CN111367585A - BMC configuration method, device, equipment and medium - Google Patents

BMC configuration method, device, equipment and medium Download PDF

Info

Publication number
CN111367585A
CN111367585A CN202010176099.6A CN202010176099A CN111367585A CN 111367585 A CN111367585 A CN 111367585A CN 202010176099 A CN202010176099 A CN 202010176099A CN 111367585 A CN111367585 A CN 111367585A
Authority
CN
China
Prior art keywords
configuration file
bmc
configuration
management controller
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010176099.6A
Other languages
Chinese (zh)
Inventor
张秀波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202010176099.6A priority Critical patent/CN111367585A/en
Publication of CN111367585A publication Critical patent/CN111367585A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses a BMC configuration method, device, equipment and medium, comprising: acquiring a configuration file corresponding to a lower management controller BMC sent by a user terminal; the configuration file comprises server model identification information; and issuing configuration updating notification information corresponding to the configuration file to the lower management controller BMC so that the lower management controller BMC can acquire the configuration file from the upper management controller when the lower management controller BMC is idle, then checking the server machine type identification information, and if the server machine type identification information passes the checking, performing configuration validation by using the configuration file. Therefore, the configuration file is acquired, the configuration updating notification information is issued to the BMC, the BMC acquires the configuration file when the BMC is idle, then the server type identification information is verified, if the verification is passed, the configuration file is used for configuration validation, the BMC service is not affected by configuration updating and the adaptability of the configuration file can be guaranteed, and therefore the server performance is improved.

