CN110502250A - A kind of upgrade method and baseboard management controller - Google Patents
A kind of upgrade method and baseboard management controller Download PDFInfo
- Publication number
- CN110502250A CN110502250A CN201910631406.2A CN201910631406A CN110502250A CN 110502250 A CN110502250 A CN 110502250A CN 201910631406 A CN201910631406 A CN 201910631406A CN 110502250 A CN110502250 A CN 110502250A
- Authority
- CN
- China
- Prior art keywords
- image file
- upgraded
- chip
- upgrading
- bmc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
- G06F8/63—Image based installation; Cloning; Build to order
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Stored Programmes (AREA)
Abstract
This application discloses a kind of upgrade method and baseboard management controllers;The upgrade method includes: baseboard management controller after receiving image file used in by digital signature, upgrading, decrypts to obtain the image file using scheduled key;Whether the baseboard management controller verifies the image file corresponding with chip to be upgraded;The image file, upgrades the firmware of chip to be upgraded when corresponding;The application can be conducive to improve baseboard management controller upgrading chip when security reliability and operation stability.
Description
Technical field
The present invention relates to computer field, espespecially a kind of upgrade method and baseboard management controller.
Background technique
In the computer systems such as interchanger, pass through CPLD (Complex Programmable LogicDevice, complexity
Programmable logic device)/FPGA (Field Programmable GATE Array, field programmable gate array) chip (such as
Chip comprising CPLD and/or FPGA) the entire interchanger of control upper and lower electric timing control, communication control, key detection, wind
Revolving speed control, SFP lighting control and serial ports switching etc. are fanned, BMC (Baseboard Management Controller, base are passed through
Board management controller) instruction switch status, firmware upgrade, long-range control and log collection etc..It is realized based on the BMC page
CPLD/FPGA firmware safety upgrade is of great significance to whole system safety Design.
CPLD/FPGA is the specific integrated circuit of a semi-custom, has flexible programming, quick response, integrated level height etc.
Number of advantages is verified and is controlled application field in early development and has been more and more widely used.BMC provides the function such as long-range management
Can, the important component that visualization interface and switch system design is provided to client.In existing control strategy, lead to
It crosses BMC page upgrading CPLD/FPGA chip and seldom considers safety check mechanism, there are security risks to firmware upgrade for this.One side
Accuracy in face of operator proposes requirements at the higher level, especially for there are the systems of multiple CPLD/FPGA chips;Another party
Face will increase the risk that file is deliberately distorted, and influence the safety of entire switch system.Since CPLD/FPGA controls entire hand over
The basic functions such as system of changing planes normal operation, it is therefore desirable to ensure the correctness upgraded.
Summary of the invention
The application provides a kind of upgrade method and baseboard management controller, when can be conducive to improve BMC upgrading chip
Security reliability and operation stability.
This application provides a kind of upgrade methods, comprising:
Baseboard management controller BMC is after receiving image file used in by digital signature, upgrading, using predetermined
Key decrypt to obtain the image file;
Whether the BMC verifies the image file corresponding with chip to be upgraded;Mirror image text when corresponding
Part upgrades the firmware of chip to be upgraded.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file that the BMC is received
It is to be encrypted by scheduled digital signature private key.
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is burnt in the flash memory of chip to be upgraded, the mirror image in flash memory is loaded when re-powering
File upgrades the firmware of chip to be upgraded.
In a kind of exemplary embodiment, the BMC verify the image file with whether chip to be upgraded corresponding can
To include:
The unique designation in unique designation and the image file presumptive address in BMC comparison Upgrade process is
It is no consistent;Determine that the image file is corresponding with chip to be upgraded if consistent.
In a kind of exemplary embodiment, the unique designation may include:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
Present invention also provides a kind of baseboard management controllers, comprising: processor and memory;
The memory is used to save the program for upgrading;The processor is used to read the journey for upgrading
Sequence, and proceed as follows:
After receiving image file used in by digital signature, upgrading, decrypt to obtain institute using scheduled key
State image file;
It is whether corresponding with chip to be upgraded to verify the image file;The image file, is treated when corresponding
The firmware of the chip of upgrading is upgraded.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file received be through
Cross scheduled digital signature private key encryption.
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is burnt in the flash memory of chip to be upgraded, the mirror image in flash memory is loaded when re-powering
File upgrades the firmware of chip to be upgraded.
In a kind of exemplary embodiment, the verification image file with whether chip to be upgraded corresponding can wrap
It includes:
It compares the unique designation in Upgrade process and whether the unique designation in the image file presumptive address is consistent;
Determine that the image file is corresponding with chip to be upgraded if consistent.
