CN110188528A - A method of based on firmware safety certification USB storage device - Google Patents

A method of based on firmware safety certification USB storage device Download PDF

Info

Publication number
CN110188528A
CN110188528A CN201910292635.6A CN201910292635A CN110188528A CN 110188528 A CN110188528 A CN 110188528A CN 201910292635 A CN201910292635 A CN 201910292635A CN 110188528 A CN110188528 A CN 110188528A
Authority
CN
China
Prior art keywords
usb
data
storage device
equipment
port
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910292635.6A
Other languages
Chinese (zh)
Inventor
马井彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tong Yi Yi Information Technology Co Ltd
Original Assignee
Shenzhen Tong Yi Yi Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tong Yi Yi Information Technology Co Ltd filed Critical Shenzhen Tong Yi Yi Information Technology Co Ltd
Priority to CN201910292635.6A priority Critical patent/CN110188528A/en
Publication of CN110188528A publication Critical patent/CN110188528A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of method based on firmware safety certification USB storage device, and the present invention is unable to the defect of safety certification USB storage device for server system, gives effective solution method.Under BIOS and BMC cooperation; possess the USB storage device that safety certification permission personnel are extended by BMC come certificate server system, the USB storage device being certified can be used normally, and unauthenticated USB storage device is unable to normal use; safeguards system safety, protects data safety.The present invention is based on the methods of firmware safety certification USB storage device, by the cooperation between BIOS and BMC, realize the function to the USB storage device safety certification of plug and play.BMC confirms safety certification permission, carries out safety certification to USB storage device after being identified through;Safety certification storing data is ciphertext data information, can not be cracked;Verification process is completed with firmware, is not limited by operating system.

