CN110188528A - A method of based on firmware safety certification USB storage device - Google Patents
A method of based on firmware safety certification USB storage device Download PDFInfo
- Publication number
- CN110188528A CN110188528A CN201910292635.6A CN201910292635A CN110188528A CN 110188528 A CN110188528 A CN 110188528A CN 201910292635 A CN201910292635 A CN 201910292635A CN 110188528 A CN110188528 A CN 110188528A
- Authority
- CN
- China
- Prior art keywords
- usb
- data
- storage device
- equipment
- port
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4411—Configuring for operating with peripheral devices; Loading of device drivers
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of method based on firmware safety certification USB storage device, and the present invention is unable to the defect of safety certification USB storage device for server system, gives effective solution method.Under BIOS and BMC cooperation; possess the USB storage device that safety certification permission personnel are extended by BMC come certificate server system, the USB storage device being certified can be used normally, and unauthenticated USB storage device is unable to normal use; safeguards system safety, protects data safety.The present invention is based on the methods of firmware safety certification USB storage device, by the cooperation between BIOS and BMC, realize the function to the USB storage device safety certification of plug and play.BMC confirms safety certification permission, carries out safety certification to USB storage device after being identified through;Safety certification storing data is ciphertext data information, can not be cracked;Verification process is completed with firmware, is not limited by operating system.
Description
Technical field
The invention belongs to the technical fields of safety certification, more particularly to one kind to be based on firmware safety certification USB storage device
Method.
Technical background
The equipment that server system is to provide the service of calculating, applies the various scenes in all trades and professions, high-speed computational capability,
Storage capacity, reliability, stability, safety, the scalability of mass data are all the important features of server, wherein safety
Property is one of very vital index.Server system needs stable operation service routine, needs to store important data,
To have scalability simultaneously, facilitate user's expanding external equipment in server system, but expanding external equipment is potential
Unstable factor and insecurity factor.
The USB storage device that can not be extended at present to server system is effectively authenticated.USB storage device, which belongs to, inserts
Type equipment is used, when carrying out hot plug under an operating system, BMC cannot store equipment to USB port and be monitored, and take at this time
Data can arbitrarily be transferred to USB storage device in business device system, and the data in same USB storage device can also be transmitted arbitrarily
To server system.Significant data in server system is transmitted to external operation to data safety by USB storage device
Bring great risk, the viral data transmission in USB storage device to server system, will to server system safety,
Stability brings havoc.
Summary of the invention
The USB storage device that the purpose of the present invention is to provide a kind of under BIOS and BMC cooperation, is certified can be normal
Normal use, safeguards system safety and protection data safety, which are unable to, using, unauthenticated USB storage device is based on firmware safety
The method for authenticating USB storage device.
A method of based on firmware safety certification USB storage device comprising following steps:
S1: USB controller is created under the PCT bus of the system bus of server first, then in the mesh of USB controller
Record is lower to create USB Root Hub equipment, finally creates multiple USB port equipment under USB Root Hub facility inventory.
