CN110502250A - A kind of upgrade method and baseboard management controller - Google Patents

A kind of upgrade method and baseboard management controller Download PDF

Info

Publication number
CN110502250A
CN110502250A CN201910631406.2A CN201910631406A CN110502250A CN 110502250 A CN110502250 A CN 110502250A CN 201910631406 A CN201910631406 A CN 201910631406A CN 110502250 A CN110502250 A CN 110502250A
Authority
CN
China
Prior art keywords
image file
upgraded
chip
upgrading
bmc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910631406.2A
Other languages
Chinese (zh)
Inventor
季冬冬
薛广营
张广乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910631406.2A priority Critical patent/CN110502250A/en
Publication of CN110502250A publication Critical patent/CN110502250A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/654Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

This application discloses a kind of upgrade method and baseboard management controllers;The upgrade method includes: baseboard management controller after receiving image file used in by digital signature, upgrading, decrypts to obtain the image file using scheduled key;Whether the baseboard management controller verifies the image file corresponding with chip to be upgraded;The image file, upgrades the firmware of chip to be upgraded when corresponding;The application can be conducive to improve baseboard management controller upgrading chip when security reliability and operation stability.

Description

A kind of upgrade method and baseboard management controller
Technical field
The present invention relates to computer field, espespecially a kind of upgrade method and baseboard management controller.
Background technique
In the computer systems such as interchanger, pass through CPLD (Complex Programmable LogicDevice, complexity Programmable logic device)/FPGA (Field Programmable GATE Array, field programmable gate array) chip (such as Chip comprising CPLD and/or FPGA) the entire interchanger of control upper and lower electric timing control, communication control, key detection, wind Revolving speed control, SFP lighting control and serial ports switching etc. are fanned, BMC (Baseboard Management Controller, base are passed through Board management controller) instruction switch status, firmware upgrade, long-range control and log collection etc..It is realized based on the BMC page CPLD/FPGA firmware safety upgrade is of great significance to whole system safety Design.
CPLD/FPGA is the specific integrated circuit of a semi-custom, has flexible programming, quick response, integrated level height etc. Number of advantages is verified and is controlled application field in early development and has been more and more widely used.BMC provides the function such as long-range management Can, the important component that visualization interface and switch system design is provided to client.In existing control strategy, lead to It crosses BMC page upgrading CPLD/FPGA chip and seldom considers safety check mechanism, there are security risks to firmware upgrade for this.One side Accuracy in face of operator proposes requirements at the higher level, especially for there are the systems of multiple CPLD/FPGA chips;Another party Face will increase the risk that file is deliberately distorted, and influence the safety of entire switch system.Since CPLD/FPGA controls entire hand over The basic functions such as system of changing planes normal operation, it is therefore desirable to ensure the correctness upgraded.
Summary of the invention
The application provides a kind of upgrade method and baseboard management controller, when can be conducive to improve BMC upgrading chip Security reliability and operation stability.
This application provides a kind of upgrade methods, comprising:
Baseboard management controller BMC is after receiving image file used in by digital signature, upgrading, using predetermined Key decrypt to obtain the image file;
Whether the BMC verifies the image file corresponding with chip to be upgraded;Mirror image text when corresponding Part upgrades the firmware of chip to be upgraded.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file that the BMC is received It is to be encrypted by scheduled digital signature private key.
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is burnt in the flash memory of chip to be upgraded, the mirror image in flash memory is loaded when re-powering File upgrades the firmware of chip to be upgraded.
In a kind of exemplary embodiment, the BMC verify the image file with whether chip to be upgraded corresponding can To include:
The unique designation in unique designation and the image file presumptive address in BMC comparison Upgrade process is It is no consistent;Determine that the image file is corresponding with chip to be upgraded if consistent.
In a kind of exemplary embodiment, the unique designation may include:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
Present invention also provides a kind of baseboard management controllers, comprising: processor and memory;
The memory is used to save the program for upgrading;The processor is used to read the journey for upgrading Sequence, and proceed as follows:
After receiving image file used in by digital signature, upgrading, decrypt to obtain institute using scheduled key State image file;
It is whether corresponding with chip to be upgraded to verify the image file;The image file, is treated when corresponding The firmware of the chip of upgrading is upgraded.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file received be through Cross scheduled digital signature private key encryption.
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is burnt in the flash memory of chip to be upgraded, the mirror image in flash memory is loaded when re-powering File upgrades the firmware of chip to be upgraded.
In a kind of exemplary embodiment, the verification image file with whether chip to be upgraded corresponding can wrap It includes:
