CN109376550A - A kind of starting control method, device and the equipment of target component - Google Patents

A kind of starting control method, device and the equipment of target component Download PDF

Info

Publication number
CN109376550A
CN109376550A CN201811296860.9A CN201811296860A CN109376550A CN 109376550 A CN109376550 A CN 109376550A CN 201811296860 A CN201811296860 A CN 201811296860A CN 109376550 A CN109376550 A CN 109376550A
Authority
CN
China
Prior art keywords
target component
firmware file
encrypted
file
predetermined encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811296860.9A
Other languages
Chinese (zh)
Inventor
苏振宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811296860.9A priority Critical patent/CN109376550A/en
Publication of CN109376550A publication Critical patent/CN109376550A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Abstract

This application discloses a kind of starting control methods of target component, applied to the predetermined encryption device connecting with target component, comprising: receive the starting notification signal that target component is sent;Read the encrypted firmware file for the target component being stored in default Flash;Encrypted firmware file is encrypted by predetermined encryption device generate in advance;Encrypted firmware file is decrypted;The decryption firmware file of generation is sent to target component, completes starting so that target component runs decryption firmware file.What is stored in the default Flash of the application is the encrypted firmware file generated through the encryption of predetermined encryption device, it is loaded and is started by target component again after the decryption of predetermined encryption device, thus illegal operation of the hacker to firmware file can be effectively prevent, it ensures that target component safely starts operation, improves the security performance of system.Disclosed herein as well is the starting control devices and equipment of a kind of target component, equally have above-mentioned beneficial effect.

