CN111291427A - Server hard disk security measurement method and device - Google Patents
Server hard disk security measurement method and device Download PDFInfo
- Publication number
- CN111291427A CN111291427A CN202010084838.9A CN202010084838A CN111291427A CN 111291427 A CN111291427 A CN 111291427A CN 202010084838 A CN202010084838 A CN 202010084838A CN 111291427 A CN111291427 A CN 111291427A
- Authority
- CN
- China
- Prior art keywords
- server
- hard disk
- bios
- identification information
- response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/327—Alarm or error message display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Quality & Reliability (AREA)
- Debugging And Monitoring (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides a server hard disk security measurement method and a device, wherein the method comprises the following steps: pre-storing identification information of a related hard disk in a server in a trusted chip; responding to the startup and power-on of the server, the BIOS acquires the identification information of the hard disk and compares the acquired identification information with prestored identification information; in response to a failure to compare, the BIOS controls the server to abort boot and/or issue an alert. The invention can ensure that the hard disk on the computer can be alarmed in time after being replaced, and has good popularization and use values in the security field.
Description
Technical Field
The present invention relates to the field of computers, and more particularly, to a server hard disk security measurement method and apparatus.
Background
With the continuous development of information technology, the problem of information security is becoming more and more prominent, and how to ensure the security of information systems has become a focus of much attention in society. At present, the demand for protecting the hard disk data on the computer is increasingly wide, and no hard disk data protection method which is widely applied, simple and effective is available on the market. Under the condition, personal office computers in the security field are easy to steal important data in the hard disk by lawless persons in a mode of replacing the hard disk.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method and an apparatus for server-based hard disk security measurement, so as to notify a user in time when a server hard disk changes, so as to ensure user information security.
Based on the above object, an aspect of the embodiments of the present invention provides a server hard disk security measurement method, including the following steps:
pre-storing identification information of a related hard disk in a server in a trusted chip;
responding to the startup and power-on of the server, the BIOS acquires the identification information of the hard disk and compares the acquired identification information with prestored identification information;
in response to a failure to compare, the BIOS controls the server to abort boot and/or issue an alert.
In some embodiments, the identification information includes a model number, a serial number, a universally unique identifier, a global identifier, a path number, and other strings of specific significance.
In some embodiments, the pre-storing, in the trusted chip, the identification information of the relevant hard disk in the server includes:
and generating a mapping table by the serial numbers of the related hard disks in the server and the corresponding hard disk models, and pre-storing the mapping table in a trusted chip.
In some embodiments, in response to the server being powered on, the BIOS acquires identification information of the hard disk, and comparing the acquired identification information with pre-stored identification information includes:
responding to the power-on of the server, the BIOS acquires the model of the hard disk and compares the model with the mapping table;
and responding to the successful model comparison, the BIOS acquires the serial number of the hard disk and compares the serial number with the mapping table.
In some embodiments, in response to a comparison failure, the BIOS controlling the server to abort boot-up and/or raise an alarm comprises:
in response to the serial number comparison failing, the BIOS controls the server to continue to start but simultaneously issues an alarm.
In some embodiments, in response to a comparison failure, the BIOS controlling the server to abort boot-up and/or raise an alarm further comprises:
and responding to the failure of the model comparison, the BIOS directly controls the server to suspend starting and gives an alarm.
In some embodiments, in response to a comparison failure, the BIOS controlling the server to abort boot-up and/or raise an alarm further comprises:
and responding to the successful comparison of the serial numbers, and controlling the server to normally start by the BIOS.
In some embodiments, in response to a comparison failure, the BIOS alerts via an indicator light, buzzer, and/or Web management interface.
In some embodiments, in response to the model comparison being successful, the obtaining, by the BIOS, a serial number of the hard disk and comparing the serial number to the mapping table includes:
and correspondingly traversing all serial numbers corresponding to the models into the mapping table according to the models to find whether the serial numbers read by the BIOS exist.
Another aspect of the embodiments of the present invention provides a server hard disk security measurement apparatus, including:
at least one processor; and
a memory storing program code executable by the processor, the program code implementing the method of any of the above when executed by the processor.
The invention has the following beneficial technical effects: the server hard disk security measurement method and device provided by the embodiment of the invention realize the function of measuring the model number and the serial number of the hard disk, ensure that the hard disk on a computer is alarmed in time after being replaced, and have good popularization and use values in the security field.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a flow chart of a server hard disk security measure method according to the present invention;
FIG. 2 is a flowchart illustrating a server boot process according to an embodiment of the invention;
fig. 3 is a schematic diagram of a hardware structure of a server hard disk security measurement apparatus according to the present invention.