It compares the unique designation in Upgrade process and whether the unique designation in the image file presumptive address is consistent; Determine that the image file is corresponding with chip to be upgraded if consistent.
In a kind of exemplary embodiment, the unique designation may include:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
The application increases twin check link: digital signature verification and head checkmark during BMC upgrades chip, Improve by BMC upgrade CPLD/FPGA safety and accuracy, prevent upgrade image due to damage, transmission process deliberately Distort, upgrade image does not correspond to, situations such as mistake burning mirror image caused system crash problem, improve BMC upgrading chip Security reliability and operation stability.
In one exemplary embodiment of the application, Background mode is used to upgrading process, can guarantee to upgrade In progress working properly.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by specification, right Specifically noted structure is achieved and obtained in claim and attached drawing.
Detailed description of the invention
Attached drawing is used to provide to further understand technical solution of the present invention, and constitutes part of specification, with this The embodiment of application technical solution for explaining the present invention together, does not constitute the limitation to technical solution of the present invention.
Fig. 1 is the flow chart of the upgrade method of embodiment one;
Fig. 2 is the flow chart of switch system CPLD/FPGA online upgrading in embodiment two;
Fig. 3 is the schematic diagram of the update device of embodiment three.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application Feature can mutual any combination.
Step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions It executes.Also, although logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable Sequence executes shown or described step.
Embodiment one, a kind of upgrade method, as shown in Figure 1, including step S110-S120:
Step S110, BMC is after receiving image file used in by digital signature, upgrading, using scheduled close Key is decrypted to obtain the image file;
Step S120, whether the described BMC verifies the image file corresponding with chip to be upgraded;When to corresponding when institute Image file is stated, the firmware of chip to be upgraded is upgraded.
In the present embodiment, increase twin check link during BMC upgrades chip firmware: digital signature verification is (i.e. Step S110) and checkmark (i.e. step S120), the integrality and transmission security and mirror image of image file are verified respectively With the one-to-one relationship of chip to be upgraded, therefore can be improved the security reliability of computer system updating with it is stable Property.
In the present embodiment, verify whether image file passes through at scheduled digital signature first before upgrading chip firmware Reason will perform the next step verification (that is: checkmark) if it is (that is: can successful decryption);If not (that is: cannot succeeding Decryption or image file are handled without scheduled digital signature), escalation process can be terminated, and user is prompted on the page. Step S110 can guarantee the safety of the integrality and transmission process of image file.
One between image file and chip to be upgraded can be further verified in the present embodiment, after verifying by the first step One corresponding relationship.If escalation process will be formally executed by (that is: image file is corresponding with chip to be upgraded), if obstructed (that is: image file and chip to be upgraded be not corresponding, that is to say, that image file is not for chip to be upgraded) is crossed, it can To terminate escalation process, and client is prompted on the page.Step S120 guarantees one between image file and chip with upgrading One corresponding relationship avoids upgrading wrong mirror image due to maloperation, whole system is caused to be collapsed.
The upgrade method of the present embodiment can be, but not limited to using during the online upgrading of switch system;It can also be with Using in the online upgrading of other computer systems for upgrading chip by BMC.
The upgrade method of the present embodiment can realize the change of escalation policy based on existing chip to be upgraded and BMC, The increase of hardware cost is not needed to bring.
In a kind of exemplary embodiment, the BMC passes through I2C (Inter-Integrated Circuit, integrated circuit Bus) receive image file used in by digital signature, upgrading.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include: The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file that the BMC is received is by pre- Fixed digital signature private key encryption.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include: The corresponding key of used key, decryption obtain the image file when using with cryptographic image file.
In a kind of exemplary embodiment, the chip to be upgraded can be CPLD-FPGA chip.
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is burnt in the FLASH (flash memory) of chip to be upgraded, FLASH is loaded when re-powering In image file the firmware of chip to be upgraded is upgraded.
It is to be upgraded in the present embodiment using Background mode, it can be only the load of image file used in upgrading Into the FLASH of chip to be upgraded, upgrades used image file and (be such as but not limited to plug-in source again when re-powering After line) it is just automatically loaded into the memory device (being such as but not limited to Static RAM) of chip to be upgraded and comes into force, because This will not influence the normal work of chip;The time re-powered can be determined by user completely.The way of the present embodiment can be with Upgrading is set not influence the normal work of system.