S2: into after the operating system of server, operating system starts to monitor whether USB port has equipment plug, if
There is no equipment plug, does not do any other operational motion;If there is USB port is inserted into or is extracted to equipment, then continue step S3;
S3: operating system enters under the catalogue of USB controller, in USB Root Hub equipment under catalogue, inserts entering
Enter or extract under the USB port equipment of equipment, execute program: will be in the better address deposit global memory space of the port UB;
S4: it carries out triggering soft SMI interrupt to SMI interrupt port write-in traps numerical value, and transfers control to BIOS
Program is called to execute and interrupts execution program;
S5: in interrupt routine, calling service routine first reads global memory's space address, and it is detailed to obtain USB port
Address reads the connection status register of the port of USB controller according to USB port address;
S6: judging whether there is equipment and be connected to USB port, if there is equipment, is shown to be insertion operation, if do not set
It is standby, it is shown to be extraction operation;
S7: if equipment is to extract operation, the traffic sign placement that equipment is extracted is in communication data, in detail by port
Location information is arranged in communication data predetermined, sends the data to BMC, exits SMI interrupt program, terminates program;
If equipment is insertion operation and confirms it is USB storage device, setting equipment is inserted into flag data and storage allocation
Data space;Then the order for obtaining the device descriptor is sent to USB storage device;Then it is mentioned in the data that equipment returns
Take the address information of USB storage device;Then the order data that order obtains the USB storage device of character string is sent, is deposited to USB
It stores up equipment and sends the order for obtaining character string;It calls hash function and calculates the hashed value of the string data of USB storage device;
Cryptogram information data is converted by the cleartext information of the string data of hashed value, flag data, port details will be plugged
Data and cryptogram information data send to BMC and order in pre-defined form collator to communication data;It waits at BMC
Reason is completed and returns to result data, then result data is stored to global memory space;Exit SMI interrupt program;
S8: operating system judges to be inserted into whether USB storage device is authenticating device according to result data, set if it is certification
Standby, then communication linkage is initialized, normal use;If not authenticating device, then port device is removed.
The present invention is based on the methods of firmware safety certification USB storage device to be realized by the cooperation between BIOS and BMC
To the function of the USB storage device safety certification of plug and play.BMC confirms safety certification permission, deposits after being identified through to USB
It stores up equipment and carries out safety certification;Safety certification storing data is ciphertext data information, can not be cracked;Verification process is with firmware
It completes, is not limited by operating system.
Detailed description of the invention
Below by clearly understandable mode, preferred embodiment is described with reference to the drawings, the present invention is given furtherly
It is bright.
Fig. 1 show the schematic diagram connecting equipped with main control chip with non-volatile memory device in server;
Fig. 2 show setting method flow chart of the present invention in BIOS program;
Fig. 3 show setting method flow chart of the present invention in BMC program.
Specific embodiment
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, Detailed description of the invention will be compareed below
A specific embodiment of the invention.It should be evident that drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically shown in each figure, they are not represented
Its practical structures as product.In addition, there is identical structure or function in some figures so that simplified form is easy to understand
Component only symbolically depicts one of those, or has only marked one of those.Herein, "one" is not only indicated
" only this ", can also indicate the situation of " more than one ".
Technical solution of the present invention is discussed in detail with specific embodiment below.
A kind of method based on firmware safety certification USB storage device of the present invention, when USB storage device is connected to service
In device, safety certification is carried out to USB storage device using the method for the present invention.
Main control chip is equipped in server, and (i.e. BMC chip executes servomechanism remote side administration controller, Baseboard
Management controller), as shown in Figure 1, main control chip needs to connect non-volatile memory device, it is scattered for storing
Train value data.
Wherein non-volatile memory device (nonvolatile memory) is the solid-state of form of ownership (without movable part
Point) term of memory, it does not have to regularly refresh memory content, the read-only memory (ROM) including form of ownership: can compile
Journey read-only memory (PROM), erasable programmable read-only memory (EPROM), electricallyerasable ROM (EEROM) (EEPROM) and sudden strain of a muscle
It deposits;Also include battery powered random access memory (RAM).
Method the present invention is based on firmware safety certification USB storage device includes BIOS program setting method, wherein BIOS
(Basic Input Output System, basic input output system), is mainly used for various hardware during computer booting
The initialization and detection of equipment.
As shown in Fig. 2, a kind of method based on firmware safety certification USB storage device, includes the following steps:
S1: USB controller is created under the PCT bus of the system bus of server first, then in the mesh of USB controller
Record is lower to create USB Root Hub equipment, finally creates multiple USB port equipment under USB Root Hub facility inventory.