Detailed Description
Embodiments of the present invention are described below. However, it is to be understood that the disclosed embodiments are merely examples and that other embodiments may take various and alternative forms. The figures are not necessarily to scale; certain features may be exaggerated or minimized to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention. As one of ordinary skill in the art will appreciate, various features illustrated and described with reference to any one of the figures may be combined with features illustrated in one or more other figures to produce embodiments that are not explicitly illustrated or described. The combination of features shown provides a representative embodiment for a typical application. However, various combinations and modifications of the features consistent with the teachings of the present invention may be desired for certain specific applications or implementations.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
Based on the above object, an aspect of the embodiments of the present invention provides a server hard disk security measurement method, as shown in fig. 1, including the following steps:
step S101: pre-storing identification information of a related hard disk in a server in a trusted chip;
step S102: responding to the startup and power-on of the server, the BIOS acquires the identification information of the hard disk and compares the acquired identification information with prestored identification information;
step S103: in response to a failure to compare, the BIOS controls the server to abort boot and/or issue an alert.
In some embodiments, the identification information includes a model number, a serial number, a universally unique identifier, a global identifier, a path number, and other strings of specific significance, among others.
In some embodiments, the hard disk has a factory serial number, the serial number of the hard disk is pre-stored in the motherboard trusted chip, after the power-on key is pressed, the BIOS is first started, the serial number a of the hard disk pre-stored in the trusted chip is called first, then the serial number B in the hard disk is called, and the serial number a and the serial number B are subjected to measurement and verification. When the hard disk serial number in the storage chip on the computer mainboard is not corresponding to the actual hard disk serial number, for example, the mainboard BIOS may control the computer to stop starting, for example, a buzzer prompt to alarm and shut down, and when the hard disk serial number in the storage chip on the computer mainboard is the same as the actual hard disk serial number, the mainboard BIOS controls the computer to normally start.
In some embodiments, the pre-storing, in the trusted chip, the identification information of the relevant hard disk in the server includes: serial numbers of related hard disks in the server and hard disk model generation mapping tables corresponding to the serial numbers are prestored in the trusted chip, as shown in fig. 2.
In some embodiments, in response to the server being powered on, the BIOS acquires the identification information of the hard disk, and comparing the acquired identification information with pre-stored identification information includes: responding to the power-on of the server, the BIOS acquires the model of the hard disk and compares the model with the mapping table; and responding to the successful model comparison, the BIOS acquires the serial number of the hard disk and compares the serial number with the mapping table.
In some embodiments, in response to a comparison failure, the BIOS controlling the server to abort boot-up and/or raise an alarm comprises: in response to the serial number comparison failing, the BIOS controls the server to continue to start but simultaneously issues an alarm.
In some embodiments, in response to a comparison failure, the BIOS controlling the server to abort boot-up and/or raise an alarm further comprises: and responding to the failure of the model comparison, the BIOS directly controls the server to suspend starting and gives an alarm.
In some embodiments, in response to a comparison failure, the BIOS controlling the server to abort boot-up and/or raise an alarm further comprises: and responding to the successful comparison of the serial numbers, and controlling the server to normally start by the BIOS.
In some embodiments, in response to a comparison failure, the BIOS alerts via an indicator light, buzzer, and/or Web management interface, among others.
In some embodiments, in response to the model comparison being successful, the obtaining, by the BIOS, a serial number of the hard disk and comparing the serial number to the mapping table includes: and correspondingly traversing all serial numbers corresponding to the models into the mapping table according to the models to find whether the serial numbers read by the BIOS exist.
The invention adds the function of binding identification information (such as serial number) on the basis of the original general computer hard disk using mechanism, so that the server designed according to the invention can be used as a server in a special safety field to ensure that the hard disk of a user computer is not replaced.
Where technically feasible, the technical features listed above for the different embodiments may be combined with each other or changed, added, omitted, etc. to form further embodiments within the scope of the invention.
It can be seen from the above embodiments that the server hard disk security measurement method provided by the embodiments of the present invention implements the function of measuring the model number and the serial number of the hard disk, ensures that the hard disk on the computer is timely alarmed after being replaced, and has a good popularization and use value in the security field.
In view of the foregoing, in another aspect of the embodiments of the present invention, an embodiment of a server hard disk security measurement apparatus is provided.
The server hard disk security measurement device comprises a memory and at least one processor, wherein the memory stores a computer program capable of running on the processor, and the processor executes the computer program to execute any one of the methods.
Fig. 3 is a schematic diagram of a hardware structure of an embodiment of the server-based hard disk security measurement apparatus according to the present invention.
Taking the computer device shown in fig. 3 as an example, the computer device includes a processor 301 and a memory 302, and may further include: an input device 303 and an output device 304.