In a kind of exemplary embodiment, it can be and (be such as but not limited to when receiving user meeting other preset conditions The specific instruction of input) when, the image file loaded in FLASH is upgraded;When,
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is loaded into the memory device of real work.
In a kind of exemplary embodiment, the BMC verify the image file with whether chip to be upgraded corresponding can To include:
The unique designation in unique designation and the image file presumptive address in BMC comparison Upgrade process is It is no consistent;Determine that the image file is corresponding with chip to be upgraded if consistent.
In a kind of exemplary embodiment, the unique designation may include:
The number of PN (Part Number, the Part No.) and chip to be upgraded of board where chip to be upgraded.
In a kind of exemplary embodiment, the presumptive address can be, but not limited to be set to the image file most before End.
In a kind of exemplary embodiment, the BMC verify the image file with whether chip to be upgraded corresponding can To be verified otherwise, such as by preset corresponding relationship, check that mark entrained by image file is corresponding It whether is chip to be upgraded.
Below by taking switch system as an example, illustrate the workflow of BMC upgrading CPLD/FPGA.
Example one, this example introduce the process that BMC carries out twin check.
The first step decrypts to obtain image file using predetermined key;In this example, it may be assumed that carry out the number of image file Signature check.
What BMC was obtained is that treated, upgrades used image file by digital signature private key.It is first when BMC upgrades First upgrade used image file using corresponding public key decryptions.If image file integrity breaks are replaced in the transmission It changes, BMC can not just decrypt digital signature treated image file.Therefore, this verification scheme largely improves liter Safety in the integrality and transmission process of image file used in grade.
When BMC upgrades CPLD/FPGA, the digital signature of image file is verified according to the above method first, to verify liter Whether it is maliciously tampered in the integrality and transmission process of image file used in grade.If image file changes, table Now it can not just stop the upgrading process to CPLD/FPGA at this time by public key decryptions for BMC;Continue to hold if successful decryption Row next step checking procedure.
Second step, verifies image file and whether chip to be upgraded corresponds to;In this example, it may be assumed that carry out image file With the verification of the corresponding relationship of chip.
Generate upgrade used in image file when the corresponding CPLD/FPGA chip of addition unique designation (such as But addition is not limited in presumptive address), and the unique designation of CPLD/FPGA chip to be upgraded, premature cure is into the friendship In the Upgrade process of the BMC for system of changing planes, when upgrading some CPLD/FPGA chip due to BMC, BMC knows CPLD/ to be upgraded The unique designation of fpga chip, BMC compare the unique designation in unique designation and image file presumptive address in Upgrade process, Only the two is completely the same, and BMC just thinks that image file and CPLD/FPGA chip to be upgraded are one-to-one.Due to CPLD/FPGA is upgraded based on the keyword burning in image file, it may be assumed that comprising in comment section and text in image file Hold, the two is spaced apart with keyword, only body matter is burnt in chip in upgrading, therefore unique in comment section increase Mark will not affect that the normal function of image file.
Also by rear, BMC formally executes the upgrading process to corresponding CPLD/FPGA chip for second step verification, otherwise, terminates Upgrade process.
Above-mentioned presumptive address can be set most to be started in image file, can increase offset ground in burning image file Location, to ignore the flag bit that image file starts.
Wherein, the format for the unique designation that image file is added can be defined with designed, designed.In this example, for that can know Specific CPLD/FPGA chip on specific board and board in other switch system, the format design of unique designation are PN+ CPLD/FPGA number, PN can recognize specific board, and CPLD/FPGA number can recognize specific CPLD/FPGA chip, and the two can Uniquely determine a CPLD/FPGA chip in entire switch system.
Wherein, the unique designation can be encoded using ASCII.
Above-mentioned upgrading mode can use Background mode, that is, only be loaded into memory when burning image file SRAM (Static Random-Access Memory, static random storage in part FLASH, without being loaded into real work Device) in, this burning mode loads automatically when next user is inserted into AC, and user can select the load time according to real work, Therefore, it will not influence normal work.
Example two, the process of this example introduction upgrading.
Step 201, on the basis of the original image file of CPLD/FPGA, image file beginning increase institute it is right The mark for the CPLD/FPGA chip answered is uploaded to BMC after digital signature is handled, and uses as the formal burning of CPLD/FPGA Image file;
Step 202, the process based on " digital signature verification for carrying out image file " in example one upgrade CPLD/ in BMC Increase the calibration link to the digital signature of image file in the process of FPGA;
Step 203, the process based on " verification for carrying out the corresponding relationship of image file and chip " in example one, in BMC Upgrade the calibration link increased in the process of CPLD/FPGA to the mark in image file;
The process toward SRAM load images file is not executed in step 204, BMC upgrading CPLD/FPGA process, that is, is adopted Upgraded with Background mode.
Embodiment two, a kind of switch system CPLD/FPGA chip online upgrading method, may be implemented security mechanism.