S2: into after the operating system of server, operating system starts to monitor whether USB port has equipment plug, if
There is no equipment plug, does not do any other operational motion;If there is USB port is inserted into or is extracted to equipment, then continue step S3;
S3: operating system enters under the catalogue of USB controller, in USB Root Hub equipment under catalogue, inserts entering
Enter or extract under the USB port equipment of equipment, execute program: will be in the better address deposit global memory space of the port UB;
S4: traps are written to SMI (System Management Interrupt, system management interrupt) interruptive port
Numerical value carries out triggering soft SMI interrupt, and transfers control to BIOS program, calls to execute and interrupts execution program;
S5: in interrupt routine, calling service routine first reads global memory's space address, and it is detailed to obtain USB port
Address reads the connection status register of the port of USB controller according to USB port address;
S6: judging whether there is equipment and be connected to USB port, if there is equipment, is shown to be insertion operation, if do not set
It is standby, it is shown to be extraction operation;
S7: if equipment is to extract operation, the traffic sign placement that equipment is extracted is in communication data, in detail by port
Location information is arranged in communication data predetermined, sends the data to BMC, exits SMI interrupt program, terminates program;
If equipment is insertion operation and confirms it is USB storage device, setting equipment is inserted into flag data and storage allocation
Data space;Then the order for obtaining the device descriptor is sent to USB storage device;Then it is mentioned in the data that equipment returns
Take the address information of USB storage device;Then order data (the command number that order obtains the USB storage device of character string is sent
According to including USB storage device manufacturer, name of product, product ID data address information), it sends and obtains to USB storage device
The order of character string;It calls hash function and calculates (referring to USB device manufacturer, produce for the string data of USB storage device
The name of an article claims and product ID string data) hashed value;Ciphertext is converted by the cleartext information of the string data of hashed value
Information data arrives plug flag data, port detail information data and cryptogram information data according to pre-defined form collator
In communication data, sends and order to BMC;It waits BMC processing to complete and return to result data, then result data storage is arrived
Global memory space;Exit SMI interrupt program;
S8: operating system judges to be inserted into whether USB storage device is authenticating device according to result data, set if it is certification
Standby, then communication linkage is initialized, normal use;If not authenticating device, then port device is removed.
Specific step is as follows by step S1:
S11: creating USB controller under the PCT bus of the system bus of server, and ensures USB controller in PCT bus
In catalogue it is correct, by configure USB controller address, configure USB controller power resources and USB controller state
Information is correct to ensure catalogue of the USB controller in pci bus;
S12: (logic concentrator of USB controller, makes creation USB Root Hub equipment under the catalogue of USB controller
Obtaining multiple USB interfaces can be with a public controller), while configuring the address of USB Root Hub equipment, configuration USB Root
The power resources and status information of Hub equipment;
S13: multiple USB port equipment are created under USB Root Hub facility inventory, wherein the quantity of USB port equipment
Representative with the quantity of circumscribed USB equipment, can configure address, concatenation ability and user's visibility of each USB port equipment etc.
Program information creates port device, root between different port equipment according to the port device quantity that USB controller is supported one by one
It is distinguished according to port address.
Step S7 " if equipment be insertion operation and confirm be USB storage device, setting equipment be inserted into flag data and
Storage allocation data space " has content are as follows: the better address information of USB port is arranged in communication data, is then matched
It sets and obtains the USB command data that description meets, obtain the type of equipment, the traffic sign placement that USB storage device is inserted into is being communicated
It in data, is reconfigured and obtains descriptor order data, send order to USB storage device and obtain data (data of acquisition include
USB controller address information, port address information and equipment transmission speed etc.), storage allocation data space.
Step S7 further include: if it is not USB storage type equipment that equipment, which is insertion operation, terminate program.
Step S7's " calls hash function and calculates data and (refer to USB device manufacturer, name of product, product ID
String data) hashed value " it refers to: hash function is called, by USB device manufacturer, name of product, product ID character string
Data (length for no matter inputting string data) are handled string data by function, and output is fixed after processing grows
The hashed value of degree 128, while cipher-text information is converted by the cleartext information of string data.
" address information of USB storage device " in step S7 include the device manufacturer of USB storage device, name of product and
The address information of product serial number.