Description

BMC configuration method, device, equipment and medium
Technical Field
The present application relates to the field of server technologies, and in particular, to a method, an apparatus, a device, and a medium for configuring a BMC.
Background
As the computing demands of users on computers increase, the types of devices are being developed more and more. More and more scenes of two-level Management units appear, when configuration modification needs to be performed on a lower-level Management unit BMC, a user can only access a higher-level Management unit SMC (system Management Controller), so that the configuration modification needs to be transmitted to the SMC, and the SMC is transmitted to the BMC (base Management Controller).
At present, most of technical schemes are that an SMC forcibly sends a configuration file to a BMC, and the BMC performs forced validation. However, if the BMC is currently executing an important task, the enforcement of the configuration file affects the execution of the important task, and there may be a problem that the configuration file is not compatible with the BMC.
Disclosure of Invention
In view of this, an object of the present application is to provide a BMC configuration method, apparatus, device and medium, which can ensure that a BMC service is not affected by configuration update and the adaptability of a configuration file, thereby improving the performance of a server. The specific scheme is as follows:
in a first aspect, the present application discloses a BMC configuration method applied to a superior management controller, including:
acquiring a configuration file corresponding to a lower management controller BMC sent by a user terminal; the configuration file comprises server model identification information;
and issuing configuration updating notification information corresponding to the configuration file to the lower management controller BMC so that the lower management controller BMC can acquire the configuration file from the upper management controller when the lower management controller BMC is idle, then checking the server machine type identification information, and if the server machine type identification information passes the checking, using the configuration file to carry out configuration validation.
Optionally, after obtaining the configuration file corresponding to the lower management controller BMC sent by the user terminal, the method further includes:
and encrypting the configuration file by using a preset encryption algorithm to obtain an encrypted configuration file, so that the lower management controller BMC decrypts the encrypted configuration file by using a preset decryption algorithm after obtaining the encrypted configuration file, then verifies the identification information of the server machine type, and if the identification information of the server machine type passes the verification, the configuration is validated by using the decrypted configuration file.
Optionally, the obtaining of the configuration file corresponding to the lower management controller BMC sent by the user terminal includes:
and acquiring a configuration file corresponding to a lower management controller BMC sent by the user terminal through a Redfish interface.
Optionally, after obtaining the configuration file corresponding to the lower management controller BMC sent by the user terminal, the method further includes:
and compressing the configuration file to obtain a compressed configuration file.
In a second aspect, the present application discloses a BMC configuration method applied to a lower management controller BMC, including:
acquiring configuration update notification information corresponding to the configuration file; the configuration file is a configuration file sent by a user terminal and acquired by a superior management controller, and the configuration file comprises server machine type identification information;
and acquiring the configuration file from the superior management controller when the device is idle, then verifying the identification information of the server machine type, and if the identification information of the server machine type passes the verification, performing configuration validation by using the configuration file.
Optionally, after the obtaining the configuration file from the upper management controller when the host is idle, the method further includes:
decrypting the encrypted configuration file by using a preset decryption algorithm; the encrypted configuration file is obtained by encrypting the configuration file sent by the user terminal by the superior management controller by using a preset encryption algorithm.
Optionally, the obtaining the configuration file from the upper management controller when the host is idle includes:
and acquiring the configuration file from the superior management controller by utilizing a Redfish interface when the Redfish interface is idle.
In a third aspect, the present application discloses a BMC configuration device applied to a superior management controller, including:
the configuration file acquisition module is used for acquiring a configuration file corresponding to a lower management controller BMC sent by a user terminal; the configuration file comprises server model identification information;
and the configuration update notification module is used for issuing configuration update notification information corresponding to the configuration file to the lower management controller BMC so that the lower management controller BMC can acquire the configuration file from a higher management controller when the lower management controller BMC is idle, then checking the identification information of the server machine type, and if the identification information of the server machine type passes the checking, the configuration file is used for configuration validation.
In a fourth aspect, the present application discloses a BMC configuration device comprising a processor and a memory; wherein the content of the first and second substances,
the memory is used for storing a computer program;
the processor is configured to execute the computer program to implement the BMC configuration method.
In a fifth aspect, the present application discloses a computer readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the BMC configuration method as described above.
Therefore, the configuration file corresponding to the lower management controller BMC sent by the user terminal is obtained firstly; the configuration file comprises server machine type identification information, then configuration updating notification information corresponding to the configuration file is issued to the lower management controller BMC, so that the lower management controller BMC can acquire the configuration file from an upper management controller when the lower management controller BMC is idle, then the server machine type identification information is verified, and if the server machine type identification information passes the verification, configuration is carried out by using the configuration file to be effective. Therefore, the configuration file comprising the server model identification information is obtained, the corresponding configuration updating notification information is sent to the lower management controller BMC, the lower management controller BMC obtains the configuration file when the lower management controller BMC is idle, the server model identification information is verified, if the lower management controller BMC passes the verification, the configuration is used for configuration validation, the BMC service is not affected by configuration updating and the adaptability of the configuration file can be guaranteed, and therefore the server performance is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of a BMC configuration method disclosed herein;
FIG. 2 is a flow chart of a specific BMC configuration method disclosed herein;
FIG. 3 is a flow chart of a specific BMC configuration method disclosed herein;
FIG. 4 is a flow chart of a BMC configuration method disclosed herein;
FIG. 5 is a schematic structural diagram of a BMC configuration device disclosed in the present application;
fig. 6 is a block diagram of a BMC configuration device disclosed in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As the computing demands of users on computers increase, the types of devices are being developed more and more. More and more scenes of two-level management units appear, when the configuration modification of the lower management unit BMC is needed, a user can only access the upper management unit SMC, so the configuration modification needs to be transmitted to the SMC, and the SMC is transmitted to the BMC. At present, most of technical schemes are that an SMC forcibly sends a configuration file to a BMC, and the BMC performs forced validation. However, if the BMC is currently executing an important task, the enforcement of the configuration file affects the execution of the important task, and there may be a problem that the configuration file is not compatible with the BMC. Therefore, the BMC configuration scheme is provided, the BMC service is not affected by configuration updating and the adaptability of the configuration file can be guaranteed, and therefore the performance of the server is improved.
Referring to fig. 1, an embodiment of the present application discloses a BMC configuration method applied to an upper management controller, including:
step S11: acquiring a configuration file corresponding to a lower management controller BMC sent by a user terminal; wherein the configuration file comprises server model identification information.