When switch system upgrades the firmware of CPLD/FPGA chip by the BMC page, verification upgrades used mirror first As the completeness and efficiency of file;
In a kind of exemplary embodiment, which is only to pass through number by the processed file of digital signature Word certification could decrypt the image file when holding public key, on the one hand ensure that the integrality of image file, another party in this way Face ensure that the safety of image file transmission.
Treated although image file ensure that the integrality of file and the safety of transmission for digital signature, but can not protect The one-to-one correspondence for demonstrate,proving image file and CPLD/FPGA chip, especially when there are the CPLD/FPGA of multiple identical series for system When chip, the one-to-one correspondence of CPLD/FPGA chip and image file cannot be distinguished.To avoid this problem, the present embodiment exists The one-to-one relationship of image file itself and CPLD/FPGA chip is added in image file used in upgrading;For this this reality Example is applied to propose and realize the second verification scheme for adding unique designation in image file.
In the present embodiment, on the one hand the twin check mechanism during online upgrading CPLD/FPGA ensure that burning mirror image The integrality and transmission security of itself, on the other hand ensure that the one-to-one correspondence of burning mirror image Yu CPLD/FPGA chip.
In a kind of exemplary embodiment, work flow diagram such as Fig. 2 institute of the CPLD/FPGA online upgrading of switch system Show, including step 31-38:
31, BMC executes the burning process of upgrading.
32, BMC verification upgrades the integrality of used image file, transmission security.
33, judge whether verification passes through, carry out step 34 if passing through;If terminating burning process if.
34, verification upgrades the unique designation carried in used image file, and is solidificated in Upgrade process in advance Unique designation.
35, judge whether two unique designations match, carry out allowing to execute burning process if matching, carry out step 36;Burning process is terminated if mismatching.
36, burning is executed.
37, judge whether burning success, terminate if success;Step 38 is carried out if without burning success.
38, judge whether to continue to upgrade, the return step 31 if continuing terminates if not continuing.
Embodiment three, a kind of baseboard management controller, as shown in Figure 3, comprising: processor 41 and memory 42;
The memory 42 is used to save the program for upgrading;The processor 41 is used for upgrading described in being used to read Program, and proceed as follows:
After receiving image file used in by digital signature, upgrading, decrypt to obtain institute using scheduled key State image file;
It is whether corresponding with chip to be upgraded to verify the image file;The image file, is treated when corresponding The firmware of the chip of upgrading is upgraded.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file received be through Cross scheduled digital signature private key encryption.
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is burnt in the flash memory of chip to be upgraded, the mirror image in flash memory is loaded when re-powering File upgrades the firmware of chip to be upgraded.
In a kind of exemplary embodiment, the verification image file with whether chip to be upgraded corresponding can wrap It includes:
It compares the unique designation in Upgrade process and whether the unique designation in the image file presumptive address is consistent; Determine that the image file is corresponding with chip to be upgraded if consistent.
In a kind of exemplary embodiment, the unique designation may include:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
It is other to realize that details be with reference to embodiment above.
It will appreciated by the skilled person that whole or certain steps, system, dress in method disclosed hereinabove Functional module/unit in setting may be implemented as software, firmware, hardware and its combination appropriate.In hardware embodiment, Division between the functional module/unit referred in the above description not necessarily corresponds to the division of physical assemblies;For example, one Physical assemblies can have multiple functions or a function or step and can be executed by several physical assemblies cooperations.Certain groups Part or all components may be implemented as by processor, such as the software that digital signal processor or microprocessor execute, or by It is embodied as hardware, or is implemented as integrated circuit, such as specific integrated circuit.Such software can be distributed in computer-readable On medium, computer-readable medium may include computer storage medium (or non-transitory medium) and communication media (or temporarily Property medium).As known to a person of ordinary skill in the art, term computer storage medium is included in for storing information (such as Computer readable instructions, data structure, program module or other data) any method or technique in the volatibility implemented and non- Volatibility, removable and nonremovable medium.Computer storage medium include but is not limited to RAM, ROM, EEPROM, flash memory or its His memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storages, magnetic holder, tape, disk storage or other Magnetic memory apparatus or any other medium that can be used for storing desired information and can be accessed by a computer.This Outside, known to a person of ordinary skill in the art to be, communication media generally comprises computer readable instructions, data structure, program mould Other data in the modulated data signal of block or such as carrier wave or other transmission mechanisms etc, and may include any information Delivery media.