As shown in figure 3, " BMC processing is waited to complete and return to result data " of step S7 includes following content:
After BMC initialization is completed, start the order for monitoring whether to receive USB storage device data, if do not received,
Any operation is not done then;If receiving the order of USB storage device data, to be transmitted through come data according in advance with BIOS arrange
Good format is parsed;
Flag data is extracted according to insertion, judges that USB port is insertion or extracts operation: being operated if it is extracting, USB
Equipment is not in place, and according to the better address information of port, corresponding facility information is removed from the interface BMC;It is grasped if it is insertion
Make, hashed value in information data is parsed, reads the stored hash Value Data in nonvolatile storage, compare one by one
Value Data is hashed, inquiry, which is transmitted through the hash Value Data come, whether there is in nonvolatile storage: if there is no then in BMC
The unverified USB storage device information of interface display;And if so, USB storage device information has been authenticated in BMC interface display, it will
The result data whether authenticated returns to BIOS program;
Whether unverified USB storage device is authenticated, terminates program if not authenticating, if necessary to authenticate, really
The safety certification permission for recognizing operator (in the case that only safety certification permission is confirmed, just stores hash Value Data
Into nonvolatile storage), when this USB storage device is again insertable into system, can be used normally.
Wherein, BIOS:Basic Input Output System, basic input output system are mainly used for computer and open
The initialization and detection of various hardware devices during machine.BMC: baseboard management controller (Baseboard Management
Controller), generally it is built on mainboard, the IPMI of professional standard is supported to standardize;The function that BMC is provided include: it is local and
Remote diagnosis, console support, configuration management, hardware management and troubleshooting.USB:(Universal Serial Bus) it is logical
It is an external bus standard with universal serial bus, for being connected and communicate with for specification computer and external equipment.SMI:(System
Management Interrupt) system management interrupt.
The present invention is unable to the defect of safety certification USB storage device for server system, gives effective solution and does
Method.Under BIOS and BMC cooperation, possesses safety certification permission personnel and stored by BMC come the USB that certificate server system extends
Equipment, the USB storage device being certified can be used normally, and unauthenticated USB storage device is unable to normal use, ensure system
System safety, protects data safety.
The present invention is based on the methods of firmware safety certification USB storage device to be realized by the cooperation between BIOS and BMC
To the function of the USB storage device safety certification of plug and play.BMC confirms safety certification permission, deposits after being identified through to USB
It stores up equipment and carries out safety certification;Safety certification storing data is ciphertext data information, can not be cracked;Verification process is with firmware
It completes, is not limited by operating system.
It should be noted that above-described embodiment can be freely combined as needed.The above is only of the invention preferred
Embodiment, but the present invention is not limited to the specific details in the above embodiment, it is noted that for the art
For those of ordinary skill, within the scope of the technical concept of the present invention, without departing from the principle of the present invention, it can also do
Several improvements and modifications out carry out a variety of equivalents to technical solution of the present invention, these improvement, retouching and equivalents
It should be regarded as protection scope of the present invention.
Claims (7)
1. a kind of method based on firmware safety certification USB storage device, which is characterized in that it includes the following steps:
S1: USB controller is created under the PCT bus of the system bus of server first, then under the catalogue of USB controller
USB Root Hub equipment is created, finally creates multiple USB port equipment under USB Root Hub facility inventory.
