20140115314A1 (en) | Electronic device and secure boot method | |
JP2013149135A (en) | Method for booting computer and computer | |
CN110659498A (en) | Trusted computing measurement method, system thereof and computer readable storage medium | |
US10742412B2 (en) | Separate cryptographic keys for multiple modes | |
CN106603307A (en) | Method and device of configuration modification | |
US20070255948A1 (en) | Trusted platform field upgrade system and method | |
CN109086634A (en) | A kind of BMC chip management method, system and BMC chip and storage medium | |
CN113064643A (en) | Method, system and medium for instantly-effective modification of BIOS set value | |
CN106919845B (en) | System security trust chain construction device and method | |
CN102982260B (en) | A kind of (SuSE) Linux OS and installation series number verification method thereof | |
CN109241744A (en) | A kind of creditable calculation modules and the credible starting method using the module | |
CN115618360A (en) | Server tamper-proof safe starting method and device | |
CN113627808B (en) | Security assessment method and system for third-party intelligent electric power Internet of things equipment of power distribution network | |
US20230034526A1 (en) | Trust verification system and method for a baseboard management controller (bmc) | |
CN108279589A (en) | A kind of programmed method, system and the device of heat pump liquid-crystal controller |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170908 |