Claims (10)

1. a kind of upgrade method characterized by comprising
Baseboard management controller BMC is after receiving image file used in by digital signature, upgrading, using scheduled close Key is decrypted to obtain the image file;
Whether the BMC verifies the image file corresponding with chip to be upgraded;The image file, right when corresponding The firmware of chip to be upgraded is upgraded.
2. upgrade method as described in claim 1, which is characterized in that described to decrypt to obtain the mirror image using scheduled key File includes:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file that the BMC is received be through Cross scheduled digital signature private key encryption.
3. upgrade method as described in claim 1, which is characterized in that the firmware to chip to be upgraded carries out upgrade package It includes:
The image file is burnt in the flash memory of chip to be upgraded, the image file in flash memory is loaded when re-powering The firmware of chip to be upgraded is upgraded.
4. upgrade method as described in claim 1, which is characterized in that the BMC verifies the image file and to be upgraded Whether chip corresponds to
The unique designation in unique designation and the image file presumptive address in BMC comparison Upgrade process whether one It causes;Determine that the image file is corresponding with chip to be upgraded if consistent.
5. upgrade method as claimed in claim 4, which is characterized in that the unique designation includes:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
6. a kind of baseboard management controller, comprising: processor and memory;
It is characterized by:
The memory is used to save the program for upgrading;The processor is used to read the program for upgrading, and It proceeds as follows:
After receiving image file used in by digital signature, upgrading, decrypt to obtain the mirror using scheduled key As file;
It is whether corresponding with chip to be upgraded to verify the image file;Image file when corresponding, to be upgraded The firmware of chip upgraded.
7. baseboard management controller as claimed in claim 6, which is characterized in that described to decrypt to obtain institute using scheduled key Stating image file includes:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file received is by pre- Fixed digital signature private key encryption.
8. baseboard management controller as claimed in claim 6, which is characterized in that the firmware to chip to be upgraded carries out Upgrading includes:
The image file is burnt in the flash memory of chip to be upgraded, the image file in flash memory is loaded when re-powering The firmware of chip to be upgraded is upgraded.
9. baseboard management controller as claimed in claim 6, which is characterized in that the verification image file with it is to be upgraded Chip whether correspond to and include:
It compares the unique designation in Upgrade process and whether the unique designation in the image file presumptive address is consistent;If It is consistent then determine that the image file is corresponding with chip to be upgraded.
10. baseboard management controller as claimed in claim 9, which is characterized in that the unique designation includes:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
CN201910631406.2A 2019-07-12 2019-07-12 A kind of upgrade method and baseboard management controller Withdrawn CN110502250A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910631406.2A CN110502250A (en) 2019-07-12 2019-07-12 A kind of upgrade method and baseboard management controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910631406.2A CN110502250A (en) 2019-07-12 2019-07-12 A kind of upgrade method and baseboard management controller

Publications (1)

Publication Number Publication Date
CN110502250A true CN110502250A (en) 2019-11-26

Family

ID=68585397

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910631406.2A Withdrawn CN110502250A (en) 2019-07-12 2019-07-12 A kind of upgrade method and baseboard management controller

Country Status (1)

Country Link
CN (1) CN110502250A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417422A (en) * 2020-11-23 2021-02-26 深圳市中易通安全芯科技有限公司 Security chip upgrading method and computer readable storage medium
CN112463184A (en) * 2020-11-06 2021-03-09 苏州浪潮智能科技有限公司 Method and system for safely upgrading firmware of baseboard management controller
CN113485754A (en) * 2021-06-22 2021-10-08 新华三半导体技术有限公司 Chip starting method and device and electronic equipment
CN114115955A (en) * 2021-10-19 2022-03-01 苏州浪潮智能科技有限公司 Method, system, terminal and storage medium for upgrading server resource box FPGA firmware