In a kind of exemplary embodiment, the unique designation may include:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
The application increases twin check link: digital signature verification and head checkmark during BMC upgrades chip,
Improve by BMC upgrade CPLD/FPGA safety and accuracy, prevent upgrade image due to damage, transmission process deliberately
Distort, upgrade image does not correspond to, situations such as mistake burning mirror image caused system crash problem, improve BMC upgrading chip
Security reliability and operation stability.
In one exemplary embodiment of the application, Background mode is used to upgrading process, can guarantee to upgrade
In progress working properly.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by specification, right
Specifically noted structure is achieved and obtained in claim and attached drawing.
Detailed description of the invention
Attached drawing is used to provide to further understand technical solution of the present invention, and constitutes part of specification, with this
The embodiment of application technical solution for explaining the present invention together, does not constitute the limitation to technical solution of the present invention.
Fig. 1 is the flow chart of the upgrade method of embodiment one;
Fig. 2 is the flow chart of switch system CPLD/FPGA online upgrading in embodiment two;
Fig. 3 is the schematic diagram of the update device of embodiment three.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention
Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application
Feature can mutual any combination.
Step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions
It executes.Also, although logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable
Sequence executes shown or described step.
Embodiment one, a kind of upgrade method, as shown in Figure 1, including step S110-S120:
Step S110, BMC is after receiving image file used in by digital signature, upgrading, using scheduled close
Key is decrypted to obtain the image file;
Step S120, whether the described BMC verifies the image file corresponding with chip to be upgraded;When to corresponding when institute
Image file is stated, the firmware of chip to be upgraded is upgraded.
In the present embodiment, increase twin check link during BMC upgrades chip firmware: digital signature verification is (i.e.
Step S110) and checkmark (i.e. step S120), the integrality and transmission security and mirror image of image file are verified respectively
With the one-to-one relationship of chip to be upgraded, therefore can be improved the security reliability of computer system updating with it is stable
Property.
In the present embodiment, verify whether image file passes through at scheduled digital signature first before upgrading chip firmware
Reason will perform the next step verification (that is: checkmark) if it is (that is: can successful decryption);If not (that is: cannot succeeding
Decryption or image file are handled without scheduled digital signature), escalation process can be terminated, and user is prompted on the page.
Step S110 can guarantee the safety of the integrality and transmission process of image file.
One between image file and chip to be upgraded can be further verified in the present embodiment, after verifying by the first step
One corresponding relationship.If escalation process will be formally executed by (that is: image file is corresponding with chip to be upgraded), if obstructed
(that is: image file and chip to be upgraded be not corresponding, that is to say, that image file is not for chip to be upgraded) is crossed, it can
To terminate escalation process, and client is prompted on the page.Step S120 guarantees one between image file and chip with upgrading
One corresponding relationship avoids upgrading wrong mirror image due to maloperation, whole system is caused to be collapsed.
The upgrade method of the present embodiment can be, but not limited to using during the online upgrading of switch system;It can also be with
Using in the online upgrading of other computer systems for upgrading chip by BMC.
The upgrade method of the present embodiment can realize the change of escalation policy based on existing chip to be upgraded and BMC,
The increase of hardware cost is not needed to bring.
In a kind of exemplary embodiment, the BMC passes through I2C (Inter-Integrated Circuit, integrated circuit
Bus) receive image file used in by digital signature, upgrading.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file that the BMC is received is by pre-
Fixed digital signature private key encryption.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include:
The corresponding key of used key, decryption obtain the image file when using with cryptographic image file.
In a kind of exemplary embodiment, the chip to be upgraded can be CPLD-FPGA chip.
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is burnt in the FLASH (flash memory) of chip to be upgraded, FLASH is loaded when re-powering
In image file the firmware of chip to be upgraded is upgraded.
It is to be upgraded in the present embodiment using Background mode, it can be only the load of image file used in upgrading
Into the FLASH of chip to be upgraded, upgrades used image file and (be such as but not limited to plug-in source again when re-powering
After line) it is just automatically loaded into the memory device (being such as but not limited to Static RAM) of chip to be upgraded and comes into force, because
This will not influence the normal work of chip;The time re-powered can be determined by user completely.The way of the present embodiment can be with
Upgrading is set not influence the normal work of system.