Description

A kind of starting control method, device and the equipment of target component
Technical field
This application involves computer memory technical field, in particular to the starting control method of a kind of target component, device And equipment.
Background technique
With the development of network technology, the attack activity of hackers emerges one after another, and is in recent years even more to upper layer software (applications) The attack of system is changed into the attack to bottom firmware.
In the prior art, typically not encrypted for the firmware file of each functional component on server master board Processing is stored directly in corresponding default Flash, as shown in Figure 1.After mainboard powers on, target component must also be electrically activated, Automatically firmware file is read and runs from corresponding default Flash, to carry out the guidance and load of program, realization, which powers on, is opened It is dynamic.Since the storage security of firmware file in the prior art is lower, it is easy to be attacked by hackers to distort, to server Normal operation brings grave danger.
As it can be seen that using the starting control technology of which kind of target component, is attacked effectively to evade firmware file and distorted, into And ensure that target component clean boot is run, and is improved the security performance of system, is those skilled in the art's skill urgently to be resolved Art problem.
Summary of the invention
Starting control method, device and the equipment for being designed to provide a kind of target component of the application, so as to effectively Evade firmware file and attacked and distorted, and then ensure target component clean boot operation, improves the security performance of system.
In order to solve the above technical problems, the application provides a kind of starting control method of target component, be applied to it is described The predetermined encryption device of target component connection, comprising:
Receive the starting notification signal that target component is sent;
Read the encrypted firmware file for the target component being stored in default Flash;The encrypted firmware file is pre- It is first encrypted and is generated by the predetermined encryption device;
The encrypted firmware file is decrypted;
The decryption firmware file of generation is sent to the target component, so that the target component operation decryption is solid Part file completes starting.
Optionally, the encrypted firmware file is pre-generated especially by following steps:
After the target component is managed purview certification and authenticates successfully according to the authentication information of input, described in reception The firmware encrypting signal that target component is sent;
The former firmware file of the target component is encrypted;
The encrypted firmware file of generation is sent to the default Flash.
Optionally, the former firmware file to the target component, which encrypt, includes:
It is encrypted using former firmware file of the SM4 algorithm to the target component;
The described encrypted firmware file is decrypted include:
The encrypted firmware file is decrypted using SM4 algorithm.
Optionally, after the firmware encrypting signal for receiving the target component transmission, the use SM4 algorithm pair Before the former firmware file of the target component is encrypted, further includes:
After the key of the SM4 algorithm of input is sent to the predetermined encryption device by the target component, by institute Key storage is stated in the EPROM of the predetermined encryption device.
Optionally, the target component is following any one:
BMC, network interface card, hard disk, RAID card.
Optionally, the predetermined encryption device is CPLD or FPGA.
Present invention also provides the starting control methods of another target component, are applied to the target component, comprising:
To predetermined encryption device send starting notification signal, so as to the predetermined encryption device reading be stored in it is default The encrypted firmware file of the target component in Flash is simultaneously decrypted;The encrypted firmware file is in advance by described default Encryption devices encryption generates;
Receive the decryption firmware file that the predetermined encryption device is sent;
The decryption firmware file is run to complete to start.
Present invention also provides a kind of starting control devices of target component, pre- applied to connecting with the target component If encryption devices, comprising:
Signal receiving module, for receiving the starting notification signal of target component transmission;
File read module, for reading the encrypted firmware file for the target component being stored in default Flash;
File encryption module generates the encrypted firmware file for encrypting in advance, and is sent to the default Flash;
File decryption module, for the encrypted firmware file that file read module is read to be decrypted;
File sending module, for the decryption firmware file of generation to be sent to the target component, so as to the target Component runs the decryption firmware file and completes starting.
Present invention also provides the starting control devices of another target component, are applied to the target component, comprising:
Signal transmitting module, for sending starting notification signal to predetermined encryption device, so as to the predetermined encryption device It reads the encrypted firmware file for the target component being stored in default Flash and is decrypted;The encrypted firmware file It is encrypted and is generated by the predetermined encryption device in advance;
File reception module, the decryption firmware file sent for receiving the predetermined encryption device;
Starting operation module, completes to start for running the decryption firmware file.
Equipment is controlled present invention also provides a kind of starting of target component, including target component, default Flash and default Encryption devices;