Description

A method of based on firmware safety certification USB storage device
Technical field
The invention belongs to the technical fields of safety certification, more particularly to one kind to be based on firmware safety certification USB storage device Method.
Technical background
The equipment that server system is to provide the service of calculating, applies the various scenes in all trades and professions, high-speed computational capability, Storage capacity, reliability, stability, safety, the scalability of mass data are all the important features of server, wherein safety Property is one of very vital index.Server system needs stable operation service routine, needs to store important data, To have scalability simultaneously, facilitate user's expanding external equipment in server system, but expanding external equipment is potential Unstable factor and insecurity factor.
The USB storage device that can not be extended at present to server system is effectively authenticated.USB storage device, which belongs to, inserts Type equipment is used, when carrying out hot plug under an operating system, BMC cannot store equipment to USB port and be monitored, and take at this time Data can arbitrarily be transferred to USB storage device in business device system, and the data in same USB storage device can also be transmitted arbitrarily To server system.Significant data in server system is transmitted to external operation to data safety by USB storage device Bring great risk, the viral data transmission in USB storage device to server system, will to server system safety, Stability brings havoc.
Summary of the invention
The USB storage device that the purpose of the present invention is to provide a kind of under BIOS and BMC cooperation, is certified can be normal Normal use, safeguards system safety and protection data safety, which are unable to, using, unauthenticated USB storage device is based on firmware safety The method for authenticating USB storage device.
A method of based on firmware safety certification USB storage device comprising following steps:
S1: USB controller is created under the PCT bus of the system bus of server first, then in the mesh of USB controller Record is lower to create USB Root Hub equipment, finally creates multiple USB port equipment under USB Root Hub facility inventory.
S2: into after the operating system of server, operating system starts to monitor whether USB port has equipment plug, if There is no equipment plug, does not do any other operational motion;If there is USB port is inserted into or is extracted to equipment, then continue step S3;
S3: operating system enters under the catalogue of USB controller, in USB Root Hub equipment under catalogue, inserts entering Enter or extract under the USB port equipment of equipment, execute program: will be in the better address deposit global memory space of the port UB;
S4: it carries out triggering soft SMI interrupt to SMI interrupt port write-in traps numerical value, and transfers control to BIOS Program is called to execute and interrupts execution program;
S5: in interrupt routine, calling service routine first reads global memory's space address, and it is detailed to obtain USB port Address reads the connection status register of the port of USB controller according to USB port address;
S6: judging whether there is equipment and be connected to USB port, if there is equipment, is shown to be insertion operation, if do not set It is standby, it is shown to be extraction operation;
S7: if equipment is to extract operation, the traffic sign placement that equipment is extracted is in communication data, in detail by port Location information is arranged in communication data predetermined, sends the data to BMC, exits SMI interrupt program, terminates program;
If equipment is insertion operation and confirms it is USB storage device, setting equipment is inserted into flag data and storage allocation Data space;Then the order for obtaining the device descriptor is sent to USB storage device;Then it is mentioned in the data that equipment returns Take the address information of USB storage device;Then the order data that order obtains the USB storage device of character string is sent, is deposited to USB It stores up equipment and sends the order for obtaining character string;It calls hash function and calculates the hashed value of the string data of USB storage device; Cryptogram information data is converted by the cleartext information of the string data of hashed value, flag data, port details will be plugged Data and cryptogram information data send to BMC and order in pre-defined form collator to communication data;It waits at BMC Reason is completed and returns to result data, then result data is stored to global memory space;Exit SMI interrupt program;
S8: operating system judges to be inserted into whether USB storage device is authenticating device according to result data, set if it is certification Standby, then communication linkage is initialized, normal use;If not authenticating device, then port device is removed.
The present invention is based on the methods of firmware safety certification USB storage device to be realized by the cooperation between BIOS and BMC To the function of the USB storage device safety certification of plug and play.BMC confirms safety certification permission, deposits after being identified through to USB It stores up equipment and carries out safety certification;Safety certification storing data is ciphertext data information, can not be cracked;Verification process is with firmware It completes, is not limited by operating system.
Detailed description of the invention
Below by clearly understandable mode, preferred embodiment is described with reference to the drawings, the present invention is given furtherly It is bright.
Fig. 1 show the schematic diagram connecting equipped with main control chip with non-volatile memory device in server;
Fig. 2 show setting method flow chart of the present invention in BIOS program;
Fig. 3 show setting method flow chart of the present invention in BMC program.
Specific embodiment