The processor 301, the memory 302, the input device 303 and the output device 304 may be connected by a bus or other means, and fig. 3 illustrates the connection by a bus as an example.
The memory 302 is a non-volatile computer-readable storage medium, and can be used for storing non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the server hard disk security measure method in the embodiment of the present application. The processor 301 executes various functional applications and data processing of the server by running nonvolatile software programs, instructions and modules stored in the memory 302, that is, implements the server hard disk security measure method of the above method embodiment.
The memory 302 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the server hard disk security measure method, and the like. Further, the memory 302 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 302 optionally includes memory located remotely from processor 301, which may be connected to a local module via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 303 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the computer apparatus of the server hard disk security measure method. The output means 304 may comprise a display device such as a display screen.
Program instructions/modules corresponding to the one or more server hard disk security measures are stored in the memory 302 and, when executed by the processor 301, perform the server hard disk security measures of any of the above-described method embodiments.
Any embodiment of the computer device executing the server hard disk security measurement method can achieve the same or similar effects as any corresponding method embodiment.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes in the methods of the above embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like.
In addition, the apparatuses, devices and the like disclosed in the embodiments of the present invention may be various electronic terminal devices, such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer (PAD), a smart television and the like, or may be a large terminal device, such as a server and the like, and therefore the scope of protection disclosed in the embodiments of the present invention should not be limited to a specific type of apparatus, device. The client disclosed in the embodiment of the present invention may be applied to any one of the above electronic terminal devices in the form of electronic hardware, computer software, or a combination of both.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM is available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions described herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk, an optical disk, or the like.
The above-described embodiments are possible examples of implementations and are presented merely for a clear understanding of the principles of the invention. Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of an embodiment of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.
Claims (10)
1. A server hard disk security measurement method is characterized by comprising the following steps:
pre-storing identification information of a related hard disk in a server in a trusted chip;
responding to the startup and power-on of the server, the BIOS acquires the identification information of the hard disk and compares the acquired identification information with prestored identification information;
in response to a failure to compare, the BIOS controls the server to abort boot and/or issue an alert.
2. The method of claim 1, wherein the identification information includes a model number, a serial number, a universally unique identifier, a global identifier, a path number, and other strings of specific significance.
3. The method of claim 1, wherein pre-storing identification information of the relevant hard disk in the server in the trusted chip comprises:
and generating a mapping table by the serial numbers of the related hard disks in the server and the corresponding hard disk models, and pre-storing the mapping table in a trusted chip.
4. The method of claim 3, wherein in response to the server being powered on, the BIOS obtaining identification information of the hard disk and comparing the obtained identification information with pre-stored identification information comprises:
responding to the power-on of the server, the BIOS acquires the model of the hard disk and compares the model with the mapping table;
and responding to the successful model comparison, the BIOS acquires the serial number of the hard disk and compares the serial number with the mapping table.
5. The method of claim 4, wherein in response to a failure to compare, the BIOS controlling the server to abort boot-up and/or raise an alarm comprises:
in response to the serial number comparison failing, the BIOS controls the server to continue to start but simultaneously issues an alarm.
6. The method of claim 5, wherein in response to a failure to compare, the BIOS controlling the server to abort boot-up and/or raise an alarm further comprises:
and responding to the failure of the model comparison, the BIOS directly controls the server to suspend starting and gives an alarm.
7. The method of claim 6, wherein in response to a failure to compare, the BIOS controlling the server to abort boot-up and/or raise an alarm further comprises:
and responding to the successful comparison of the serial numbers, and controlling the server to normally start by the BIOS.
8. The method of claim 1, wherein the BIOS alerts via an indicator light, buzzer, and/or Web management interface in response to a comparison failure.
9. The method of claim 4, wherein in response to the model comparison being successful, the BIOS obtaining a serial number of the hard disk and comparing the serial number to the mapping table comprises:
and correspondingly traversing all serial numbers corresponding to the models into the mapping table according to the models to find whether the serial numbers read by the BIOS exist.