The institute of the target component generated through predetermined encryption device encryption is previously stored in the default Flash State encrypted firmware file;The predetermined encryption device is connect with the target component and the default Flash respectively, for executing Any starting control method applied to predetermined encryption device as described above;The target component is for executing as described above The starting control method applied to target component.
The starting control method of target component provided herein, applied to connect with the target component default plus Close device, comprising: receive the starting notification signal that target component is sent;Read the target portion being stored in default Flash The encrypted firmware file of part;The encrypted firmware file is encrypted by the predetermined encryption device generate in advance;It is solid to the encryption Part file is decrypted;The decryption firmware file of generation is sent to the target component, so that the target component runs institute It states decryption firmware file and completes starting.
As it can be seen that compared with the prior art, in the starting control method of target component provided herein, presetting Flash Middle storage is the encrypted firmware file generated through the encryption of predetermined encryption device, and target component is added in electrifying startup by default It, can the completion starting of normal load firmware file after encrypted firmware file is decrypted in close device.The application can be effective as a result, It prevents hacker from the illegal operations such as cracking, steal and distorting to firmware file, and then ensures that target component safely starts operation, The security performance of raising system.Above-mentioned target may be implemented in the starting control device and equipment of target component provided herein The starting control method of component equally has above-mentioned beneficial effect.
Detailed description of the invention
In order to illustrate more clearly of the technical solution in the prior art and the embodiment of the present application, below will to the prior art and Attached drawing to be used is needed to make brief introduction in the embodiment of the present application description.Certainly, in relation to the attached drawing of the embodiment of the present application below A part of the embodiment in only the application of description is not paying creativeness to those skilled in the art Under the premise of labour, other attached drawings can also be obtained according to the attached drawing of offer, other accompanying drawings obtained also belong to the application Protection scope.
Fig. 1 is the storage mode schematic diagram of the firmware file of target component in the prior art;
Fig. 2 is the storage mode schematic diagram of the firmware file of target component provided herein;
Fig. 3 is a kind of flow chart of the starting control method of target component provided herein;
Fig. 4 is a kind of flow chart of the method for generation encrypted firmware file provided herein;
The flow chart of another method for generating encrypted firmware file Fig. 5 provided herein;
Fig. 6 is the flow chart of the starting control method of another target component provided herein;
Fig. 7 is a kind of structural block diagram of the starting control device of target component provided herein;
Fig. 8 is the structural block diagram of the starting control device of another target component provided herein.
Specific embodiment
The core of the application is to provide starting control method, device and the equipment of a kind of target component, so as to effectively Evade firmware file and attacked and distorted, and then ensure target component clean boot operation, improves the security performance of system.
In order to which technical solutions in the embodiments of the present application is more clearly and completely described, below in conjunction with this Shen Please attached drawing in embodiment, technical solutions in the embodiments of the present application is introduced.Obviously, described embodiment is only Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 2, Fig. 2 is the storage mode schematic diagram of the firmware file of target component provided herein.
Connect respectively with target component and default Flash as shown in Fig. 2, the application on the basis of existing technology, is additionally arranged The predetermined encryption device connect.As its name suggests, predetermined encryption device can execute encryption and decryption operation to the firmware file of target component, To improve the storage safety of firmware file.And default Flash is used to store the firmware file of target component, it is accurate for, be For storing through the encrypted encrypted firmware file of predetermined encryption device.When target component electrifying startup, by predetermined encryption device Part reads encrypted firmware file from default Flash, and is decrypted, and the decryption firmware file of generation is just sent to target component Operation.
Referring to FIG. 3, Fig. 3 is a kind of flow chart of the starting control method of target component provided herein, application In the predetermined encryption device being connect with the target component, mainly comprise the steps that
S31: the starting notification signal that target component is sent is received.
S32: the encrypted firmware file for the target component being stored in default Flash is read;Encrypted firmware file in advance by The encryption of predetermined encryption device generates.
S33: encrypted firmware file is decrypted.
S34: being sent to target component for the decryption firmware file of generation, so that target component operation decryption firmware file is complete At starting.
Specifically, as previously mentioned, predetermined encryption device is used to carry out encryption and decryption, administrator to the firmware file of target component Member can advance with predetermined encryption device and encrypt to not encrypted former firmware file, generate encrypted firmware file, and deposit Storage is in default Flash.