S2: into after the operating system of server, operating system starts to monitor whether USB port has equipment plug, if do not had
Equipment plug, does not do any other operational motion;If there is USB port is inserted into or is extracted to equipment, then continue step S3;
S3: operating system enters under the catalogue of USB controller, in USB Root Hub equipment under catalogue, enter insertion or
Person extracts under the USB port equipment of equipment, executes program: will be in the better address deposit global memory space of the port UB;
S4: carrying out triggering soft SMI interrupt, and transfer control to BIOS program to SMI interrupt port write-in traps numerical value,
It calls to execute to interrupt and executes program;
S5: in interrupt routine, calling service routine first reads global memory's space address, obtains USB port better address,
The connection status register of the port of USB controller is read according to USB port address;
S6: judging whether there is equipment and be connected to USB port, if there is equipment, is shown to be insertion operation, if without equipment, table
Bright is to extract operation;
S7: if equipment is to extract operation, the traffic sign placement that equipment is extracted believes the better address of port in communication data
Breath is arranged in communication data predetermined, sends the data to BMC, exits SMI interrupt program, terminates program;
If equipment is insertion operation and confirms it is USB storage device, setting equipment is inserted into flag data and storage allocation data
Space;Then the order for obtaining the device descriptor is sent to USB storage device;Then it is extracted in the data that equipment returns
The address information of USB storage device;Then the order data that order obtains the USB storage device of character string is sent, is stored to USB
Equipment sends the order for obtaining character string;It calls hash function and calculates the hashed value of the string data of USB storage device;It will
The cleartext information of the string data of hashed value is converted into cryptogram information data, will plug flag data, port details number
According to and cryptogram information data, in pre-defined form collator to communication data, to BMC send order;Wait BMC processing
It completes and returns to result data, then result data is stored to global memory space;Exit SMI interrupt program;
S8: operating system judges to be inserted into whether USB storage device is authenticating device according to result data, if it is authenticating device,
Then communication linkage is initialized, normal use;If not authenticating device, then port device is removed.
2. a kind of method based on firmware safety certification USB storage device according to claim 1, which is characterized in that step
Specific step is as follows by rapid S1:
S11: creating USB controller under the PCT bus of the system bus of server, and ensures USB controller in PCT bus
Catalogue is correct, by configuring the address of USB controller, configuring the power resources of USB controller and the status information of USB controller
To ensure that catalogue of the USB controller in pci bus is correct;
S12: USB Root Hub equipment is created under the catalogue of USB controller, while configuring the ground of USB Root Hub equipment
Location, the power resources and status information for configuring USB Root Hub equipment;
S13: multiple USB port equipment are created under USB Root Hub facility inventory, wherein the quantity representative of USB port equipment
With the quantity of circumscribed USB equipment, the programs such as address, concatenation ability and the user visibility of each USB port equipment can be configured
Information creates port device according to the port device quantity that USB controller is supported one by one, according to end between different port equipment
Port address is distinguished.
3. a kind of method based on firmware safety certification USB storage device according to claim 1, which is characterized in that step
Rapid S7 " if equipment is insertion operation and confirms it is USB storage device, setting equipment insertion flag data and storage allocation number
According to space " there is content are as follows: the better address information of USB port is arranged in communication data, then configuration obtains description
The USB command data met, obtain the type of equipment, by the traffic sign placement of USB storage device insertion in communication data, then match
It sets and obtains descriptor order data, send order to USB storage device and obtain data, storage allocation data space.
4. a kind of method based on firmware safety certification USB storage device according to claim 3, which is characterized in that step
Rapid S7 further include: if it is not USB storage type equipment that equipment, which is insertion operation, terminate program.
5. a kind of method based on firmware safety certification USB storage device according to claim 3, which is characterized in that step
" call hash function and calculate data hash value " of rapid S7 refers to: hash function is called, by USB device manufacturer, ProductName
Title, product ID string data are handled string data by function, and regular length 128 are exported after processing
Hashed value, while converting cipher-text information for the cleartext information of string data.
6. a kind of method based on firmware safety certification USB storage device according to claim 3, which is characterized in that step
" address information of USB storage device " in rapid S7 includes device manufacturer, name of product and the product ID of USB storage device
The address information of data.