10. A server hard disk security measurement device, comprising:
at least one processor; and
a memory storing program code executable by a processor, the program code implementing the method of claims 1-9 when executed by the processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010084838.9A CN111291427A (en) | 2020-02-10 | 2020-02-10 | Server hard disk security measurement method and device |
PCT/CN2020/098536 WO2021159653A1 (en) | 2020-02-10 | 2020-06-28 | Method and apparatus for measuring security of hard disk of server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010084838.9A CN111291427A (en) | 2020-02-10 | 2020-02-10 | Server hard disk security measurement method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111291427A true CN111291427A (en) | 2020-06-16 |
Family
ID=71024540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010084838.9A Pending CN111291427A (en) | 2020-02-10 | 2020-02-10 | Server hard disk security measurement method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111291427A (en) |
WO (1) | WO2021159653A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112613082A (en) * | 2020-12-18 | 2021-04-06 | 超越科技股份有限公司 | Hard disk ID measurement method based on microcontroller |
WO2021159653A1 (en) * | 2020-02-10 | 2021-08-19 | 山东超越数控电子股份有限公司 | Method and apparatus for measuring security of hard disk of server |
CN113890818A (en) * | 2021-09-28 | 2022-01-04 | 广州超云科技有限公司 | Equipment replacement alarm method, device, equipment and medium in server |
CN115424641A (en) * | 2022-08-22 | 2022-12-02 | 西安超越申泰信息科技有限公司 | Alarm device and method for preventing replacement of computer hard disk |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109214187A (en) * | 2017-06-29 | 2019-01-15 | 龙芯中科技术有限公司 | A kind of method, apparatus and electronic equipment controlling computer starting |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5582909B2 (en) * | 2010-07-29 | 2014-09-03 | キヤノン株式会社 | Platform integrity verification system |
CN107451024A (en) * | 2017-09-07 | 2017-12-08 | 大唐高鸿信安(浙江)信息科技有限公司 | The credible measure of hardware realized based on BMC chip |
CN108197477A (en) * | 2017-12-29 | 2018-06-22 | 山东超越数控电子股份有限公司 | A kind of method prevented hard disk and replaced |
CN111291427A (en) * | 2020-02-10 | 2020-06-16 | 山东超越数控电子股份有限公司 | Server hard disk security measurement method and device |
-
2020
- 2020-02-10 CN CN202010084838.9A patent/CN111291427A/en active Pending
- 2020-06-28 WO PCT/CN2020/098536 patent/WO2021159653A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109214187A (en) * | 2017-06-29 | 2019-01-15 | 龙芯中科技术有限公司 | A kind of method, apparatus and electronic equipment controlling computer starting |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021159653A1 (en) * | 2020-02-10 | 2021-08-19 | 山东超越数控电子股份有限公司 | Method and apparatus for measuring security of hard disk of server |
CN112613082A (en) * | 2020-12-18 | 2021-04-06 | 超越科技股份有限公司 | Hard disk ID measurement method based on microcontroller |
CN113890818A (en) * | 2021-09-28 | 2022-01-04 | 广州超云科技有限公司 | Equipment replacement alarm method, device, equipment and medium in server |
CN115424641A (en) * | 2022-08-22 | 2022-12-02 | 西安超越申泰信息科技有限公司 | Alarm device and method for preventing replacement of computer hard disk |
Also Published As
Publication number | Publication date |
---|---|
WO2021159653A1 (en) | 2021-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111291427A (en) | Server hard disk security measurement method and device | |
CN111030822B (en) | Method and system for protecting firmware, and computer readable medium | |
US8250630B2 (en) | Detecting unauthorized computer access | |
TW201337580A (en) | Techniques to apply and share remote policies on mobile devices | |
US20130174250A1 (en) | Electronic device and method for restricting access to the electronic device utilizing bios password | |
US20140006789A1 (en) | Devices, systems, and methods for monitoring and asserting trust level using persistent trust log | |
JP2015036847A (en) | Semiconductor device | |
CN111176701A (en) | Firmware upgrading method and device based on external memory card | |
WO2018000843A1 (en) | Mobile payment method, system on chip and terminal | |
US11544412B2 (en) | Protection against unintended content change in DRAM during standby mode | |
CN111338997B (en) | Method, device, equipment and medium for ARM server BIOS supporting TCM communication | |
US20160224404A1 (en) | Selective block-based integrity protection techniques | |
CN111339502A (en) | Starting method, system, equipment and medium for kernel in FPGA | |
CN111709033A (en) | Method, system, device and medium for safely starting server based on PUF | |
CN111209606A (en) | Method, device and equipment for early warning of hard disk change behind RAID card | |
US20230198775A1 (en) | Memory device with secure boot updates and self-recovery | |
CN110929263A (en) | Remote management method and equipment based on active measurement | |
CN109033848B (en) | Method and system for safely operating stored data | |
CN111856257B (en) | Method, system, equipment and medium for detecting and protecting CPLD (complex programmable logic device) firmware | |
US12067121B2 (en) | Trusted boot method and apparatus, electronic device, and readable storage medium | |
CN111176666B (en) | BIOS + ME mirror image refreshing method, system, equipment and readable medium | |
US11507667B2 (en) | Firmware password management | |
CN111142956B (en) | Method, system, device and medium for modifying maximum effective load value | |
CN110659035A (en) | Method and device for batch mounting of mirror images based on BMC | |
CN110781527B (en) | Control register protection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200616 |
|
RJ01 | Rejection of invention patent application after publication |