CN107145788A - A kind of BMC trusted configuration methods with access control function - Google Patents

A kind of BMC trusted configuration methods with access control function Download PDF

Info

Publication number
CN107145788A
CN107145788A CN201710326890.9A CN201710326890A CN107145788A CN 107145788 A CN107145788 A CN 107145788A CN 201710326890 A CN201710326890 A CN 201710326890A CN 107145788 A CN107145788 A CN 107145788A
Authority
CN
China
Prior art keywords
bmc
trusted
boot block
reference value
bios boot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710326890.9A
Other languages
Chinese (zh)
Inventor
苏振宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710326890.9A priority Critical patent/CN107145788A/en
Publication of CN107145788A publication Critical patent/CN107145788A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention provides a kind of BMC trusted configuration methods with access control function, and trusted function module, the unlatching of trusted function module, the configuration of a reference value, the presentation of BMC firmware trusted status and the presentation of BIOS trusted status are added in BMC web management interfaces.Integrity measurement is carried out to BMC firmwares and BIOS key codes during BMC electrifying startups, it is ensured that the integrality of program, so as to set up the credible performing environment of system platform.So as to be reinforced to BMC, the measurement of integrality is carried out to BMC firmwares and BIOS during BMC startup optimizations, ensure the integrality of program and be not implanted malicious code, it is established that the complete trust chain of BMC start-up courses, it is ensured that system platform performing environment it is credible.

