CN111857845B - Integrity verification method, device and system for TF card software - Google Patents

Integrity verification method, device and system for TF card software Download PDF

Info

Publication number
CN111857845B
CN111857845B CN202010567717.XA CN202010567717A CN111857845B CN 111857845 B CN111857845 B CN 111857845B CN 202010567717 A CN202010567717 A CN 202010567717A CN 111857845 B CN111857845 B CN 111857845B
Authority
CN
China
Prior art keywords
card
state
operating system
target
memory operating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010567717.XA
Other languages
Chinese (zh)
Other versions
CN111857845A (en
Inventor
孙永杰
郭锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Guangdong Inspur Smart Computing Technology Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN202010567717.XA priority Critical patent/CN111857845B/en
Publication of CN111857845A publication Critical patent/CN111857845A/en
Application granted granted Critical
Publication of CN111857845B publication Critical patent/CN111857845B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses an integrity verification method of TF card software, which comprises the following steps: acquiring a preset memory operating system file from a PXE server; booting and starting a memory operating system, setting a hidden interface and a display interface of the TF card state in the BIOS, and acquiring the current state of the TF card; if the current state is hidden, calling a display interface to modify the current state into display; otherwise, acquiring the version information of the target software on the TF card, and carrying out integrity verification on the target file of the TF card to obtain a verification result. Therefore, the method utilizes PXE to customize the memory operating system and distribute the memory operating system to the target server, and can set the hidden interface and the display interface of the TF card state in the BIOS, so that the state of the TF card can be flexibly switched, and the integrity checking efficiency is improved. In addition, the application also provides an integrity checking device, a server and a system of the TF card software, and the technical effect of the integrity checking device corresponds to that of the method.

Description

Integrity verification method, device and system for TF card software
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a server, and a system for integrity verification of TF card software.
Background
A TF Card (Trans-flash Card), which is a very small flash memory unit Card, is generally configured on a server motherboard directly, and related software is solidified thereon. The TF card is not visible under the OS of the server. Under the current situation, if the integrity of the software of the TF card needs to be verified, a single verification is needed, the verification mode is that the software interface is guided to by a specific key in the starting process, then the integrity verification can be carried out, and the efficiency is very low.
Therefore, as the TF card is invisible in the server OS, the process is complicated and the efficiency is low when the integrity of the software on the TF card is checked.
Disclosure of Invention
The application aims to provide a method, a device, a server and a system for verifying the integrity of TF card software, and aims to solve the problems of complex integrity verification process and low efficiency of the software on the TF card.
In a first aspect, the present application provides an integrity checking method for TF card software, which is applied to a target server and includes:
acquiring a preset memory operating system file from a PXE server, wherein the preset memory operating system file comprises hidden interface setting information and display interface setting information of a TF card state;
according to the preset memory operating system file, guiding to start a memory operating system, setting a hidden interface and a display interface of the TF card state in the BIOS, and acquiring the current state of the TF card;
if the current state is a hidden state, calling the display interface to modify the current state into a display state, and restarting;
and if the current state is the display state, mounting the TF card, acquiring the version information of the target software on the TF card, and carrying out integrity check on the target file of the TF card according to the version information to obtain a check result.
Preferably, the booting and starting the memory operating system, setting a hidden interface and a display interface of the TF card state in the BIOS, includes:
and booting to start the memory operating system, sending an IPMI command to the BMC, and setting a hidden interface and a display interface of the TF card state in the BIOS by using the BMC.
Preferably, the integrity checking the target file of the TF card according to the version information to obtain a checking result includes:
and according to the version information, carrying out integrity verification on the target file of the TF card by using a file integrity verification algorithm based on a hash function to obtain a verification result.
Preferably, the target software is software solidified on the TF card.
Preferably, the target software is ISQP, the obtaining of the version information of the target software on the TF card, and the performing integrity check on the target file of the TF card according to the version information includes:
and obtaining version information of ISQP on the TF card, and carrying out integrity check on the ISQP file of the TF card according to the version information.
Preferably, after the integrity check is performed on the target file of the TF card according to the version information to obtain a check result, the method further includes:
and sending the checking result to a network receiving server, and calling the hidden interface to modify the current state into a hidden state.
Preferably, the sending the verification result to a network receiving server includes:
and calling a restful interface, and sending the version information and the verification result to a network receiving server.
In a second aspect, the present application provides an integrity checking apparatus for TF card software, which is applied to a target server, and includes:
a system file acquisition module: the device comprises a PXE server, a storage operation system and a display interface, wherein the PXE server is used for acquiring a preset storage operation system file from the PXE server, and the preset storage operation system file comprises hidden interface setting information and display interface setting information of a TF card state;
the memory system starting module: the memory operating system is used for booting and starting the memory operating system according to the preset memory operating system file, a hidden interface and a display interface of the TF card state are set in the BIOS, and the current state of the TF card is obtained;
a state modification module: if the current state is a hidden state, calling the display interface to modify the current state into a display state and restarting;
a checking module: and the TF card is mounted if the current state is the display state, the version information of the target software on the TF card is acquired, and the integrity of the target file of the TF card is checked according to the version information to obtain a check result.