In a kind of exemplary embodiment, it can be and (be such as but not limited to when receiving user meeting other preset conditions
The specific instruction of input) when, the image file loaded in FLASH is upgraded;When,
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is loaded into the memory device of real work.
In a kind of exemplary embodiment, the BMC verify the image file with whether chip to be upgraded corresponding can
To include:
The unique designation in unique designation and the image file presumptive address in BMC comparison Upgrade process is
It is no consistent;Determine that the image file is corresponding with chip to be upgraded if consistent.
In a kind of exemplary embodiment, the unique designation may include:
The number of PN (Part Number, the Part No.) and chip to be upgraded of board where chip to be upgraded.
In a kind of exemplary embodiment, the presumptive address can be, but not limited to be set to the image file most before
End.
In a kind of exemplary embodiment, the BMC verify the image file with whether chip to be upgraded corresponding can
To be verified otherwise, such as by preset corresponding relationship, check that mark entrained by image file is corresponding
It whether is chip to be upgraded.
Below by taking switch system as an example, illustrate the workflow of BMC upgrading CPLD/FPGA.
Example one, this example introduce the process that BMC carries out twin check.
The first step decrypts to obtain image file using predetermined key;In this example, it may be assumed that carry out the number of image file
Signature check.
What BMC was obtained is that treated, upgrades used image file by digital signature private key.It is first when BMC upgrades
First upgrade used image file using corresponding public key decryptions.If image file integrity breaks are replaced in the transmission
It changes, BMC can not just decrypt digital signature treated image file.Therefore, this verification scheme largely improves liter
Safety in the integrality and transmission process of image file used in grade.
When BMC upgrades CPLD/FPGA, the digital signature of image file is verified according to the above method first, to verify liter
Whether it is maliciously tampered in the integrality and transmission process of image file used in grade.If image file changes, table
Now it can not just stop the upgrading process to CPLD/FPGA at this time by public key decryptions for BMC;Continue to hold if successful decryption
Row next step checking procedure.
Second step, verifies image file and whether chip to be upgraded corresponds to;In this example, it may be assumed that carry out image file
With the verification of the corresponding relationship of chip.
Generate upgrade used in image file when the corresponding CPLD/FPGA chip of addition unique designation (such as
But addition is not limited in presumptive address), and the unique designation of CPLD/FPGA chip to be upgraded, premature cure is into the friendship
In the Upgrade process of the BMC for system of changing planes, when upgrading some CPLD/FPGA chip due to BMC, BMC knows CPLD/ to be upgraded
The unique designation of fpga chip, BMC compare the unique designation in unique designation and image file presumptive address in Upgrade process,
Only the two is completely the same, and BMC just thinks that image file and CPLD/FPGA chip to be upgraded are one-to-one.Due to
CPLD/FPGA is upgraded based on the keyword burning in image file, it may be assumed that comprising in comment section and text in image file
Hold, the two is spaced apart with keyword, only body matter is burnt in chip in upgrading, therefore unique in comment section increase
Mark will not affect that the normal function of image file.
Also by rear, BMC formally executes the upgrading process to corresponding CPLD/FPGA chip for second step verification, otherwise, terminates
Upgrade process.
Above-mentioned presumptive address can be set most to be started in image file, can increase offset ground in burning image file
Location, to ignore the flag bit that image file starts.
Wherein, the format for the unique designation that image file is added can be defined with designed, designed.In this example, for that can know
Specific CPLD/FPGA chip on specific board and board in other switch system, the format design of unique designation are PN+
CPLD/FPGA number, PN can recognize specific board, and CPLD/FPGA number can recognize specific CPLD/FPGA chip, and the two can
Uniquely determine a CPLD/FPGA chip in entire switch system.
Wherein, the unique designation can be encoded using ASCII.
Above-mentioned upgrading mode can use Background mode, that is, only be loaded into memory when burning image file
SRAM (Static Random-Access Memory, static random storage in part FLASH, without being loaded into real work
Device) in, this burning mode loads automatically when next user is inserted into AC, and user can select the load time according to real work,
Therefore, it will not influence normal work.
Example two, the process of this example introduction upgrading.
Step 201, on the basis of the original image file of CPLD/FPGA, image file beginning increase institute it is right
The mark for the CPLD/FPGA chip answered is uploaded to BMC after digital signature is handled, and uses as the formal burning of CPLD/FPGA
Image file;
Step 202, the process based on " digital signature verification for carrying out image file " in example one upgrade CPLD/ in BMC
Increase the calibration link to the digital signature of image file in the process of FPGA;
Step 203, the process based on " verification for carrying out the corresponding relationship of image file and chip " in example one, in BMC
Upgrade the calibration link increased in the process of CPLD/FPGA to the mark in image file;
The process toward SRAM load images file is not executed in step 204, BMC upgrading CPLD/FPGA process, that is, is adopted
Upgraded with Background mode.