Description

A kind of BMC trusted configuration methods with access control function
Technical field
The present invention relates to BMC fields, more particularly to a kind of BMC trusted configuration methods with access control function.
Background technology
BMC is baseboard management controller, and server field is widely used at present.Utilize virtual keyboard, interface, mouse Mark, power supply etc. provide remote management capability for server.User monitors the physical features of server using BMC, such as each part Temperature, voltage, fan operating state, power supply supply and cabinet invasion etc..BMC is used as management control relatively independent in server Unit processed has security risk in itself, for example, be implanted malicious code, and user is carried out remotely using BMC to server in addition , may be improper because of security configuration during management, such as low uneasy full operation of password complexity causes the safety wind in running Danger.There is part raising in secure context as although the development BMC chip of information technology realizes, but in application process also There is the raising of safety and confidence level, so the safety and confidence level that how to improve BMC chip are current assistant officer technologies to be solved Problem.
The content of the invention
In order to overcome above-mentioned deficiency of the prior art, it is credible that the present invention provides a kind of BMC with access control function Collocation method, BMC trusted configuration methods include:
Open BMC trusted function modules;
The BMC a reference values of configuration;
BMC firmware trusted status is presented;
BIOS trusted status is presented.
Preferably, step is opened trusted function module and also included:
Open the integrity measurement function of BMC firmwares and open the metric function of BIOS Boot Block integralities.
Preferably, opening trusted function module also includes:
Set corresponding trusted function module to open/close button in web management interface to select for user;
If selected close BMC trusted function modules, BMC does not perform BMC trusted function modules, only opened as common mode Dynamic BMC.
Preferably, the BMC a reference values of step configuration also include:Using metric as a reference value and on the basis of being manually entered Value;
Include using metric as a reference value:Franchise code input area is provided in web management interface;
User inputs franchise code in franchise code input area, and franchise code is the password that user is set, and only user oneself gathers around Have, the operation to a reference value adds access control right, it is ensured that BMC management safety;
Value includes on the basis of being manually entered:There is provided in web management interface and be manually entered a reference value input area, for user It is manually entered a reference value.
Preferably, step is presented BMC firmware trusted status and also included:
BMC firmware a reference values are presented;
BMC firmware metrics are presented;
The metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring;
BMC firmware a reference values, which are presented, to be included:The BMC firmware a reference values shown in web management interface be after dispatching from the factory by with Uboot measurement Kernel and cryptographic Hash, the trusted agent program of trusted agent program that family is set measure BMC application program Extend cryptographic Hash;The renewal of a reference value is carried out by presetting the configuration interface that trusted agent program is provided;
BMC firmware metrics, which are presented, to be included:The metric of the BMC firmwares shown in web management interface is Uboot measurements Cryptographic Hash, the extension cryptographic Hash of trusted agent program measurement BMC application program of Kernel and trusted agent program.
Preferably, the metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison knot for presenting and configuring Fruit includes:The a reference value of BMC firmwares and the metric of BMC firmwares are compared, according to a reference value of BMC firmwares and BMC firmwares Metric comparison result, carry out configuration operation.
Preferably, carrying out configuration operation includes:
When a reference value of BMC firmwares is consistent with the metric comparison of BMC firmwares, prompt message is " credible ";
When a reference value of BMC firmwares and the metric of BMC firmwares compare inconsistent, prompt message is " insincere ", simultaneously Display " the franchise code of input " and " updating BMC firmwares a reference value " two function buttons;
If selected " the franchise code of input " button carries out franchise startup, it is necessary to input franchise code, entering BMC firmwares can not Letter state;
If selected " updating BMC firmwares a reference value " button, provides the input of BMC firmwares a reference value in web management interface Area;
User inputs BMC firmware a reference values in BMC firmware a reference values input area, and BMC firmware a reference values are user's settings Password, only user oneself possesses, and the operation to BMC firmware a reference values adds access control right, it is ensured that BMC management Safety;
The a reference value of BMC firmwares is restarted after being provided with and the metric of BMC firmwares is compared.
Preferably, step is presented BIOS trusted status and also included:
After BMC firmwares confirm credible, the BIOS Boot Block opened in BMC start, and are opened in Web page BIOS Boot Block trusted status is compared.
Preferably, step BIOS Boot Block trusted status is compared and also included:
BIOS Boot Block a reference value is presented;
BIOS Boot Block metric is presented;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured;
BIOS Boot Block a reference value, which is presented, to be included:The BIOS Boot Block benchmark shown in Web page Value;The renewal of BIOS Boot Block a reference values is carried out by presetting the configuration interface that trusted agent program is provided;
BIOS Boot Block metric, which is presented, to be included:BMC trusted agents program measurement is shown in Web page BIOS Boot Block cryptographic Hash;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured, according to BIOS Boot Block a reference value and BIOS Boot Block cryptographic Hash are compared, and are configured according to comparing result Operation.
Preferably, when BIOS Boot Block cryptographic Hash and BIOS Boot Block a reference value compare consistent, carry It is " credible " to show information;
When BIOS Boot Block cryptographic Hash compares inconsistent with BIOS Boot Block a reference value, prompt message For " insincere ", while showing " the franchise code of input " and " updating BIOS Boot Block a reference values ", make user's selection operation;
When selected " the franchise code of input ", the franchise code of input carries out franchise startup, enters BIOS Boot Block insincere State, maintenance system relevant configuration;
When selected " updating BIOS Boot Block a reference values ", BIOS Boot Block are provided in web management interface A reference value input area;
User inputs BIOS Boot Block a reference values, BIOS in BIOS Boot Block a reference values input area Boot Block a reference values are the passwords that user is set, and only user oneself possesses, and the operation to a reference value adds access control Authority processed, it is ensured that BMC management safety;
The a reference value that BIOS Boot Block metric and BIOS Boot Block are restarted after being provided with is compared Pair and configuration.
As can be seen from the above technical solutions, the present invention has advantages below:
The present invention adds trusted function module in BMC web management interfaces, and the unlatching of trusted function module, a reference value are matched somebody with somebody Put, the presentation of BMC firmware trusted status and the presentation of BIOS trusted status.During BMC electrifying startups to BMC firmwares and BIOS key codes carry out integrity measurement, it is ensured that the integrality of program, so as to set up the credible performing environment of system platform. So as to be reinforced to BMC, the measurement of integrality is carried out to BMC firmwares and BIOS during BMC startup optimizations, it is ensured that program Integrality and be not implanted malicious code, it is established that the complete trust chain of BMC start-up courses, it is ensured that system platform perform Environment it is credible,