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, Detailed description of the invention will be compareed below A specific embodiment of the invention.It should be evident that drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically shown in each figure, they are not represented Its practical structures as product.In addition, there is identical structure or function in some figures so that simplified form is easy to understand Component only symbolically depicts one of those, or has only marked one of those.Herein, "one" is not only indicated " only this ", can also indicate the situation of " more than one ".
Technical solution of the present invention is discussed in detail with specific embodiment below.
A kind of method based on firmware safety certification USB storage device of the present invention, when USB storage device is connected to service In device, safety certification is carried out to USB storage device using the method for the present invention.
Main control chip is equipped in server, and (i.e. BMC chip executes servomechanism remote side administration controller, Baseboard Management controller), as shown in Figure 1, main control chip needs to connect non-volatile memory device, it is scattered for storing Train value data.
Wherein non-volatile memory device (nonvolatile memory) is the solid-state of form of ownership (without movable part Point) term of memory, it does not have to regularly refresh memory content, the read-only memory (ROM) including form of ownership: can compile Journey read-only memory (PROM), erasable programmable read-only memory (EPROM), electricallyerasable ROM (EEROM) (EEPROM) and sudden strain of a muscle It deposits;Also include battery powered random access memory (RAM).
Method the present invention is based on firmware safety certification USB storage device includes BIOS program setting method, wherein BIOS (Basic Input Output System, basic input output system), is mainly used for various hardware during computer booting The initialization and detection of equipment.
As shown in Fig. 2, a kind of method based on firmware safety certification USB storage device, includes the following steps:
S1: USB controller is created under the PCT bus of the system bus of server first, then in the mesh of USB controller Record is lower to create USB Root Hub equipment, finally creates multiple USB port equipment under USB Root Hub facility inventory.
S2: into after the operating system of server, operating system starts to monitor whether USB port has equipment plug, if There is no equipment plug, does not do any other operational motion;If there is USB port is inserted into or is extracted to equipment, then continue step S3;
S3: operating system enters under the catalogue of USB controller, in USB Root Hub equipment under catalogue, inserts entering Enter or extract under the USB port equipment of equipment, execute program: will be in the better address deposit global memory space of the port UB;
S4: traps are written to SMI (System Management Interrupt, system management interrupt) interruptive port Numerical value carries out triggering soft SMI interrupt, and transfers control to BIOS program, calls to execute and interrupts execution program;
S5: in interrupt routine, calling service routine first reads global memory's space address, and it is detailed to obtain USB port Address reads the connection status register of the port of USB controller according to USB port address;
S6: judging whether there is equipment and be connected to USB port, if there is equipment, is shown to be insertion operation, if do not set It is standby, it is shown to be extraction operation;
S7: if equipment is to extract operation, the traffic sign placement that equipment is extracted is in communication data, in detail by port Location information is arranged in communication data predetermined, sends the data to BMC, exits SMI interrupt program, terminates program;
If equipment is insertion operation and confirms it is USB storage device, setting equipment is inserted into flag data and storage allocation Data space;Then the order for obtaining the device descriptor is sent to USB storage device;Then it is mentioned in the data that equipment returns Take the address information of USB storage device;Then order data (the command number that order obtains the USB storage device of character string is sent According to including USB storage device manufacturer, name of product, product ID data address information), it sends and obtains to USB storage device The order of character string;It calls hash function and calculates (referring to USB device manufacturer, produce for the string data of USB storage device The name of an article claims and product ID string data) hashed value;Ciphertext is converted by the cleartext information of the string data of hashed value Information data arrives plug flag data, port detail information data and cryptogram information data according to pre-defined form collator In communication data, sends and order to BMC;It waits BMC processing to complete and return to result data, then result data storage is arrived Global memory space;Exit SMI interrupt program;
S8: operating system judges to be inserted into whether USB storage device is authenticating device according to result data, set if it is certification Standby, then communication linkage is initialized, normal use;If not authenticating device, then port device is removed.
Specific step is as follows by step S1:
S11: creating USB controller under the PCT bus of the system bus of server, and ensures USB controller in PCT bus In catalogue it is correct, by configure USB controller address, configure USB controller power resources and USB controller state Information is correct to ensure catalogue of the USB controller in pci bus;
S12: (logic concentrator of USB controller, makes creation USB Root Hub equipment under the catalogue of USB controller Obtaining multiple USB interfaces can be with a public controller), while configuring the address of USB Root Hub equipment, configuration USB Root The power resources and status information of Hub equipment;