Embodiment two, a kind of switch system CPLD/FPGA chip online upgrading method, may be implemented security mechanism.
When switch system upgrades the firmware of CPLD/FPGA chip by the BMC page, verification upgrades used mirror first
As the completeness and efficiency of file;
In a kind of exemplary embodiment, which is only to pass through number by the processed file of digital signature
Word certification could decrypt the image file when holding public key, on the one hand ensure that the integrality of image file, another party in this way
Face ensure that the safety of image file transmission.
Treated although image file ensure that the integrality of file and the safety of transmission for digital signature, but can not protect
The one-to-one correspondence for demonstrate,proving image file and CPLD/FPGA chip, especially when there are the CPLD/FPGA of multiple identical series for system
When chip, the one-to-one correspondence of CPLD/FPGA chip and image file cannot be distinguished.To avoid this problem, the present embodiment exists
The one-to-one relationship of image file itself and CPLD/FPGA chip is added in image file used in upgrading;For this this reality
Example is applied to propose and realize the second verification scheme for adding unique designation in image file.
In the present embodiment, on the one hand the twin check mechanism during online upgrading CPLD/FPGA ensure that burning mirror image
The integrality and transmission security of itself, on the other hand ensure that the one-to-one correspondence of burning mirror image Yu CPLD/FPGA chip.
In a kind of exemplary embodiment, work flow diagram such as Fig. 2 institute of the CPLD/FPGA online upgrading of switch system
Show, including step 31-38:
31, BMC executes the burning process of upgrading.
32, BMC verification upgrades the integrality of used image file, transmission security.
33, judge whether verification passes through, carry out step 34 if passing through;If terminating burning process if.
34, verification upgrades the unique designation carried in used image file, and is solidificated in Upgrade process in advance
Unique designation.
35, judge whether two unique designations match, carry out allowing to execute burning process if matching, carry out step
36;Burning process is terminated if mismatching.
36, burning is executed.
37, judge whether burning success, terminate if success;Step 38 is carried out if without burning success.
38, judge whether to continue to upgrade, the return step 31 if continuing terminates if not continuing.
Embodiment three, a kind of baseboard management controller, as shown in Figure 3, comprising: processor 41 and memory 42;
The memory 42 is used to save the program for upgrading;The processor 41 is used for upgrading described in being used to read
Program, and proceed as follows:
After receiving image file used in by digital signature, upgrading, decrypt to obtain institute using scheduled key
State image file;
It is whether corresponding with chip to be upgraded to verify the image file;The image file, is treated when corresponding
The firmware of the chip of upgrading is upgraded.
In a kind of exemplary embodiment, it is described decrypt to obtain the image file using scheduled key may include:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file received be through
Cross scheduled digital signature private key encryption.
In a kind of exemplary embodiment, the firmware to chip to be upgraded carries out upgrading and may include:
The image file is burnt in the flash memory of chip to be upgraded, the mirror image in flash memory is loaded when re-powering
File upgrades the firmware of chip to be upgraded.
In a kind of exemplary embodiment, the verification image file with whether chip to be upgraded corresponding can wrap
It includes:
It compares the unique designation in Upgrade process and whether the unique designation in the image file presumptive address is consistent;
Determine that the image file is corresponding with chip to be upgraded if consistent.
In a kind of exemplary embodiment, the unique designation may include:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
It is other to realize that details be with reference to embodiment above.
It will appreciated by the skilled person that whole or certain steps, system, dress in method disclosed hereinabove
Functional module/unit in setting may be implemented as software, firmware, hardware and its combination appropriate.In hardware embodiment,
Division between the functional module/unit referred in the above description not necessarily corresponds to the division of physical assemblies;For example, one
Physical assemblies can have multiple functions or a function or step and can be executed by several physical assemblies cooperations.Certain groups
Part or all components may be implemented as by processor, such as the software that digital signal processor or microprocessor execute, or by
It is embodied as hardware, or is implemented as integrated circuit, such as specific integrated circuit.Such software can be distributed in computer-readable
On medium, computer-readable medium may include computer storage medium (or non-transitory medium) and communication media (or temporarily
Property medium).As known to a person of ordinary skill in the art, term computer storage medium is included in for storing information (such as
Computer readable instructions, data structure, program module or other data) any method or technique in the volatibility implemented and non-
Volatibility, removable and nonremovable medium.Computer storage medium include but is not limited to RAM, ROM, EEPROM, flash memory or its
His memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storages, magnetic holder, tape, disk storage or other
Magnetic memory apparatus or any other medium that can be used for storing desired information and can be accessed by a computer.This
Outside, known to a person of ordinary skill in the art to be, communication media generally comprises computer readable instructions, data structure, program mould
Other data in the modulated data signal of block or such as carrier wave or other transmission mechanisms etc, and may include any information
Delivery media.