Brief description of the drawings
In order to illustrate more clearly of technical scheme, it will make simple to the required accompanying drawing used in description below Introduce on ground, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ordinary skill For personnel, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the BMC trusted configuration method flow diagrams with access control function;
Fig. 2 is unlatching/closing schematic diagram of trusted function module;
Schematic diagram is presented in value configuration on the basis of Fig. 3;
Fig. 4 is the presentation mode schematic diagram of the franchise code of input;
Fig. 5 is the presentation mode schematic diagram for being manually entered a reference value;
Fig. 6 is presentation mode schematic diagram when BMC firmwares are credible;
Fig. 7 is presentation mode schematic diagram when BMC firmwares are insincere;
Presentation mode schematic diagram when Fig. 8 is BIOS Boot Block credible;
Presentation mode schematic diagram when Fig. 9 is BIOS Boot Block insincere.
Embodiment
, below will be with specific to enable goal of the invention, feature, the advantage of the present invention more obvious and understandable Embodiment and accompanying drawing, the technical scheme that the present invention is protected are clearly and completely described, it is clear that implementation disclosed below Example is only a part of embodiment of the invention, and not all embodiment.Based on the embodiment in this patent, the common skill in this area All other embodiment that art personnel are obtained under the premise of creative work is not made, belongs to the model of this patent protection Enclose.
The present embodiment provides a kind of BMC trusted configuration methods with access control function, matches somebody with somebody as shown in figure 1, BMC is credible The method of putting includes:
S1:Open BMC trusted function modules;
S2:The BMC a reference values of configuration;
S3:BMC firmware trusted status is presented;
S4:BIOS trusted status is presented.
In the present embodiment, step is opened trusted function module and also included:Open BMC firmwares integrity measurement function with And open the metric function of BIOS Boot Block integralities.
Specifically, as shown in Figure 2, setting corresponding trusted function module to open/close button in web management interface and supplying User selects;If selected close BMC trusted function modules, BMC does not perform BMC trusted function modules, only as common mode Start BMC.
In the present embodiment, the BMC a reference values of step configuration also include:As shown in Figure 3, a reference value is used as using metric With the value on the basis of being manually entered;Include using metric as a reference value:Franchise code input area is provided in web management interface; User inputs franchise code in franchise code input area, as shown in Figure 4, and franchise code is the password that user is set, only user from Oneself possesses, and the operation to a reference value adds access control right, it is ensured that BMC management safety;As shown in Figure 5, with manual Value includes on the basis of input:There is provided in web management interface and be manually entered a reference value input area, benchmark is manually entered for user Value.
In the present embodiment, step is presented BMC firmware trusted status and also included:
BMC firmware a reference values are presented;
BMC firmware metrics are presented;
The metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring;
BMC firmware a reference values, which are presented, to be included:The BMC firmware a reference values shown in web management interface be after dispatching from the factory by with Uboot measurement Kernel and cryptographic Hash, the trusted agent program of trusted agent program that family is set measure BMC application program Extend cryptographic Hash;The renewal of a reference value is carried out by presetting the configuration interface that trusted agent program is provided;
BMC firmware metrics, which are presented, to be included:The metric of the BMC firmwares shown in web management interface is Uboot measurements Cryptographic Hash, the extension cryptographic Hash of trusted agent program measurement BMC application program of Kernel and trusted agent program.
Wherein, the metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring Including:The a reference value of BMC firmwares and the metric of BMC firmwares are compared, according to a reference value of BMC firmwares and BMC firmwares The comparison result of metric, carries out configuration operation.
Carrying out configuration operation includes:As shown in Figure 7,
When a reference value of BMC firmwares is consistent with the metric comparison of BMC firmwares, prompt message is " credible ";
When a reference value of BMC firmwares and the metric of BMC firmwares compare inconsistent, prompt message is " insincere ", simultaneously Display " the franchise code of input " and " updating BMC firmwares a reference value " two function buttons;
If selected " the franchise code of input " button carries out franchise startup, it is necessary to input franchise code, entering BMC firmwares can not Letter state;
If selected " updating BMC firmwares a reference value " button, provides the input of BMC firmwares a reference value in web management interface Area;
User inputs BMC firmware a reference values in BMC firmware a reference values input area, and BMC firmware a reference values are user's settings Password, only user oneself possesses, and the operation to BMC firmware a reference values adds access control right, it is ensured that BMC management Safety;The a reference value of BMC firmwares is restarted after being provided with and the metric of BMC firmwares is compared.
In the present embodiment, step is presented BIOS trusted status and also included:As shown in figs. 8 and 9,
After BMC firmwares confirm credible, the BIOS Boot Block opened in BMC start, and are opened in Web page BIOS Boot Block trusted status is compared.
Step BIOS Boot Block trusted status, which is compared, also to be included:
BIOS Boot Block a reference value is presented;
BIOS Boot Block metric is presented;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured;
BIOS Boot Block a reference value, which is presented, to be included:The BIOS Boot Block benchmark shown in Web page Value;The renewal of BIOS Boot Block a reference values is carried out by presetting the configuration interface that trusted agent program is provided;
BIOS Boot Block metric, which is presented, to be included:BMC trusted agents program measurement is shown in Web page BIOS Boot Block cryptographic Hash;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured, according to BIOS Boot Block a reference value and BIOS Boot Block cryptographic Hash are compared, and are configured according to comparing result Operation.
When BIOS Boot Block cryptographic Hash compares consistent with BIOS Boot Block a reference value, prompt message is " credible ";
When BIOS Boot Block cryptographic Hash compares inconsistent with BIOS Boot Block a reference value, prompt message For " insincere ", while showing " the franchise code of input " and " updating BIOS Boot Block a reference values ", make user's selection operation;
When selected " the franchise code of input ", the franchise code of input carries out franchise startup, enters BIOS Boot Block insincere State, maintenance system relevant configuration;
When selected " updating BIOS Boot Block a reference values ", BIOS Boot Block are provided in web management interface A reference value input area;
User inputs BIOS Boot Block a reference values, BIOS in BIOS Boot Block a reference values input area Boot Block a reference values are the passwords that user is set, and only user oneself possesses, and the operation to a reference value adds access control Authority processed, it is ensured that BMC management safety;
The a reference value that BIOS Boot Block metric and BIOS Boot Block are restarted after being provided with is compared Pair and configuration.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (10)