S13: multiple USB port equipment are created under USB Root Hub facility inventory, wherein the quantity of USB port equipment Representative with the quantity of circumscribed USB equipment, can configure address, concatenation ability and user's visibility of each USB port equipment etc. Program information creates port device, root between different port equipment according to the port device quantity that USB controller is supported one by one It is distinguished according to port address.
Step S7 " if equipment be insertion operation and confirm be USB storage device, setting equipment be inserted into flag data and Storage allocation data space " has content are as follows: the better address information of USB port is arranged in communication data, is then matched It sets and obtains the USB command data that description meets, obtain the type of equipment, the traffic sign placement that USB storage device is inserted into is being communicated It in data, is reconfigured and obtains descriptor order data, send order to USB storage device and obtain data (data of acquisition include USB controller address information, port address information and equipment transmission speed etc.), storage allocation data space.
Step S7 further include: if it is not USB storage type equipment that equipment, which is insertion operation, terminate program.
Step S7's " calls hash function and calculates data and (refer to USB device manufacturer, name of product, product ID String data) hashed value " it refers to: hash function is called, by USB device manufacturer, name of product, product ID character string Data (length for no matter inputting string data) are handled string data by function, and output is fixed after processing grows The hashed value of degree 128, while cipher-text information is converted by the cleartext information of string data.
" address information of USB storage device " in step S7 include the device manufacturer of USB storage device, name of product and The address information of product serial number.
As shown in figure 3, " BMC processing is waited to complete and return to result data " of step S7 includes following content:
After BMC initialization is completed, start the order for monitoring whether to receive USB storage device data, if do not received, Any operation is not done then;If receiving the order of USB storage device data, to be transmitted through come data according in advance with BIOS arrange Good format is parsed;
Flag data is extracted according to insertion, judges that USB port is insertion or extracts operation: being operated if it is extracting, USB Equipment is not in place, and according to the better address information of port, corresponding facility information is removed from the interface BMC;It is grasped if it is insertion Make, hashed value in information data is parsed, reads the stored hash Value Data in nonvolatile storage, compare one by one Value Data is hashed, inquiry, which is transmitted through the hash Value Data come, whether there is in nonvolatile storage: if there is no then in BMC The unverified USB storage device information of interface display;And if so, USB storage device information has been authenticated in BMC interface display, it will The result data whether authenticated returns to BIOS program;
Whether unverified USB storage device is authenticated, terminates program if not authenticating, if necessary to authenticate, really The safety certification permission for recognizing operator (in the case that only safety certification permission is confirmed, just stores hash Value Data Into nonvolatile storage), when this USB storage device is again insertable into system, can be used normally.
Wherein, BIOS:Basic Input Output System, basic input output system are mainly used for computer and open The initialization and detection of various hardware devices during machine.BMC: baseboard management controller (Baseboard Management Controller), generally it is built on mainboard, the IPMI of professional standard is supported to standardize;The function that BMC is provided include: it is local and Remote diagnosis, console support, configuration management, hardware management and troubleshooting.USB:(Universal Serial Bus) it is logical It is an external bus standard with universal serial bus, for being connected and communicate with for specification computer and external equipment.SMI:(System Management Interrupt) system management interrupt.
The present invention is unable to the defect of safety certification USB storage device for server system, gives effective solution and does Method.Under BIOS and BMC cooperation, possesses safety certification permission personnel and stored by BMC come the USB that certificate server system extends Equipment, the USB storage device being certified can be used normally, and unauthenticated USB storage device is unable to normal use, ensure system System safety, protects data safety.
The present invention is based on the methods of firmware safety certification USB storage device to be realized by the cooperation between BIOS and BMC To the function of the USB storage device safety certification of plug and play.BMC confirms safety certification permission, deposits after being identified through to USB It stores up equipment and carries out safety certification;Safety certification storing data is ciphertext data information, can not be cracked;Verification process is with firmware It completes, is not limited by operating system.
It should be noted that above-described embodiment can be freely combined as needed.The above is only of the invention preferred Embodiment, but the present invention is not limited to the specific details in the above embodiment, it is noted that for the art For those of ordinary skill, within the scope of the technical concept of the present invention, without departing from the principle of the present invention, it can also do Several improvements and modifications out carry out a variety of equivalents to technical solution of the present invention, these improvement, retouching and equivalents It should be regarded as protection scope of the present invention.