In a third aspect, the present application provides a server, comprising:
a memory: for storing a computer program;
a processor: for executing said computer program for implementing the steps of the integrity check method of TF card software as described above.
In a fourth aspect, the present application provides an integrity checking system for TF card software, comprising: a PXE server and a target server;
the PXE server is used for distributing a preset memory operating system file to the target server, wherein the preset memory operating system file comprises hidden interface setting information and display interface setting information of a TF card state;
the target server is used for guiding and starting the memory operating system according to the preset memory operating system file, setting a hidden interface and a display interface of the TF card state in the BIOS and acquiring the current state of the TF card; if the current state is a hidden state, calling the display interface to modify the current state into a display state, and restarting; and if the current state is the display state, mounting the TF card, acquiring the version information of the target software on the TF card, and carrying out integrity check on the target file of the TF card according to the version information to obtain a check result.
The integrity verification method of the TF card software, which is provided by the application, is applied to a target server and comprises the following steps: acquiring a preset memory operating system file from a PXE server; booting and starting a memory operating system according to a preset memory operating system file, setting a hidden interface and a display interface of the TF card state in a BIOS, and acquiring the current state of the TF card; if the current state is the hidden state, calling a display interface to modify the current state into the display state, and restarting; and if the current state is the display state, mounting the TF card, acquiring the version information of the target software on the TF card, and carrying out integrity verification on the target file of the TF card according to the version information to obtain a verification result.
Therefore, the target server can flexibly switch the state of the TF card, the integrity check operation is conveniently executed, and the integrity check efficiency is improved.
In addition, the application also provides an integrity checking device, a server and a system of the TF card software, and the technical effect of the integrity checking device corresponds to that of the method, and the details are not repeated here.
Drawings
For a clearer explanation of the embodiments or technical solutions of the prior art of the present application, the drawings needed for the description of the embodiments or prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart illustrating a first implementation of a method for integrity check of TF card software according to an embodiment of the present disclosure;
fig. 2 is a flowchart illustrating an implementation of a second embodiment of an integrity checking method for TF card software according to the present application;
fig. 3 is a schematic diagram of an implementation process of a second embodiment of the integrity checking method for TF card software provided by the present application;
fig. 4 is a functional block diagram of an embodiment of an integrity checking apparatus for TF card software provided in the present application;
fig. 5 is a block diagram illustrating an integrity check system of TF card software according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The TF card is a device directly configured on the mainboard, wherein relevant software is recorded, and the software is solidified on the TF card. The TF card is not visible under the OS of the server, and thus a single check is required if version information check or integrity check is to be performed on the software of the TF card. For example, ISQP (input Quick provisioning) is used, and the checking mode is to guide the user to an ISQP interface by pressing an F7 key during the boot process to check version information and check integrity, which is very inefficient.
Aiming at the problem, the core of the application is to provide a method, a device, a server and a system for integrity check of TF card software, a PXE is used for customizing a memory operating system and distributing the memory operating system to a target server, and a hidden interface and a display interface of a TF card state can be set in a BIOS when the memory operating system operates, so that the target server can flexibly switch the state of the TF card, the integrity check operation is conveniently executed, and the integrity check efficiency is improved.
Referring to fig. 1, a first embodiment of an integrity checking method for TF card software provided in the present application is described as follows, where the first embodiment is applied to a target server, and the method includes:
s101, acquiring a preset memory operating system file from a PXE server, wherein the preset memory operating system file comprises hidden interface setting information and display interface setting information of a TF card state;
the memory operating system (RAM OS) is an operating system which does not depend on a hard disk after being started, all files can be loaded into the memory to run after being started, the running speed is high, poisoning can not occur, and core files of the system can be better protected from being damaged.
The TF Card (Trans-flash Card) is a very small flash memory unit Card.
Specifically, a PXE server is set up in advance, a PXE network is configured, and a configuration operation of a memory operating system is performed thereon to generate a memory operating system file. The memory operating system file is distributed to a target server which needs to be subjected to integrity verification in the local area network, and specifically can be distributed to all target servers in the local area network. And after receiving the preset memory operating system file, the target server conducts boot starting of the memory operating system.
S102, guiding to start the memory operating system according to the preset memory operating system file, setting a hidden interface and a display interface of the TF card state in the BIOS, and acquiring the current state of the TF card;
specifically, the BIOS sets a hidden and displayed switch of the TF card, i.e., the hidden interface and the display interface, and performs command configuration and restart under the operating system. And then, acquiring the current state of the local TF card by using a memory operating system.