In a specific implementation manner, in this embodiment, a configuration file corresponding to a lower management controller BMC sent by a user terminal may be acquired through a Redfish interface.
Wherein, the upper management controller may be an SMC.
Step S12: and issuing configuration updating notification information corresponding to the configuration file to the lower management controller BMC so that the lower management controller BMC can acquire the configuration file from the upper management controller when the lower management controller BMC is idle, then checking the server machine type identification information, and if the server machine type identification information passes the checking, using the configuration file to carry out configuration validation.
In addition, in order to improve transmission efficiency, in this embodiment, after the configuration file corresponding to the lower management controller BMC sent by the user terminal is acquired, the configuration file may be compressed, so as to obtain a compressed configuration file. Correspondingly, the lower management controller BMC decompresses the compressed configuration file, reads the server model identification information in the configuration file, and verifies the server model identification information, specifically, compares the server model identification information with the server model identification information stored in the lower management controller BMC, if the server model identification information is consistent with the server model identification information stored in the lower management controller BMC, the verification is passed, and the configuration file is used for configuration to take effect.
And the lower management controller BMC captures the configuration file from the upper management controller when the lower management controller BMC is idle by utilizing a Redfish interface. The upper and lower management controllers are connected through a network.
In addition, in a specific embodiment, the present embodiment may implement batch update of the BMC configuration.
For example, referring to fig. 2, an embodiment of the present application discloses a specific BMC configuration method, where a user uploads a configuration file to an SMC, the SMC notifies the BMC that there is an updated configuration file, and the BMC downloads the configuration file to the BMC for configuration when the BMC is idle. Therefore, the configuration update and modification of the BMC are realized, namely, the configuration file is a file including BMC update configuration or a BMC modification configuration file so as to update and modify BMC configuration parameters.
Therefore, in the embodiment of the application, a configuration file corresponding to a lower management controller BMC sent by a user terminal is obtained first; the configuration file comprises server machine type identification information, then configuration updating notification information corresponding to the configuration file is issued to the lower management controller BMC, so that the lower management controller BMC can acquire the configuration file from an upper management controller when the lower management controller BMC is idle, then the server machine type identification information is verified, and if the server machine type identification information passes the verification, configuration is carried out by using the configuration file to be effective. Therefore, the configuration file comprising the server model identification information is obtained, the corresponding configuration updating notification information is sent to the lower management controller BMC, the lower management controller BMC obtains the configuration file when the lower management controller BMC is idle, the server model identification information is verified, if the lower management controller BMC passes the verification, the configuration is used for configuration validation, the BMC service is not affected by configuration updating and the adaptability of the configuration file can be guaranteed, and therefore the server performance is improved.
Referring to fig. 3, an embodiment of the present application discloses a specific BMC configuration method applied to a superior management controller, including:
step S21: acquiring a configuration file corresponding to a lower management controller BMC sent by a user terminal; wherein the configuration file comprises server model identification information.
Step S22: and encrypting the configuration file by using a preset encryption algorithm to obtain the encrypted configuration file.
It can be understood that the security of configuration can be improved by carrying out encrypted transmission on the configuration file.
Step S23: and issuing corresponding configuration updating notification information to the lower management controller BMC so that the lower management controller BMC can acquire the encrypted configuration file from the upper management controller when the lower management controller BMC is idle, decrypting the encrypted configuration file by using a preset decryption algorithm after acquiring the encrypted configuration file, then verifying the server machine type identification information, and if the server machine type identification information passes the verification, configuring by using the decrypted configuration file to be effective.
For example, the user adds the model identification information to the configuration file, transmits the configuration file futureting.json to the SMC, and the SMC encrypts the configuration file to generate futureting.bak and informs the BMC of the new configuration file currently. The BMC acquires futureting.bak from the BMC through redfish in an idle stage, then generates futureting.json through a decryption algorithm, verifies the machine type identification in the file, and if the verification is passed, the configuration is effective.
In a specific embodiment, after encrypting the configuration file by using a preset encryption algorithm to obtain an encrypted configuration file, the upper management controller may compress the encrypted configuration file to obtain a compressed configuration file. Correspondingly, the lower management controller BMC obtains the compressed configuration file from the upper management controller when the lower management controller BMC is idle, then decompresses the compressed configuration file to obtain the decompressed encrypted configuration file, decrypts the encrypted configuration file by using a preset decryption algorithm, then verifies the server machine type identification information, and if the server machine type identification information passes the verification, configuration is effective by using the decrypted configuration file.
Referring to fig. 4, an embodiment of the present application discloses a BMC configuration method applied to a lower management controller BMC, including:
step S31: acquiring configuration update notification information corresponding to the configuration file; the configuration file is a configuration file sent by a user terminal and acquired by a superior management controller, and the configuration file comprises server machine type identification information;
step S32: and acquiring the configuration file from the superior management controller when the device is idle, then verifying the identification information of the server machine type, and if the identification information of the server machine type passes the verification, performing configuration validation by using the configuration file.
In a specific implementation mode, if the acquired configuration file is an encrypted configuration file, decrypting the encrypted configuration file by using a preset decryption algorithm, then verifying the identification information of the machine type of the server, and if the identification information of the machine type of the server passes the verification, configuring the configuration file to be effective by using the decrypted configuration file;
the encrypted configuration file is obtained by encrypting the configuration file sent by the user terminal by the superior management controller by using a preset encryption algorithm.
And the lower management controller BMC acquires the configuration file from the upper management controller by using a Redfish interface when the lower management controller BMC is idle.
In addition, if the acquired configuration file is a compressed configuration file, decompression is performed first.
Therefore, the configuration update notification information corresponding to the configuration file is obtained in the embodiment of the application; the configuration file is a configuration file sent by a user terminal and acquired by a superior management controller, and the configuration file comprises server machine type identification information; and acquiring the configuration file from the superior management controller when the device is idle, then verifying the identification information of the server machine type, and if the identification information of the server machine type passes the verification, performing configuration validation by using the configuration file. The method and the system can ensure that the BMC service is not influenced by configuration updating and the adaptability of the configuration file, thereby improving the performance of the server.
Referring to fig. 5, an embodiment of the present application discloses a BMC configuration device applied to an upper management controller, including:
a configuration file obtaining module 11, configured to obtain a configuration file corresponding to a lower management controller BMC sent by a user terminal; the configuration file comprises server model identification information;