Claims (7)

1. a kind of method based on firmware safety certification USB storage device, which is characterized in that it includes the following steps:
S1: USB controller is created under the PCT bus of the system bus of server first, then under the catalogue of USB controller USB Root Hub equipment is created, finally creates multiple USB port equipment under USB Root Hub facility inventory.
S2: into after the operating system of server, operating system starts to monitor whether USB port has equipment plug, if do not had Equipment plug, does not do any other operational motion;If there is USB port is inserted into or is extracted to equipment, then continue step S3;
S3: operating system enters under the catalogue of USB controller, in USB Root Hub equipment under catalogue, enter insertion or Person extracts under the USB port equipment of equipment, executes program: will be in the better address deposit global memory space of the port UB;
S4: carrying out triggering soft SMI interrupt, and transfer control to BIOS program to SMI interrupt port write-in traps numerical value, It calls to execute to interrupt and executes program;
S5: in interrupt routine, calling service routine first reads global memory's space address, obtains USB port better address, The connection status register of the port of USB controller is read according to USB port address;
S6: judging whether there is equipment and be connected to USB port, if there is equipment, is shown to be insertion operation, if without equipment, table Bright is to extract operation;
S7: if equipment is to extract operation, the traffic sign placement that equipment is extracted believes the better address of port in communication data Breath is arranged in communication data predetermined, sends the data to BMC, exits SMI interrupt program, terminates program;
If equipment is insertion operation and confirms it is USB storage device, setting equipment is inserted into flag data and storage allocation data Space;Then the order for obtaining the device descriptor is sent to USB storage device;Then it is extracted in the data that equipment returns The address information of USB storage device;Then the order data that order obtains the USB storage device of character string is sent, is stored to USB Equipment sends the order for obtaining character string;It calls hash function and calculates the hashed value of the string data of USB storage device;It will The cleartext information of the string data of hashed value is converted into cryptogram information data, will plug flag data, port details number According to and cryptogram information data, in pre-defined form collator to communication data, to BMC send order;Wait BMC processing It completes and returns to result data, then result data is stored to global memory space;Exit SMI interrupt program;
S8: operating system judges to be inserted into whether USB storage device is authenticating device according to result data, if it is authenticating device, Then communication linkage is initialized, normal use;If not authenticating device, then port device is removed.
2. a kind of method based on firmware safety certification USB storage device according to claim 1, which is characterized in that step Specific step is as follows by rapid S1:
S11: creating USB controller under the PCT bus of the system bus of server, and ensures USB controller in PCT bus Catalogue is correct, by configuring the address of USB controller, configuring the power resources of USB controller and the status information of USB controller To ensure that catalogue of the USB controller in pci bus is correct;
S12: USB Root Hub equipment is created under the catalogue of USB controller, while configuring the ground of USB Root Hub equipment Location, the power resources and status information for configuring USB Root Hub equipment;
S13: multiple USB port equipment are created under USB Root Hub facility inventory, wherein the quantity representative of USB port equipment With the quantity of circumscribed USB equipment, the programs such as address, concatenation ability and the user visibility of each USB port equipment can be configured Information creates port device according to the port device quantity that USB controller is supported one by one, according to end between different port equipment Port address is distinguished.
3. a kind of method based on firmware safety certification USB storage device according to claim 1, which is characterized in that step Rapid S7 " if equipment is insertion operation and confirms it is USB storage device, setting equipment insertion flag data and storage allocation number According to space " there is content are as follows: the better address information of USB port is arranged in communication data, then configuration obtains description The USB command data met, obtain the type of equipment, by the traffic sign placement of USB storage device insertion in communication data, then match It sets and obtains descriptor order data, send order to USB storage device and obtain data, storage allocation data space.
4. a kind of method based on firmware safety certification USB storage device according to claim 3, which is characterized in that step Rapid S7 further include: if it is not USB storage type equipment that equipment, which is insertion operation, terminate program.
5. a kind of method based on firmware safety certification USB storage device according to claim 3, which is characterized in that step " call hash function and calculate data hash value " of rapid S7 refers to: hash function is called, by USB device manufacturer, ProductName Title, product ID string data are handled string data by function, and regular length 128 are exported after processing Hashed value, while converting cipher-text information for the cleartext information of string data.
6. a kind of method based on firmware safety certification USB storage device according to claim 3, which is characterized in that step " address information of USB storage device " in rapid S7 includes device manufacturer, name of product and the product ID of USB storage device The address information of data.
7. a kind of method based on firmware safety certification USB storage device according to claim 1, which is characterized in that step " BMC processing is waited to complete and return to result data " of rapid S7 includes following content:
After BMC initialization is completed, start the order for monitoring whether to receive USB storage device data, if do not received, no Do any operation;If receiving the order of USB storage device data, to being transmitted through the data come according to appointing lattice with BIOS in advance Formula is parsed;
Flag data is extracted according to insertion, judges that USB port is insertion or extracts operation: being operated if it is extracting, USB device It is not in place, according to the better address information of port, corresponding facility information is removed from the interface BMC;It, will if it is insertion operation Hashed value parses in information data, reads the stored hash Value Data in nonvolatile storage, one by one comparison hash Value Data, inquiry, which is transmitted through the hash Value Data come, whether there is in nonvolatile storage: if there is no then at the interface BMC Show unverified USB storage device information;And if so, USB storage device information has been authenticated in BMC interface display, it will be whether The result data of certification returns to BIOS program;
Whether unverified USB storage device is authenticated, terminates program if not authenticating, if necessary to authenticate, confirmation behaviour The safety certification permission for making personnel (in the case that only safety certification permission is confirmed, just stores hash Value Data to non- In volatile storage area), when this USB storage device is again insertable into system, can be used normally.
CN201910292635.6A 2019-04-12 2019-04-12 A method of based on firmware safety certification USB storage device Pending CN110188528A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910292635.6A CN110188528A (en) 2019-04-12 2019-04-12 A method of based on firmware safety certification USB storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910292635.6A CN110188528A (en) 2019-04-12 2019-04-12 A method of based on firmware safety certification USB storage device