7. a kind of method based on firmware safety certification USB storage device according to claim 1, which is characterized in that step
" BMC processing is waited to complete and return to result data " of rapid S7 includes following content:
After BMC initialization is completed, start the order for monitoring whether to receive USB storage device data, if do not received, no
Do any operation;If receiving the order of USB storage device data, to being transmitted through the data come according to appointing lattice with BIOS in advance
Formula is parsed;
Flag data is extracted according to insertion, judges that USB port is insertion or extracts operation: being operated if it is extracting, USB device
It is not in place, according to the better address information of port, corresponding facility information is removed from the interface BMC;It, will if it is insertion operation
Hashed value parses in information data, reads the stored hash Value Data in nonvolatile storage, one by one comparison hash
Value Data, inquiry, which is transmitted through the hash Value Data come, whether there is in nonvolatile storage: if there is no then at the interface BMC
Show unverified USB storage device information;And if so, USB storage device information has been authenticated in BMC interface display, it will be whether
The result data of certification returns to BIOS program;
Whether unverified USB storage device is authenticated, terminates program if not authenticating, if necessary to authenticate, confirmation behaviour
The safety certification permission for making personnel (in the case that only safety certification permission is confirmed, just stores hash Value Data to non-
In volatile storage area), when this USB storage device is again insertable into system, can be used normally.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910292635.6A CN110188528A (en) | 2019-04-12 | 2019-04-12 | A method of based on firmware safety certification USB storage device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910292635.6A CN110188528A (en) | 2019-04-12 | 2019-04-12 | A method of based on firmware safety certification USB storage device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110188528A true CN110188528A (en) | 2019-08-30 |
Family
ID=67714161
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910292635.6A Pending CN110188528A (en) | 2019-04-12 | 2019-04-12 | A method of based on firmware safety certification USB storage device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110188528A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110941582A (en) * | 2019-11-08 | 2020-03-31 | 浪潮(北京)电子信息产业有限公司 | USB bus structure of BMC chip and communication method thereof |
CN114186217A (en) * | 2022-02-17 | 2022-03-15 | 浪潮(山东)计算机科技有限公司 | Port management method, system, equipment and computer readable storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040003262A1 (en) * | 2002-06-28 | 2004-01-01 | Paul England | Methods and systems for protecting data in USB systems |
CN101556634A (en) * | 2008-04-11 | 2009-10-14 | 鸿富锦精密工业(深圳)有限公司 | Method and system for managing and controlling using authority of external apparatus |
CN102111272A (en) * | 2010-12-24 | 2011-06-29 | 武汉天喻信息产业股份有限公司 | Method for authenticating external equipment by using mobile terminal |
CN102750496A (en) * | 2012-06-12 | 2012-10-24 | 南京师范大学 | Secure access authentication method for removable storage media |
US20130014221A1 (en) * | 2011-02-01 | 2013-01-10 | Mcci Corporation | Security arrangements for extended usb protocol stack of a usb host system |
CN104361280A (en) * | 2014-10-31 | 2015-02-18 | 山东超越数控电子有限公司 | Method for carrying out credible certification on USB storage device through SMI interrupt |
CN104657671A (en) * | 2013-11-19 | 2015-05-27 | 研祥智能科技股份有限公司 | Access authority management method and system for mobile storage device |
CN106462678A (en) * | 2014-06-11 | 2017-02-22 | 戴尔产品有限公司 | Systems and methods for providing authentication using a managed input/output port |
CN206039532U (en) * | 2016-07-19 | 2017-03-22 | 国网新疆电力公司电力科学研究院 | Computer USB peripheral hardware safety discernment filter |
CN107995227A (en) * | 2017-12-29 | 2018-05-04 | 西安交大捷普网络科技有限公司 | The authentication method and device of movable storage device |
-
2019