1. a kind of BMC trusted configuration methods with access control function, it is characterised in that BMC trusted configuration methods include:
Open BMC trusted function modules;
The BMC a reference values of configuration;
BMC firmware trusted status is presented;
BIOS trusted status is presented.
2. the BMC trusted configuration methods according to claim 1 with access control function, it is characterised in that
Step, which opens trusted function module, also to be included:
Open the integrity measurement function of BMC firmwares and open the metric function of BIOS Boot Block integralities.
3. the BMC trusted configuration methods according to claim 1 with access control function, it is characterised in that
Opening trusted function module also includes:
Set corresponding trusted function module to open/close button in web management interface to select for user;
If selected close BMC trusted function modules, BMC does not perform BMC trusted function modules, only started as common mode BMC。
4. the BMC trusted configuration methods according to claim 1 with access control function, it is characterised in that
The BMC a reference values of step configuration also include:A reference value and the value on the basis of being manually entered are used as using metric;
Include using metric as a reference value:Franchise code input area is provided in web management interface;
User inputs franchise code in franchise code input area, and franchise code is the password that user is set, and only user oneself possesses, right The operation of a reference value adds access control right, it is ensured that BMC management safety;
Value includes on the basis of being manually entered:There is provided in web management interface and be manually entered a reference value input area, it is manual for user Input reference.
5. the BMC trusted configuration methods according to claim 1 with access control function, it is characterised in that
BMC firmware trusted status, which is presented, in step also includes:
BMC firmware a reference values are presented;
BMC firmware metrics are presented;
The metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring;
BMC firmware a reference values, which are presented, to be included:The BMC firmware a reference values shown in web management interface are to be set after dispatching from the factory by user The Uboot measurement Kernel and cryptographic Hash, the trusted agent program of trusted agent program that put measure the extension of BMC application program Cryptographic Hash;The renewal of a reference value is carried out by presetting the configuration interface that trusted agent program is provided;
BMC firmware metrics, which are presented, to be included:The metric of the BMC firmwares shown in web management interface is Uboot measurements Kernel Cryptographic Hash, the extension cryptographic Hash of trusted agent program measurement BMC application program with trusted agent program.
6. the BMC trusted configuration methods according to claim 5 with access control function, it is characterised in that
The metric of a reference value of BMC firmwares and BMC firmwares is compared, the comparison result for presenting and configuring includes:BMC consolidates The a reference value of part and the metric of BMC firmwares are compared, according to a reference value of BMC firmwares and the ratio of the metric of BMC firmwares To result, configuration operation is carried out.
7. the BMC trusted configuration methods according to claim 6 with access control function, it is characterised in that
Carrying out configuration operation includes:
When a reference value of BMC firmwares is consistent with the metric comparison of BMC firmwares, prompt message is " credible ";
When a reference value of BMC firmwares and the metric of BMC firmwares compare inconsistent, prompt message is " insincere ", is shown simultaneously " the franchise code of input " and " updating BMC firmwares a reference value " two function buttons;
If selected " the franchise code of input " button carries out franchise startup, it is necessary to input franchise code, BMC firmwares are made to enter insincere shape State;
If selected " updating BMC firmwares a reference value " button, provides BMC firmware a reference values input area in web management interface;
User inputs BMC firmware a reference values in BMC firmware a reference values input area, and BMC firmware a reference values are the close of user's setting Code, only user oneself possesses, and the operation to BMC firmware a reference values adds access control right, it is ensured that BMC management peace Entirely;
The a reference value of BMC firmwares is restarted after being provided with and the metric of BMC firmwares is compared.
8. the BMC trusted configuration methods according to claim 7 with access control function, it is characterised in that
BIOS trusted status, which is presented, in step also includes:
After BMC firmwares confirm credible, the BIOS Boot Block opened in BMC start, and open BIOS in Web page Boot Block trusted status is compared.
9. the BMC trusted configuration methods according to claim 8 with access control function, it is characterised in that
Step BIOS Boot Block trusted status, which is compared, also to be included:
BIOS Boot Block a reference value is presented;
BIOS Boot Block metric is presented;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured;
BIOS Boot Block a reference value, which is presented, to be included:The BIOS Boot Block a reference values shown in Web page; The renewal of BIOS Boot Block a reference values is carried out by presetting the configuration interface that trusted agent program is provided;
BIOS Boot Block metric, which is presented, to be included:The BIOS of BMC trusted agents program measurement is shown in Web page Boot Block cryptographic Hash;
The a reference value of BIOS Boot Block metric and BIOS Boot Block is compared and configured, according to BIOS Boot Block a reference value and BIOS Boot Block cryptographic Hash are compared, and configuration operation is carried out according to comparing result.
10. the BMC trusted configuration methods according to claim 9 with access control function, it is characterised in that
When BIOS Boot Block cryptographic Hash compares consistent with BIOS Boot Block a reference value, prompt message is " can Letter ";
When BIOS Boot Block cryptographic Hash compares inconsistent with BIOS Boot Block a reference value, prompt message is " insincere ", while display " the franchise code of input " and " updating BIOS Boot Block a reference values ", make user's selection operation;
When selected " the franchise code of input ", the franchise code of input carries out franchise startup, BIOS Boot Block is entered insincere shape State, maintenance system relevant configuration;
When selected " updating BIOS Boot Block a reference values ", BIOS Boot Block benchmark are provided in web management interface It is worth input area;
User inputs BIOS Boot Block a reference values, BIOS Boot in BIOS Boot Block a reference values input area Block a reference values are the passwords that user is set, and only user oneself possesses, and the operation to a reference value adds access control power Limit, it is ensured that BMC management safety;
The a reference value of metric and BIOS Boot Block that BIOS Boot Block are restarted after being provided be compared and Configuration.
CN201710326890.9A 2017-05-10 2017-05-10 A kind of BMC trusted configuration methods with access control function Pending CN107145788A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710326890.9A CN107145788A (en) 2017-05-10 2017-05-10 A kind of BMC trusted configuration methods with access control function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710326890.9A CN107145788A (en) 2017-05-10 2017-05-10 A kind of BMC trusted configuration methods with access control function