Publications (1)

Publication Number Publication Date
CN110188528A true CN110188528A (en) 2019-08-30

Family

ID=67714161

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910292635.6A Pending CN110188528A (en) 2019-04-12 2019-04-12 A method of based on firmware safety certification USB storage device

Country Status (1)

Country Link
CN (1) CN110188528A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110941582A (en) * 2019-11-08 2020-03-31 浪潮(北京)电子信息产业有限公司 USB bus structure of BMC chip and communication method thereof
CN114186217A (en) * 2022-02-17 2022-03-15 浪潮(山东)计算机科技有限公司 Port management method, system, equipment and computer readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040003262A1 (en) * 2002-06-28 2004-01-01 Paul England Methods and systems for protecting data in USB systems
CN101556634A (en) * 2008-04-11 2009-10-14 鸿富锦精密工业(深圳)有限公司 Method and system for managing and controlling using authority of external apparatus
CN102111272A (en) * 2010-12-24 2011-06-29 武汉天喻信息产业股份有限公司 Method for authenticating external equipment by using mobile terminal
CN102750496A (en) * 2012-06-12 2012-10-24 南京师范大学 Secure access authentication method for removable storage media
US20130014221A1 (en) * 2011-02-01 2013-01-10 Mcci Corporation Security arrangements for extended usb protocol stack of a usb host system
CN104361280A (en) * 2014-10-31 2015-02-18 山东超越数控电子有限公司 Method for carrying out credible certification on USB storage device through SMI interrupt
CN104657671A (en) * 2013-11-19 2015-05-27 研祥智能科技股份有限公司 Access authority management method and system for mobile storage device
CN106462678A (en) * 2014-06-11 2017-02-22 戴尔产品有限公司 Systems and methods for providing authentication using a managed input/output port
CN206039532U (en) * 2016-07-19 2017-03-22 国网新疆电力公司电力科学研究院 Computer USB peripheral hardware safety discernment filter
CN107995227A (en) * 2017-12-29 2018-05-04 西安交大捷普网络科技有限公司 The authentication method and device of movable storage device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040003262A1 (en) * 2002-06-28 2004-01-01 Paul England Methods and systems for protecting data in USB systems
CN101556634A (en) * 2008-04-11 2009-10-14 鸿富锦精密工业(深圳)有限公司 Method and system for managing and controlling using authority of external apparatus
CN102111272A (en) * 2010-12-24 2011-06-29 武汉天喻信息产业股份有限公司 Method for authenticating external equipment by using mobile terminal
US20130014221A1 (en) * 2011-02-01 2013-01-10 Mcci Corporation Security arrangements for extended usb protocol stack of a usb host system
CN102750496A (en) * 2012-06-12 2012-10-24 南京师范大学 Secure access authentication method for removable storage media
CN104657671A (en) * 2013-11-19 2015-05-27 研祥智能科技股份有限公司 Access authority management method and system for mobile storage device
CN106462678A (en) * 2014-06-11 2017-02-22 戴尔产品有限公司 Systems and methods for providing authentication using a managed input/output port
CN104361280A (en) * 2014-10-31 2015-02-18 山东超越数控电子有限公司 Method for carrying out credible certification on USB storage device through SMI interrupt
CN206039532U (en) * 2016-07-19 2017-03-22 国网新疆电力公司电力科学研究院 Computer USB peripheral hardware safety discernment filter
CN107995227A (en) * 2017-12-29 2018-05-04 西安交大捷普网络科技有限公司 The authentication method and device of movable storage device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DON ANDERSON著: "《USB系统体系》", 31 January 2001, 中国电力出版社 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110941582A (en) * 2019-11-08 2020-03-31 浪潮(北京)电子信息产业有限公司 USB bus structure of BMC chip and communication method thereof
CN110941582B (en) * 2019-11-08 2021-06-29 浪潮(北京)电子信息产业有限公司 USB bus structure of BMC chip and communication method thereof
CN114186217A (en) * 2022-02-17 2022-03-15 浪潮(山东)计算机科技有限公司 Port management method, system, equipment and computer readable storage medium
CN114186217B (en) * 2022-02-17 2022-05-13 浪潮(山东)计算机科技有限公司 Port management method, system, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN104205778B (en) System and method for supporting subnet manager (SM) main negotiation in a network environment
CN109743199A (en) Containerization management system based on micro services
CN105302248B (en) Chipset and server system
TWI526824B (en) Method and system for managing network interface card information
CN106549750A (en) With computer-implemented method and the system and computer program using which
CN104615572B (en) Hot plug processing system and method
CN101403994A (en) Storage device and storage device access control method
CN105739930B (en) A kind of storage architecture and its initial method and date storage method and managing device
CN110188528A (en) A method of based on firmware safety certification USB storage device
CN109039829A (en) A kind of network card performance testing method, apparatus, terminal and storage medium
CN110134447A (en) The system and method for BMC immediate updating hard disk information based on operating system
CN109828798A (en) A method of PCIE silk-screen information is sent to BMC
CN109543459A (en) A kind of data deposit card method and apparatus
CN107025146B (en) A kind of document generating method, device and system
CN104111709A (en) Server systems
CN107908940A (en) The method and terminal device of a kind of fingerprint recognition
CN112491980A (en) Cloud host service management method, system, terminal and storage medium
CN110362511A (en) A kind of PCIE device
CN110377324A (en) Information platform monitoring system and construction method
CN103544098A (en) Method and device for testing pressure
CN110474976A (en) A kind of message transfer method, apparatus, storage medium and system applied to automatic vending equipment
CN106933575A (en) A kind of system and method with outer identification server assets information
CN109302314A (en) A kind of controlled node analogy method and relevant apparatus
CN208999999U (en) Data processing equipment
CN105741444B (en) Application authentication method and device based on linux system financial self-service equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190830