After server master board powers on, target component must also establish beginning starting by cable, send starting notice to predetermined encryption device Signal.After predetermined encryption device receives starting notification signal, it is solid that pre-stored encryption can be read from default Flash Part file is simultaneously decrypted, and generates the decryption firmware file that operation is loaded directly into for target component, and be sent to target component. To which target component can run the decryption firmware file and complete starting.
Wherein, as a kind of specific embodiment, target component be specifically as follows it is following any one: BMC, hard disk, network interface card, RAID card.
Wherein, BMC (Baseboard Management Controller, baseboard management controller) is substantially one Based on the embedded OS for the linux system kernel simplified, since BMC chip is volatibility device, i.e., after BMC power down its The information such as program, variable that inside saves can lose, thus BMC need outside non-volatile device such as Flash etc. save Program file, the i.e. firmware file of BMC.BMC needs to read and run the firmware file in Flash in each electrifying startup To carry out the guidance and load of program, starting is completed.Also, considers in autonomous controllable, safe and reliable factor, recommend to use Domestic BMC.
Preferably, predetermined encryption device is CPLD or FPGA.
Specifically, CPLD (Complex Programmable Logic Device, Complex Programmable Logic Devices) or FPGA (Field-Programmable Gate Array, field programmable gate array) is the higher device of safety, this Body has anti-read-write protection mechanism, and process performance is high, both can ensure depositing for firmware file by executing encryption and decryption operation Storage safety, and can safeguards system starting speed.
Certainly, those skilled in the art can also use other predetermined encryption devices, can also carry out to other target components The protection of firmware file, the application are not limited thereto.
As it can be seen that is stored in default Flash is through default in the starting control method of target component provided herein The encrypted firmware file that encryption devices encryption generates, target component is in electrifying startup, by predetermined encryption device to encrypted firmware It, can the completion starting of normal load firmware file after file is decrypted.The application can effectively prevent hacker to firmware text as a result, Part such as cracks, steals and distorts at the illegal operations, and then ensures that target component safely starts operation, improves the safety of system Energy.
Referring to FIG. 4, Fig. 4 is a kind of flow chart of the method for generation encrypted firmware file provided herein.
As shown in figure 4, on the basis of the above, the starting control method of target component provided herein, tool Body, encrypted firmware file is pre-generated especially by following steps:
S41: after target component is managed purview certification and authenticates successfully according to the authentication information of input, target is received The firmware encrypting signal that component is sent.
S42: the former firmware file of target component is encrypted.
S43: the encrypted firmware file of generation is sent to default Flash.
Specifically, in order to further improve the security can, advance with predetermined encryption device encryption generate encrypted firmware text Permission can be set in the process of part, i.e., only enables through the administrator of purview certification and execute encryption to former firmware file and rewrite pre- If the operation of Flash.
Specifically, after the authentication information of user's input has passed through the purview certification to target component, target component can Corresponding firmware encrypting signal is sent to predetermined encryption device, predetermined encryption device just executes the cryptographic operation to firmware file, And the encrypted firmware file of generation is sent to default Flash and is stored.
On the basis of the above, the starting control method of target component provided herein, as a kind of preferred Embodiment, to the former firmware file of target component carry out encryption include: using SM4 algorithm to the former firmware file of target component into Row encryption;It includes: that encrypted firmware file is decrypted using SM4 algorithm that encrypted firmware file, which is decrypted,.
Specifically, SM4 algorithm is the symmetric cryptographic algorithm of national Password Management office approval, is mainly used in Local Area Network products Field.The block length of the algorithm is 128bit, key length 128bit, and because of its reliability with higher and safety And it is widely used in information security.Those skilled in the art can be realized in predetermined encryption device by corresponding first design The algorithm, for example, VHDL (hardware description language) can be used specifically to realize logical design.
Referring to FIG. 5, the flow chart of another method for generating encrypted firmware file Fig. 5 provided herein.
On the basis of the above, the starting control method of target component provided herein, as a kind of preferred Embodiment, to the former firmware file of target component after receiving the firmware encrypting signal that target component is sent, using SM4 algorithm Before being encrypted, further includes:
S52: after the key of the SM4 algorithm of input is sent to predetermined encryption device by target component, key storage is existed In the EPROM of predetermined encryption device.
And SM4 specifically, recommend but be not limited to by predetermined encryption device by the key storage of SM4 algorithm in EPROM, i.e., The program code segments subregion of algorithm is stored.EPROM not only has non-volatile, but also safety is higher, and hackers generally can not Its content is read, thus can further ensure the safety of target component electrifying startup.