Publications (1)

Publication Number Publication Date
CN107145788A true CN107145788A (en) 2017-09-08

Family

ID=59778012

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710326890.9A Pending CN107145788A (en) 2017-05-10 2017-05-10 A kind of BMC trusted configuration methods with access control function

Country Status (1)

Country Link
CN (1) CN107145788A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107526593A (en) * 2017-08-28 2017-12-29 大唐高鸿信安(浙江)信息科技有限公司 BMC customizing functions methods based on dynamic link library
CN107729069A (en) * 2017-10-12 2018-02-23 浪潮(北京)电子信息产业有限公司 A kind of method, apparatus of clean boot video card, computer-readable recording medium
CN109063489A (en) * 2018-08-28 2018-12-21 郑州云海信息技术有限公司 A kind of starting method and device
CN109388442A (en) * 2018-10-31 2019-02-26 郑州云海信息技术有限公司 A kind of method, apparatus and computer equipment of batch configuration BMC user
CN109669731A (en) * 2018-12-28 2019-04-23 联想(北京)有限公司 The service control method and device of substrate manager
CN110020528A (en) * 2019-04-11 2019-07-16 苏州浪潮智能科技有限公司 A kind of BMC starting method, apparatus and electronic equipment and storage medium
CN112114908A (en) * 2020-11-20 2020-12-22 支付宝(杭州)信息技术有限公司 Hardware platform, starting method and device thereof, and electronic equipment
CN112346785A (en) * 2019-08-06 2021-02-09 阿里巴巴集团控股有限公司 Data processing method, device, system, storage medium and computer equipment
CN112699346A (en) * 2021-01-05 2021-04-23 本贸科技股份有限公司 Method for reinforcing and protecting BMC chip firmware based on cryptographic chip SE