a configuration update notification module 12, configured to issue configuration update notification information corresponding to the configuration file to the lower management controller BMC, so that the lower management controller BMC obtains the configuration file from the upper management controller when it is idle, then checks the server machine type identifier information, and if the server machine type identifier information passes the check, then the configuration file is used to perform configuration validation.
Therefore, in the embodiment of the application, a configuration file corresponding to a lower management controller BMC sent by a user terminal is obtained first; the configuration file comprises server machine type identification information, then configuration updating notification information corresponding to the configuration file is issued to the lower management controller BMC, so that the lower management controller BMC can acquire the configuration file from an upper management controller when the lower management controller BMC is idle, then the server machine type identification information is verified, and if the server machine type identification information passes the verification, configuration is carried out by using the configuration file to be effective. Therefore, the configuration file comprising the server model identification information is obtained, the corresponding configuration updating notification information is sent to the lower management controller BMC, the lower management controller BMC obtains the configuration file when the lower management controller BMC is idle, the server model identification information is verified, if the lower management controller BMC passes the verification, the configuration is used for configuration validation, the BMC service is not affected by configuration updating and the adaptability of the configuration file can be guaranteed, and therefore the server performance is improved.
The BMC configuration device further comprises:
the configuration file encryption module is used for encrypting the configuration file by using a preset encryption algorithm to obtain an encrypted configuration file, so that the lower management controller BMC decrypts the encrypted configuration file by using a preset decryption algorithm after obtaining the encrypted configuration file, then verifies the server machine type identification information, and if the server machine type identification information passes the verification, the configuration is validated by using the decrypted configuration file.
The BMC configuration device further comprises:
and the configuration file compression module is used for compressing the configuration file to obtain a compressed configuration file.
The configuration file obtaining module 11 is specifically configured to obtain, through a Redfish interface, a configuration file corresponding to a lower management controller BMC sent by a user terminal.
Referring to fig. 6, an embodiment of the present application discloses a BMC configuration device, which includes a processor 21 and a memory 22; wherein, the memory 22 is used for saving computer programs; the processor 21 is configured to execute the computer program to implement the BMC configuration method disclosed in the foregoing embodiment.
For the specific process of the BMC configuration method, reference may be made to corresponding contents disclosed in the foregoing embodiments, and details are not described herein again.
Further, an embodiment of the present application also discloses a computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the BMC configuration method disclosed in the foregoing embodiment.
For the specific process of the BMC configuration method, reference may be made to corresponding contents disclosed in the foregoing embodiments, and details are not described herein again.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The BMC configuration method, apparatus, device and medium provided by the present application are described in detail above, and a specific example is applied in the description to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A BMC configuration method is applied to an upper management controller, and comprises the following steps:
acquiring a configuration file corresponding to a lower management controller BMC sent by a user terminal; the configuration file comprises server model identification information;
and issuing configuration updating notification information corresponding to the configuration file to the lower management controller BMC so that the lower management controller BMC can acquire the configuration file from the upper management controller when the lower management controller BMC is idle, then checking the server machine type identification information, and if the server machine type identification information passes the checking, using the configuration file to carry out configuration validation.
2. The BMC configuration method according to claim 1, wherein after acquiring the configuration file corresponding to the lower management controller BMC sent by the user terminal, the method further comprises:
and encrypting the configuration file by using a preset encryption algorithm to obtain an encrypted configuration file, so that the lower management controller BMC decrypts the encrypted configuration file by using a preset decryption algorithm after obtaining the encrypted configuration file, then verifies the identification information of the server machine type, and if the identification information of the server machine type passes the verification, the configuration is validated by using the decrypted configuration file.
3. The BMC configuration method according to claim 1, wherein the acquiring the configuration file corresponding to the lower management controller BMC sent by the user terminal includes:
and acquiring a configuration file corresponding to a lower management controller BMC sent by the user terminal through a Redfish interface.
4. The BMC configuration method according to any of claims 1 to 3, wherein after acquiring the configuration file corresponding to the lower management controller BMC sent by the user terminal, the method further includes:
and compressing the configuration file to obtain a compressed configuration file.
5. A BMC configuration method applied to a lower level management controller BMC includes:
acquiring configuration update notification information corresponding to the configuration file; the configuration file is a configuration file sent by a user terminal and acquired by a superior management controller, and the configuration file comprises server machine type identification information;
and acquiring the configuration file from the superior management controller when the device is idle, then verifying the identification information of the server machine type, and if the identification information of the server machine type passes the verification, performing configuration validation by using the configuration file.
6. The BMC configuration method of claim 5, wherein after obtaining the configuration file from the upper management controller when the BMC configuration method is idle, the method further comprises:
decrypting the encrypted configuration file by using a preset decryption algorithm; the encrypted configuration file is obtained by encrypting the configuration file sent by the user terminal by the superior management controller by using a preset encryption algorithm.
7. The BMC configuration method of claim 5, wherein the obtaining the configuration file from the upper level management controller when the BMC configuration method is idle comprises:
and acquiring the configuration file from the superior management controller by utilizing a Redfish interface when the Redfish interface is idle.
8. A BMC configuration device applied to an upper management controller includes:
the configuration file acquisition module is used for acquiring a configuration file corresponding to a lower management controller BMC sent by a user terminal; the configuration file comprises server model identification information;
and the configuration update notification module is used for issuing configuration update notification information corresponding to the configuration file to the lower management controller BMC so that the lower management controller BMC can acquire the configuration file from a higher management controller when the lower management controller BMC is idle, then checking the identification information of the server machine type, and if the identification information of the server machine type passes the checking, the configuration file is used for configuration validation.
9. A BMC configuration device comprising a processor and a memory; wherein the content of the first and second substances,
the memory is used for storing a computer program;
the processor configured to execute the computer program to implement the BMC configuration method of any of claims 1 to 7.
10. A computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the BMC configuration method of any of claims 1 to 7.
CN202010176099.6A 2020-03-13 2020-03-13 BMC configuration method, device, equipment and medium Withdrawn CN111367585A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010176099.6A CN111367585A (en) 2020-03-13 2020-03-13 BMC configuration method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010176099.6A CN111367585A (en) 2020-03-13 2020-03-13 BMC configuration method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN111367585A true CN111367585A (en) 2020-07-03