Claims (10)
1. a kind of upgrade method characterized by comprising
Baseboard management controller BMC is after receiving image file used in by digital signature, upgrading, using scheduled close
Key is decrypted to obtain the image file;
Whether the BMC verifies the image file corresponding with chip to be upgraded;The image file, right when corresponding
The firmware of chip to be upgraded is upgraded.
2. upgrade method as described in claim 1, which is characterized in that described to decrypt to obtain the mirror image using scheduled key
File includes:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file that the BMC is received be through
Cross scheduled digital signature private key encryption.
3. upgrade method as described in claim 1, which is characterized in that the firmware to chip to be upgraded carries out upgrade package
It includes:
The image file is burnt in the flash memory of chip to be upgraded, the image file in flash memory is loaded when re-powering
The firmware of chip to be upgraded is upgraded.
4. upgrade method as described in claim 1, which is characterized in that the BMC verifies the image file and to be upgraded
Whether chip corresponds to
The unique designation in unique designation and the image file presumptive address in BMC comparison Upgrade process whether one
It causes;Determine that the image file is corresponding with chip to be upgraded if consistent.
5. upgrade method as claimed in claim 4, which is characterized in that the unique designation includes:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
6. a kind of baseboard management controller, comprising: processor and memory;
It is characterized by:
The memory is used to save the program for upgrading;The processor is used to read the program for upgrading, and
It proceeds as follows:
After receiving image file used in by digital signature, upgrading, decrypt to obtain the mirror using scheduled key
As file;
It is whether corresponding with chip to be upgraded to verify the image file;Image file when corresponding, to be upgraded
The firmware of chip upgraded.
7. baseboard management controller as claimed in claim 6, which is characterized in that described to decrypt to obtain institute using scheduled key
Stating image file includes:
The image file is obtained using scheduled digital signature public key decryptions;Wherein, the image file received is by pre-
Fixed digital signature private key encryption.
8. baseboard management controller as claimed in claim 6, which is characterized in that the firmware to chip to be upgraded carries out
Upgrading includes:
The image file is burnt in the flash memory of chip to be upgraded, the image file in flash memory is loaded when re-powering
The firmware of chip to be upgraded is upgraded.
9. baseboard management controller as claimed in claim 6, which is characterized in that the verification image file with it is to be upgraded
Chip whether correspond to and include:
It compares the unique designation in Upgrade process and whether the unique designation in the image file presumptive address is consistent;If
It is consistent then determine that the image file is corresponding with chip to be upgraded.
10. baseboard management controller as claimed in claim 9, which is characterized in that the unique designation includes:
The Part No. of board and the number of chip to be upgraded where chip to be upgraded.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910631406.2A CN110502250A (en) | 2019-07-12 | 2019-07-12 | A kind of upgrade method and baseboard management controller |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910631406.2A CN110502250A (en) | 2019-07-12 | 2019-07-12 | A kind of upgrade method and baseboard management controller |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110502250A true CN110502250A (en) | 2019-11-26 |
Family
ID=68585397
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910631406.2A Withdrawn CN110502250A (en) | 2019-07-12 | 2019-07-12 | A kind of upgrade method and baseboard management controller |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110502250A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417422A (en) * | 2020-11-23 | 2021-02-26 | 深圳市中易通安全芯科技有限公司 | Security chip upgrading method and computer readable storage medium |
CN112463184A (en) * | 2020-11-06 | 2021-03-09 | 苏州浪潮智能科技有限公司 | Method and system for safely upgrading firmware of baseboard management controller |
CN113485754A (en) * | 2021-06-22 | 2021-10-08 | 新华三半导体技术有限公司 | Chip starting method and device and electronic equipment |