S103, if the current state is a hidden state, calling the display interface to modify the current state into a display state, and restarting;
s104, if the current state is the display state, mounting the TF card, acquiring the version information of the target software on the TF card, and carrying out integrity check on the target file of the TF card according to the version information to obtain a check result.
After the current state of the TF card, if the current state is a hidden state, calling a display interface to modify the current state into a display state, and restarting a server; if the display state is positive, mounting the TF card, acquiring the version information of the target software in the TF card, and carrying out integrity check on the target file in the TF card. The target software may be specifically software solidified on a TF card, and the target file specifically refers to a file corresponding to the target software.
Specifically, after the integrity check, the hidden interface may be called to modify the state of the TF card into a hidden state.
In some specific embodiments, a network receiving server may be further configured, and after the target server obtains the integrity check result, the check result is uploaded to the designated network receiving server, so as to complete the whole check and information return process. Specifically, the version information and the verification result can be uploaded at the same time, so that the version information and the integrity verification result of the TF card of the target server in the whole PXE network can be obtained on the network receiving server, and the software integrity verification of the invisible TF card under the batch operating system is completed.
The integrity checking method for the TF card software is applied to a target server, the method utilizes PXE to customize a memory operating system and distributes the memory operating system to the target server, and the hidden interface and the display interface of the TF card state can be set in a BIOS when the memory operating system operates, so that the target server can flexibly switch the state of the TF card, the integrity checking operation is conveniently executed, and the integrity checking efficiency is improved.
An embodiment two of the integrity checking method for TF card software provided by the present application is described in detail below, and the embodiment two is implemented based on the foregoing embodiment one and is expanded to a certain extent on the basis of the embodiment one.
Specifically, the second embodiment is mainly used for performing integrity check on the ISQP, and the ISQP is named an input Quick provisioning, is server stand-alone TF card management software, and is used for server stand-alone maintenance. The boot system is recorded on the TF card, and during the boot process, the LiveCD on the TF card (i.e. the CD can be directly booted as a CD of the available Linux system, which is referred to herein as the Linux environment that can be booted directly) can be booted according to F7 to start the memory operating system.
Fig. 2 is a flowchart of a method according to a second embodiment, fig. 3 is a schematic process diagram according to the second embodiment, referring to fig. 2 and fig. 3, the second embodiment, which is specifically applied to a target server, includes the following steps:
s201, acquiring a preset memory operating system file from a PXE server, wherein the preset memory operating system file comprises hidden interface setting information and display interface setting information of a TF card state;
s202, according to the preset memory operating system file, guiding to start a memory operating system, sending an IPMI command to a BMC, and setting a hidden interface and a display interface of a TF card state in a BIOS by using the BMC; acquiring the current state of the TF card through an IPMI command;
the hidden interface and the display interface are IPMI-based interfaces.
S203, if the current state is a hidden state, calling the display interface to modify the current state into a display state, and restarting;
s204, if the current state is the display state, mounting the TF card, and acquiring ISQP version information on the TF card; according to the version information, carrying out integrity check on the ISQP file of the TF card by using a file integrity check algorithm based on a hash function to obtain a check result;
s205, calling a restful interface, and sending the version information and the verification result to a network receiving server; and calling the hidden interface to modify the current state into a hidden state.
It can be seen that, the integrity checking method for TF card software provided by this embodiment is applied to a target server, the method customizes a memory operating system by PXE and distributes the memory operating system to the target server, and the memory operating system can set a hidden interface and a display interface of a TF card state in a BIOS during operation, so that the target server can flexibly switch the state of the TF card, conveniently execute the integrity checking operation on the ISQP, and improve the integrity checking efficiency.
The integrity check device for TF card software provided in the embodiments of the present application is introduced below, and the integrity check device for TF card software described below and the integrity check method for TF card software described above may be referred to correspondingly.
As shown in fig. 4, the integrity check apparatus for TF card software of this embodiment, applied to a target server, includes:
the system file acquisition module 401: the device comprises a PXE server, a storage operation system and a display interface, wherein the PXE server is used for acquiring a preset storage operation system file from the PXE server, and the preset storage operation system file comprises hidden interface setting information and display interface setting information of a TF card state;
the memory system boot module 402: the memory operating system is used for booting and starting the memory operating system according to the preset memory operating system file, a hidden interface and a display interface of the TF card state are set in the BIOS, and the current state of the TF card is obtained;
the state modification module 403: if the current state is a hidden state, calling the display interface to modify the current state into a display state and restarting;
the verification module 404: and the TF card is mounted if the current state is the display state, the version information of the target software on the TF card is acquired, and the integrity of the target file of the TF card is checked according to the version information to obtain a check result.