Referring to FIG. 6, Fig. 6 is the flow chart of the starting control method of another target component provided herein, answer For target component, comprising the following steps:
S61: to predetermined encryption device send starting notification signal, so as to predetermined encryption device reading be stored in it is default The encrypted firmware file of target component in Flash is simultaneously decrypted;Encrypted firmware file is encrypted by predetermined encryption device in advance It generates;
S62: the decryption firmware file that predetermined encryption device is sent is received;
S63: operation decrypts firmware file to complete to start.
Related content is referring to FIG. 3, detailed content just repeats no more here.
As it can be seen that is stored in default Flash is through default in the starting control method of target component provided herein The encrypted firmware file that encryption devices encryption generates, target component is in electrifying startup, by predetermined encryption device to encrypted firmware It, can the completion starting of normal load firmware file after file is decrypted.The application can effectively prevent hacker to firmware text as a result, Part such as cracks, steals and distorts at the illegal operations, and then ensures that target component safely starts operation, improves the safety of system Energy.
The starting control device of target component provided herein is introduced below.
Referring to Fig. 7, Fig. 7 is a kind of structural block diagram of the starting control device of target component provided herein, answer Predetermined encryption device for being connect with target component, comprising:
Signal receiving module 71, for receiving the starting notification signal of target component transmission;
File read module 72, for reading the encrypted firmware file for the target component being stored in default Flash;
File encryption module 73 generates encrypted firmware file for encrypting in advance, and is sent to default Flash;
File decryption module 74, the encrypted firmware file for reading to file read module are decrypted;
File sending module 75, for the decryption firmware file of generation to be sent to target component, so as to target component fortune Row decryption firmware file completes starting.
Referring to Fig. 8, Fig. 8 is the structural block diagram of the starting control device of another target component provided herein, Applied to target component, comprising:
Signal transmitting module 81, for sending starting notification signal to predetermined encryption device, so as to the reading of predetermined encryption device It takes the encrypted firmware file for the target component being stored in default Flash and is decrypted;Encrypted firmware file is in advance by presetting Encryption devices encryption generates;
File reception module 82, for receiving the decryption firmware file of predetermined encryption device transmission;
Starting operation module 83, completes to start for running decryption firmware file.
As it can be seen that is stored in default Flash is through default in the starting control device of target component provided herein The encrypted firmware file that encryption devices encryption generates, target component is in electrifying startup, by predetermined encryption device to encrypted firmware It, can the completion starting of normal load firmware file after file is decrypted.The application can effectively prevent hacker to firmware text as a result, Part such as cracks, steals and distorts at the illegal operations, and then ensures that target component safely starts operation, improves the safety of system Energy.
Equipment is controlled present invention also provides a kind of starting of target component, including target component, default Flash and default Encryption devices;
The encrypted firmware file of the target component generated through the encryption of predetermined encryption device is previously stored in default Flash; The predetermined encryption device is connect with target component and default Flash respectively, for executing any as described above be applied to The starting control method of predetermined encryption device;The target component is used to execute the starting as described above for being applied to target component Control method.
The specific embodiment and target as described above of the starting control device of target component provided herein The starting control method of component can correspond to each other reference, just repeat no more here.
Each embodiment is described in a progressive manner in the application, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.
It should be noted that in present specification, the relational terms of such as " first " and " second " etc are used merely to One entity or operation and another entity or operate is distinguished, without necessarily requiring or implying these entities or There are any actual relationship or orders between person's operation.In addition, the terms "include", "comprise" or its any other Variant is intended to non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only It including those elements, but also including other elements that are not explicitly listed, or further include for this process, method, object Product or the intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", It is not precluded in the process, method, article or apparatus that includes the element that there is also other identical elements.
Technical solution provided herein is described in detail above.Specific case used herein is to this Shen Principle and embodiment please is expounded, the present processes that the above embodiments are only used to help understand and its Core concept.It should be pointed out that for those skilled in the art, in the premise for not departing from the application principle Under, can also to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the protection of the claim of this application In range.