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9147086B1 (en) * 2013-06-07 2015-09-29 Amazon Technologies, Inc. Trusted computing host
CN106127056A (en) * 2016-06-20 2016-11-16 浪潮电子信息产业股份有限公司 Design method of domestic BMC chip trusted firmware
CN106169054A (en) * 2016-07-13 2016-11-30 浪潮电子信息产业股份有限公司 Access control method based on trusted state

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9147086B1 (en) * 2013-06-07 2015-09-29 Amazon Technologies, Inc. Trusted computing host
CN106127056A (en) * 2016-06-20 2016-11-16 浪潮电子信息产业股份有限公司 Design method of domestic BMC chip trusted firmware
CN106169054A (en) * 2016-07-13 2016-11-30 浪潮电子信息产业股份有限公司 Access control method based on trusted state

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107526593B (en) * 2017-08-28 2020-04-10 大唐高鸿信安(浙江)信息科技有限公司 BMC function customizing method based on dynamic link library
CN107526593A (en) * 2017-08-28 2017-12-29 大唐高鸿信安(浙江)信息科技有限公司 BMC customizing functions methods based on dynamic link library
CN107729069A (en) * 2017-10-12 2018-02-23 浪潮(北京)电子信息产业有限公司 A kind of method, apparatus of clean boot video card, computer-readable recording medium
CN109063489A (en) * 2018-08-28 2018-12-21 郑州云海信息技术有限公司 A kind of starting method and device
CN109388442A (en) * 2018-10-31 2019-02-26 郑州云海信息技术有限公司 A kind of method, apparatus and computer equipment of batch configuration BMC user
CN109669731A (en) * 2018-12-28 2019-04-23 联想(北京)有限公司 The service control method and device of substrate manager
CN109669731B (en) * 2018-12-28 2022-03-25 联想(北京)有限公司 Service control method and device of baseboard manager
CN110020528A (en) * 2019-04-11 2019-07-16 苏州浪潮智能科技有限公司 A kind of BMC starting method, apparatus and electronic equipment and storage medium
CN112346785A (en) * 2019-08-06 2021-02-09 阿里巴巴集团控股有限公司 Data processing method, device, system, storage medium and computer equipment
WO2021023173A1 (en) * 2019-08-06 2021-02-11 阿里巴巴集团控股有限公司 Data processing method, apparatus and system, storage medium, and computer device
CN112346785B (en) * 2019-08-06 2024-05-14 阿里巴巴集团控股有限公司 Data processing method, device, system, storage medium and computer equipment
CN112114908A (en) * 2020-11-20 2020-12-22 支付宝(杭州)信息技术有限公司 Hardware platform, starting method and device thereof, and electronic equipment
CN112699346A (en) * 2021-01-05 2021-04-23 本贸科技股份有限公司 Method for reinforcing and protecting BMC chip firmware based on cryptographic chip SE

Similar Documents

Publication Publication Date Title
CN107145788A (en) A kind of BMC trusted configuration methods with access control function
US11520894B2 (en) Verifying controller code
CN107506663A (en) Server security based on credible BMC starts method
US8726393B2 (en) Cyber security analyzer
CN106384052A (en) Method for realizing BMC U-boot trusted boot control
CN106127056A (en) Design method of domestic BMC chip trusted firmware
KR101768583B1 (en) Secure battery authentication
US9990255B2 (en) Repairing compromised system data in a non-volatile memory
US9852298B2 (en) Configuring a system
US7930527B2 (en) Information processing apparatus and time and date information change method
US20140115314A1 (en) Electronic device and secure boot method
JP2013149135A (en) Method for booting computer and computer
CN110659498A (en) Trusted computing measurement method, system thereof and computer readable storage medium
US10742412B2 (en) Separate cryptographic keys for multiple modes
CN106603307A (en) Method and device of configuration modification
US20070255948A1 (en) Trusted platform field upgrade system and method
CN109086634A (en) A kind of BMC chip management method, system and BMC chip and storage medium
CN113064643A (en) Method, system and medium for instantly-effective modification of BIOS set value
CN106919845B (en) System security trust chain construction device and method
CN102982260B (en) A kind of (SuSE) Linux OS and installation series number verification method thereof
CN109241744A (en) A kind of creditable calculation modules and the credible starting method using the module
CN115618360A (en) Server tamper-proof safe starting method and device
CN113627808B (en) Security assessment method and system for third-party intelligent electric power Internet of things equipment of power distribution network
US20230034526A1 (en) Trust verification system and method for a baseboard management controller (bmc)
CN108279589A (en) A kind of programmed method, system and the device of heat pump liquid-crystal controller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170908