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942075A (en) * 2014-04-09 2014-07-23 苏州汇川技术有限公司 System and method for programming elevator controller firmware
CN106228091A (en) * 2016-07-14 2016-12-14 昆山百敖电子科技有限公司 A kind of safe firmware validation update method
CN107256168A (en) * 2017-06-12 2017-10-17 郑州云海信息技术有限公司 A kind of design method of UEFI BIOS safety upgrade mechanism
CN108306959A (en) * 2018-01-29 2018-07-20 郑州云海信息技术有限公司 A kind of method, apparatus and storage medium of remote upgrade CPLD firmwares

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942075A (en) * 2014-04-09 2014-07-23 苏州汇川技术有限公司 System and method for programming elevator controller firmware
CN106228091A (en) * 2016-07-14 2016-12-14 昆山百敖电子科技有限公司 A kind of safe firmware validation update method
CN107256168A (en) * 2017-06-12 2017-10-17 郑州云海信息技术有限公司 A kind of design method of UEFI BIOS safety upgrade mechanism
CN108306959A (en) * 2018-01-29 2018-07-20 郑州云海信息技术有限公司 A kind of method, apparatus and storage medium of remote upgrade CPLD firmwares

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112463184A (en) * 2020-11-06 2021-03-09 苏州浪潮智能科技有限公司 Method and system for safely upgrading firmware of baseboard management controller
CN112417422A (en) * 2020-11-23 2021-02-26 深圳市中易通安全芯科技有限公司 Security chip upgrading method and computer readable storage medium
CN113485754A (en) * 2021-06-22 2021-10-08 新华三半导体技术有限公司 Chip starting method and device and electronic equipment
CN114115955A (en) * 2021-10-19 2022-03-01 苏州浪潮智能科技有限公司 Method, system, terminal and storage medium for upgrading server resource box FPGA firmware
CN114115955B (en) * 2021-10-19 2024-04-12 苏州浪潮智能科技有限公司 Method, system, terminal and storage medium for upgrading FPGA firmware of server resource box

Similar Documents

Publication Publication Date Title
CN110502250A (en) A kind of upgrade method and baseboard management controller
CN102981881B (en) A kind of method and system for preventing updating mobile terminal to illegal firmware version
EP3258372A1 (en) Burning method and burning system
CN109923518B (en) Software update mechanism for safety critical systems
US10778447B2 (en) Method and system for safely switching between product mode and development mode of terminal
CN108701191B (en) Data processing device and method for verifying the integrity of a data processing device
CN104951701B (en) A kind of method of the terminal device booting operating system based on USB controller
EP2958017A1 (en) Computerized systems and methods for installing upgraded software on electronic devices
US10726130B2 (en) Method and device for verifying upgrade of diagnosis connector of diagnostic equipment, and diagnosis connector
CN109714303A (en) BIOS starts method and data processing method
CN109976767B (en) Software burning method and device
JP7347895B2 (en) Hardware detection methods and apparatus, devices, and storage media
CN103995723A (en) IVI system firmware updating method and device based on mobile storage equipment
KR101430861B1 (en) Security information sharing system and execution method thereof
CN107170470A (en) A kind of CD-ROM drive and imprinting, read method with hardware encrypting
CN114048484A (en) Method and device for measuring credibility of multi-path server and computer equipment
WO2020001111A1 (en) Signature verification method for downloading firmware, firmware release method, mobile terminal and server
CN107943530A (en) USB interface-based unmanned boat system automatically updating method
CN110716732B (en) Device and method for upgrading UI and firmware programs of automobile instrument
CN107704756B (en) Security verification method and system before system upgrade
CN107026741A (en) Method and device is write with a brush dipped in Chinese ink in a kind of encryption based on network security
US20170075608A1 (en) Solid state memory unit and method for protecting a memory including verification of a sequence of requests for access to physical blocks
CN111783120A (en) Data interaction method, computing device, BMC chip and electronic device
CN115688120A (en) Secure chip firmware importing method, secure chip and computer readable storage medium
CN116204211A (en) Information processing method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20191126