Claims (10)

1. a kind of starting control method of target component, which is characterized in that applied to connect with the target component default plus Close device, comprising:
Receive the starting notification signal that target component is sent;
Read the encrypted firmware file for the target component being stored in default Flash;The encrypted firmware file in advance by The predetermined encryption device encryption generates;
The encrypted firmware file is decrypted;
The decryption firmware file of generation is sent to the target component, so that the target component runs the decryption firmware text Part completes starting.
2. starting control method according to claim 1, which is characterized in that the encrypted firmware file is especially by following Step is pre-generated:
After the target component is managed purview certification and authenticates successfully according to the authentication information of input, the target is received The firmware encrypting signal that component is sent;
The former firmware file of the target component is encrypted;
The encrypted firmware file of generation is sent to the default Flash.
3. starting control method according to claim 2, which is characterized in that
The former firmware file to the target component carries out encryption
It is encrypted using former firmware file of the SM4 algorithm to the target component;
The described encrypted firmware file is decrypted include:
The encrypted firmware file is decrypted using SM4 algorithm.
4. starting control method according to claim 3, which is characterized in that receive what the target component was sent described After firmware encrypting signal, it is described encrypted using former firmware file of the SM4 algorithm to the target component before, also wrap It includes:
It, will be described close after the key of the SM4 algorithm of input is sent to the predetermined encryption device by the target component Key is stored in the EPROM of the predetermined encryption device.
5. starting control method according to any one of claims 1 to 4, which is characterized in that the target component is following Any one:
BMC, network interface card, hard disk, RAID card.
6. starting control method according to claim 5, which is characterized in that the predetermined encryption device be CPLD or FPGA。
7. a kind of starting control method of target component, which is characterized in that be applied to the target component, comprising:
Starting notification signal is sent to predetermined encryption device, so that predetermined encryption device reading is stored in default Flash The target component encrypted firmware file and be decrypted;The encrypted firmware file is in advance by the predetermined encryption device Encryption generates;
Receive the decryption firmware file that the predetermined encryption device is sent;
The decryption firmware file is run to complete to start.
8. a kind of starting control device of target component, which is characterized in that applied to connect with the target component default plus Close device, comprising:
Signal receiving module, for receiving the starting notification signal of target component transmission;
File read module, for reading the encrypted firmware file for the target component being stored in default Flash;
File encryption module generates the encrypted firmware file for encrypting in advance, and is sent to the default Flash;
File decryption module, for the encrypted firmware file that file read module is read to be decrypted;
File sending module, for the decryption firmware file of generation to be sent to the target component, so as to the target component It runs the decryption firmware file and completes starting.
9. a kind of starting control device of target component, which is characterized in that be applied to the target component, comprising:
Signal transmitting module, for sending starting notification signal to predetermined encryption device, so as to predetermined encryption device reading The encrypted firmware file for the target component being stored in default Flash is simultaneously decrypted;The encrypted firmware file is preparatory It is encrypted and is generated by the predetermined encryption device;
File reception module, the decryption firmware file sent for receiving the predetermined encryption device;
Starting operation module, completes to start for running the decryption firmware file.
10. a kind of starting of target component controls equipment, which is characterized in that including target component, default Flash and predetermined encryption Device;
It is previously stored with described in the target component generated through predetermined encryption device encryption and adds in the default Flash Close firmware file;The predetermined encryption device is connect with the target component and the default Flash respectively, for executing as weighed Benefit requires the starting control method of 1 to 6 described in any item target components;The target component is for executing such as claim 7 The starting control method of the target component.
CN201811296860.9A 2018-11-01 2018-11-01 A kind of starting control method, device and the equipment of target component Pending CN109376550A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811296860.9A CN109376550A (en) 2018-11-01 2018-11-01 A kind of starting control method, device and the equipment of target component