CN114115955A (en) * | 2021-10-19 | 2022-03-01 | 苏州浪潮智能科技有限公司 | Method, system, terminal and storage medium for upgrading server resource box FPGA firmware |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103942075A (en) * | 2014-04-09 | 2014-07-23 | 苏州汇川技术有限公司 | System and method for programming elevator controller firmware |
CN106228091A (en) * | 2016-07-14 | 2016-12-14 | 昆山百敖电子科技有限公司 | A kind of safe firmware validation update method |
CN107256168A (en) * | 2017-06-12 | 2017-10-17 | 郑州云海信息技术有限公司 | A kind of design method of UEFI BIOS safety upgrade mechanism |
CN108306959A (en) * | 2018-01-29 | 2018-07-20 | 郑州云海信息技术有限公司 | A kind of method, apparatus and storage medium of remote upgrade CPLD firmwares |
-
2019
- 2019-07-12 CN CN201910631406.2A patent/CN110502250A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103942075A (en) * | 2014-04-09 | 2014-07-23 | 苏州汇川技术有限公司 | System and method for programming elevator controller firmware |
CN106228091A (en) * | 2016-07-14 | 2016-12-14 | 昆山百敖电子科技有限公司 | A kind of safe firmware validation update method |
CN107256168A (en) * | 2017-06-12 | 2017-10-17 | 郑州云海信息技术有限公司 | A kind of design method of UEFI BIOS safety upgrade mechanism |
CN108306959A (en) * | 2018-01-29 | 2018-07-20 | 郑州云海信息技术有限公司 | A kind of method, apparatus and storage medium of remote upgrade CPLD firmwares |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112463184A (en) * | 2020-11-06 | 2021-03-09 | 苏州浪潮智能科技有限公司 | Method and system for safely upgrading firmware of baseboard management controller |
CN112417422A (en) * | 2020-11-23 | 2021-02-26 | 深圳市中易通安全芯科技有限公司 | Security chip upgrading method and computer readable storage medium |
CN113485754A (en) * | 2021-06-22 | 2021-10-08 | 新华三半导体技术有限公司 | Chip starting method and device and electronic equipment |
CN114115955A (en) * | 2021-10-19 | 2022-03-01 | 苏州浪潮智能科技有限公司 | Method, system, terminal and storage medium for upgrading server resource box FPGA firmware |
CN114115955B (en) * | 2021-10-19 | 2024-04-12 | 苏州浪潮智能科技有限公司 | Method, system, terminal and storage medium for upgrading FPGA firmware of server resource box |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110502250A (en) | A kind of upgrade method and baseboard management controller | |
CN102981881B (en) | A kind of method and system for preventing updating mobile terminal to illegal firmware version | |
EP3258372A1 (en) | Burning method and burning system | |
CN109923518B (en) | Software update mechanism for safety critical systems | |
US10778447B2 (en) | Method and system for safely switching between product mode and development mode of terminal | |
CN108701191B (en) | Data processing device and method for verifying the integrity of a data processing device | |
CN104951701B (en) | A kind of method of the terminal device booting operating system based on USB controller | |
EP2958017A1 (en) | Computerized systems and methods for installing upgraded software on electronic devices | |
US10726130B2 (en) | Method and device for verifying upgrade of diagnosis connector of diagnostic equipment, and diagnosis connector | |
CN109714303A (en) | BIOS starts method and data processing method | |
CN109976767B (en) | Software burning method and device | |
JP7347895B2 (en) | Hardware detection methods and apparatus, devices, and storage media | |
CN103995723A (en) | IVI system firmware updating method and device based on mobile storage equipment | |
KR101430861B1 (en) | Security information sharing system and execution method thereof | |
CN107170470A (en) | A kind of CD-ROM drive and imprinting, read method with hardware encrypting | |
CN114048484A (en) | Method and device for measuring credibility of multi-path server and computer equipment | |
WO2020001111A1 (en) | Signature verification method for downloading firmware, firmware release method, mobile terminal and server | |
CN107943530A (en) | USB interface-based unmanned boat system automatically updating method | |
CN110716732B (en) | Device and method for upgrading UI and firmware programs of automobile instrument | |
CN107704756B (en) | Security verification method and system before system upgrade | |
CN107026741A (en) | Method and device is write with a brush dipped in Chinese ink in a kind of encryption based on network security | |
US20170075608A1 (en) | Solid state memory unit and method for protecting a memory including verification of a sequence of requests for access to physical blocks | |
CN111783120A (en) | Data interaction method, computing device, BMC chip and electronic device | |
CN115688120A (en) | Secure chip firmware importing method, secure chip and computer readable storage medium | |
CN116204211A (en) | Information processing method, device, equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20191126 |