- 2019-04-12 CN CN201910292635.6A patent/CN110188528A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040003262A1 (en) * | 2002-06-28 | 2004-01-01 | Paul England | Methods and systems for protecting data in USB systems |
CN101556634A (en) * | 2008-04-11 | 2009-10-14 | 鸿富锦精密工业(深圳)有限公司 | Method and system for managing and controlling using authority of external apparatus |
CN102111272A (en) * | 2010-12-24 | 2011-06-29 | 武汉天喻信息产业股份有限公司 | Method for authenticating external equipment by using mobile terminal |
US20130014221A1 (en) * | 2011-02-01 | 2013-01-10 | Mcci Corporation | Security arrangements for extended usb protocol stack of a usb host system |
CN102750496A (en) * | 2012-06-12 | 2012-10-24 | 南京师范大学 | Secure access authentication method for removable storage media |
CN104657671A (en) * | 2013-11-19 | 2015-05-27 | 研祥智能科技股份有限公司 | Access authority management method and system for mobile storage device |
CN106462678A (en) * | 2014-06-11 | 2017-02-22 | 戴尔产品有限公司 | Systems and methods for providing authentication using a managed input/output port |
CN104361280A (en) * | 2014-10-31 | 2015-02-18 | 山东超越数控电子有限公司 | Method for carrying out credible certification on USB storage device through SMI interrupt |
CN206039532U (en) * | 2016-07-19 | 2017-03-22 | 国网新疆电力公司电力科学研究院 | Computer USB peripheral hardware safety discernment filter |
CN107995227A (en) * | 2017-12-29 | 2018-05-04 | 西安交大捷普网络科技有限公司 | The authentication method and device of movable storage device |
Non-Patent Citations (1)
Title |
---|
DON ANDERSON著: "《USB系统体系》", 31 January 2001, 中国电力出版社 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110941582A (en) * | 2019-11-08 | 2020-03-31 | 浪潮(北京)电子信息产业有限公司 | USB bus structure of BMC chip and communication method thereof |
CN110941582B (en) * | 2019-11-08 | 2021-06-29 | 浪潮(北京)电子信息产业有限公司 | USB bus structure of BMC chip and communication method thereof |
CN114186217A (en) * | 2022-02-17 | 2022-03-15 | 浪潮(山东)计算机科技有限公司 | Port management method, system, equipment and computer readable storage medium |
CN114186217B (en) * | 2022-02-17 | 2022-05-13 | 浪潮(山东)计算机科技有限公司 | Port management method, system, equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104205778B (en) | System and method for supporting subnet manager (SM) main negotiation in a network environment | |
CN109743199A (en) | Containerization management system based on micro services | |
CN105302248B (en) | Chipset and server system | |
TWI526824B (en) | Method and system for managing network interface card information | |
CN106549750A (en) | With computer-implemented method and the system and computer program using which | |
CN104615572B (en) | Hot plug processing system and method | |
CN101403994A (en) | Storage device and storage device access control method | |
CN105739930B (en) | A kind of storage architecture and its initial method and date storage method and managing device | |
CN110188528A (en) | A method of based on firmware safety certification USB storage device | |
CN109039829A (en) | A kind of network card performance testing method, apparatus, terminal and storage medium | |
CN110134447A (en) | The system and method for BMC immediate updating hard disk information based on operating system | |
CN109828798A (en) | A method of PCIE silk-screen information is sent to BMC | |
CN109543459A (en) | A kind of data deposit card method and apparatus | |
CN107025146B (en) | A kind of document generating method, device and system | |
CN104111709A (en) | Server systems | |
CN107908940A (en) | The method and terminal device of a kind of fingerprint recognition | |
CN112491980A (en) | Cloud host service management method, system, terminal and storage medium | |
CN110362511A (en) | A kind of PCIE device | |
CN110377324A (en) | Information platform monitoring system and construction method | |
CN103544098A (en) | Method and device for testing pressure | |
CN110474976A (en) | A kind of message transfer method, apparatus, storage medium and system applied to automatic vending equipment | |
CN106933575A (en) | A kind of system and method with outer identification server assets information | |
CN109302314A (en) | A kind of controlled node analogy method and relevant apparatus | |
CN208999999U (en) | Data processing equipment | |
CN105741444B (en) | Application authentication method and device based on linux system financial self-service equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190830 |