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811296860.9A CN109376550A (en) 2018-11-01 2018-11-01 A kind of starting control method, device and the equipment of target component

Publications (1)

Publication Number Publication Date
CN109376550A true CN109376550A (en) 2019-02-22

Family

ID=65391425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811296860.9A Pending CN109376550A (en) 2018-11-01 2018-11-01 A kind of starting control method, device and the equipment of target component

Country Status (1)

Country Link
CN (1) CN109376550A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259370A (en) * 2020-01-13 2020-06-09 苏州浪潮智能科技有限公司 FPGA program security verification method, system, terminal and storage medium
WO2022100014A1 (en) * 2020-11-11 2022-05-19 苏州浪潮智能科技有限公司 Method and apparatus for controlling system startup, device and readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598792A (en) * 2003-09-15 2005-03-23 联想(北京)有限公司 Safety repair method of computer operation system
CN1641717A (en) * 2004-01-09 2005-07-20 三星电子株式会社 Firmware encrypting and decrypting method and an apparatus using the same
US20060143475A1 (en) * 2004-12-29 2006-06-29 Herbert Howard C Updating firmware securely over a network
CN101149774A (en) * 2006-09-19 2008-03-26 联发科技股份有限公司 Methods and apparatuses for securing firmware image download and storage by distribution protection
CN101477609A (en) * 2007-12-31 2009-07-08 株式会社东芝 Tamper resistant method and apparatus for a storage device
CN101944051A (en) * 2010-09-29 2011-01-12 山东大学 Multi-copy high-reliability embedded system firmware on chip and working method thereof
CN103853983A (en) * 2012-12-06 2014-06-11 三星电子株式会社 System on chip to perform secure boot, image forming apparatus using the same, and method thereof
CN104636688A (en) * 2015-02-25 2015-05-20 山东超越数控电子有限公司 Method for implementing security firmware on basis of solid-state disk
CN104871167A (en) * 2012-10-25 2015-08-26 英特尔公司 Anti-theft in firmware
CN107608700A (en) * 2017-10-16 2018-01-19 浪潮(北京)电子信息产业有限公司 A kind of update method, device and the medium of FPGA firmwares
CN107885998A (en) * 2017-11-03 2018-04-06 山东超越数控电子股份有限公司 A kind of server master board encryption system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598792A (en) * 2003-09-15 2005-03-23 联想(北京)有限公司 Safety repair method of computer operation system
CN1641717A (en) * 2004-01-09 2005-07-20 三星电子株式会社 Firmware encrypting and decrypting method and an apparatus using the same
US20060143475A1 (en) * 2004-12-29 2006-06-29 Herbert Howard C Updating firmware securely over a network
CN101149774A (en) * 2006-09-19 2008-03-26 联发科技股份有限公司 Methods and apparatuses for securing firmware image download and storage by distribution protection
CN101477609A (en) * 2007-12-31 2009-07-08 株式会社东芝 Tamper resistant method and apparatus for a storage device
CN101944051A (en) * 2010-09-29 2011-01-12 山东大学 Multi-copy high-reliability embedded system firmware on chip and working method thereof
CN104871167A (en) * 2012-10-25 2015-08-26 英特尔公司 Anti-theft in firmware
CN103853983A (en) * 2012-12-06 2014-06-11 三星电子株式会社 System on chip to perform secure boot, image forming apparatus using the same, and method thereof
CN104636688A (en) * 2015-02-25 2015-05-20 山东超越数控电子有限公司 Method for implementing security firmware on basis of solid-state disk
CN107608700A (en) * 2017-10-16 2018-01-19 浪潮(北京)电子信息产业有限公司 A kind of update method, device and the medium of FPGA firmwares
CN107885998A (en) * 2017-11-03 2018-04-06 山东超越数控电子股份有限公司 A kind of server master board encryption system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259370A (en) * 2020-01-13 2020-06-09 苏州浪潮智能科技有限公司 FPGA program security verification method, system, terminal and storage medium
WO2022100014A1 (en) * 2020-11-11 2022-05-19 苏州浪潮智能科技有限公司 Method and apparatus for controlling system startup, device and readable storage medium

Similar Documents

Publication Publication Date Title
US10057763B2 (en) Soft token system
US8701174B1 (en) Controlling access to a protected resource using a virtual desktop and ongoing authentication
US9130753B1 (en) Authentication using security device with electronic interface
CN104247329A (en) Secure remediation of devices requesting cloud services
US9152797B2 (en) Device and method for secure memory access
US11269984B2 (en) Method and apparatus for securing user operation of and access to a computer system
EP3494482B1 (en) Systems and methods for storing administrator secrets in management controller-owned cryptoprocessor
EP3155547B1 (en) Systems and methods for providing authentication using a managed input/output port
US10645077B2 (en) System and method for securing offline usage of a certificate by OTP system
US10025932B2 (en) Portable security device
CN106687985A (en) Method for privileged mode based secure input mechanism
CN103701977A (en) Portable electronic device, communication system and information authentication method
US9563773B2 (en) Systems and methods for securing BIOS variables
US20170201373A1 (en) Systems and methods for management controller management of key encryption key
EP3111360A1 (en) Universal authenticator across web and mobile
US10783088B2 (en) Systems and methods for providing connected anti-malware backup storage
NO340355B1 (en) 2-factor authentication for network connected storage device
CN109376550A (en) A kind of starting control method, device and the equipment of target component
CN105204962A (en) Data backup method and device and server
WO2020001078A1 (en) Safe operation method and system for storage data
EP3026620A1 (en) Network authentication method using a card device
WO2016026333A1 (en) Data protection method, device and storage medium in connection between terminal and pc
EP1999604B1 (en) Method and apparatus for roaming digital rights management content in device
US9692751B1 (en) User actuated release of a secret through an audio jack to authenticate the user
WO2018017019A1 (en) Personal security device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190222

RJ01 Rejection of invention patent application after publication