Family

ID=71207311

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010176099.6A Withdrawn CN111367585A (en) 2020-03-13 2020-03-13 BMC configuration method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN111367585A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023116104A1 (en) * 2021-12-23 2023-06-29 锐凌无线有限责任公司 Configuration parameter updating method and apparatus, and related device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023116104A1 (en) * 2021-12-23 2023-06-29 锐凌无线有限责任公司 Configuration parameter updating method and apparatus, and related device

Similar Documents

Publication Publication Date Title
CN108241517B (en) Software upgrading method, client and electronic equipment
CN108551443B (en) Application login method and device, terminal equipment and storage medium
CN109194625B (en) Client application protection method and device based on cloud server and storage medium
CN105260668A (en) File encryption method and electronic device
CN110661748B (en) Log encryption method, log decryption method and log encryption device
CN108768628B (en) Equipment end encryption method, device, system and gateway
WO2020057314A1 (en) Method, device and system for issuing esim certificate online
CN103246540A (en) Update method and update device of application program
CN107872315B (en) Data processing method and intelligent terminal
CN117240625A (en) Tamper-resistant data processing method and device and electronic equipment
CN110798432A (en) Security authentication method, device and system and mobile terminal
CN111427860B (en) Distributed storage system and data processing method thereof
CN110602132A (en) Data encryption and decryption processing method
CN110290097B (en) Data processing method and device, storage medium and electronic device
CN111367585A (en) BMC configuration method, device, equipment and medium
CN112583594B (en) Data processing method, acquisition device, gateway, trusted platform and storage medium
CN108574658B (en) Application login method and device
CN114079921B (en) Session key generation method, anchor point function network element and system
CN111859314A (en) SM2 encryption method, system, terminal and storage medium based on encryption software
CN114157470B (en) Token management method and device
CN110740139A (en) secret key device and secret key management method, system, equipment and computer medium
CN113452521B (en) Block chain state password adaptation method, state password adapter, system and device
CN113949516B (en) Unified authentication permission method, system and storage medium
CN110674514B (en) Hard disk grading method, device and system
CN114095496A (en) Terminal application processing method, edge cloud application server, system and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200703