The integrity check device for TF card software of this embodiment is used to implement the aforementioned integrity check method for TF card software, so the specific implementation manner in the device can be seen in the embodiment parts of the integrity check method for TF card software in the foregoing, for example, the system file obtaining module 401, the memory system starting module 402, the state modifying module 403, and the checking module 404 are respectively used to implement steps S101, S102, S103, and S104 in the integrity check method for TF card software. Therefore, specific embodiments thereof may be referred to in the description of the corresponding respective partial embodiments, and will not be described herein.
In addition, since the integrity check device of the TF card software of this embodiment is used for implementing the integrity check method of the TF card software, the function corresponds to the function of the method, and is not described herein again.
In addition, the present application also provides a server, including:
a memory: for storing a computer program;
a processor: for executing said computer program for implementing the steps of the integrity check method of TF card software as described above.
Finally, the present application provides an integrity verification system for TF card software, as shown in fig. 5, comprising: a PXE server and a target server;
the PXE server is used for distributing a preset memory operating system file to the target server, wherein the preset memory operating system file comprises hidden interface setting information and display interface setting information of a TF card state;
the target server is used for guiding and starting the memory operating system according to the preset memory operating system file, setting a hidden interface and a display interface of the TF card state in the BIOS and acquiring the current state of the TF card; if the current state is a hidden state, calling the display interface to modify the current state into a display state, and restarting; and if the current state is the display state, mounting the TF card, acquiring the version information of the target software on the TF card, and carrying out integrity check on the target file of the TF card according to the version information to obtain a check result.
In some specific embodiments, the system may further include a network receiving server, configured to obtain an integrity check result of each target server.
Specifically, a PXE server is used as a source server, and a customized memory operating system is distributed to a target server in batches; a target server in the local area network receives the distributed customized memory operating system and guides the starting; after the customized memory operating system is booted, acquiring the current TF card state through an IPMI command, and modifying the current TF card state into a display state through the IPMI command if the current TF card state is in a hidden state; if the target file is in the display state, mounting the TF card, acquiring the version information of the target software in the TF card, checking and comparing the integrity of the target file in the TF card, sending the checking result to a receiving server, and finally resetting the TF card to be in the hidden state and powering off. And the receiving server receives the batch verification results, completes the final statistical analysis, and can display the results through a web interface after the analysis and the sorting.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above detailed descriptions of the solutions provided in the present application, and the specific examples applied herein are set forth to explain the principles and implementations of the present application, and the above descriptions of the examples are only used to help understand the method and its core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (9)

1. An integrity checking method of TF card software is applied to a target server, and comprises the following steps:
acquiring a preset memory operating system file from a PXE server, wherein the preset memory operating system file comprises hidden interface setting information and display interface setting information of a TF card state;
according to the preset memory operating system file, guiding to start a memory operating system, setting a hidden interface and a display interface of the TF card state in the BIOS, and acquiring the current state of the TF card;
if the current state is a hidden state, calling the display interface to modify the current state into a display state, and restarting;
if the current state is a display state, mounting the TF card, acquiring version information of target software on the TF card, and carrying out integrity check on a target file of the TF card according to the version information to obtain a check result;
the booting and starting of the memory operating system sets a hidden interface and a display interface of the TF card state in the BIOS, and comprises the following steps:
and booting to start the memory operating system, sending an IPMI command to the BMC, and setting a hidden interface and a display interface of the TF card state in the BIOS by using the BMC.
2. The method according to claim 1, wherein the integrity checking the target file of the TF card according to the version information to obtain a checking result comprises:
and according to the version information, carrying out integrity verification on the target file of the TF card by using a file integrity verification algorithm based on a hash function to obtain a verification result.
3. The method of claim 2, wherein the target software is software that is cured on a TF card.
4. The method of claim 3, wherein the target software is ISQP, the obtaining version information of the target software on the TF card, and performing integrity check on the target file of the TF card according to the version information comprises:
and obtaining version information of ISQP on the TF card, and carrying out integrity check on the ISQP file of the TF card according to the version information.
5. The method according to any one of claims 1 to 4, wherein after the integrity check of the target file of the TF card according to the version information is performed to obtain a check result, the method further comprises:
and sending the checking result to a network receiving server, and calling the hidden interface to modify the current state into a hidden state.
6. The method of claim 5, wherein said sending the verification result to a network receiving server comprises:
and calling a restful interface, and sending the version information and the verification result to a network receiving server.
7. An integrity checking device of TF card software is applied to a target server and comprises the following components:
a system file acquisition module: the device comprises a PXE server, a storage operation system and a display interface, wherein the PXE server is used for acquiring a preset storage operation system file from the PXE server, and the preset storage operation system file comprises hidden interface setting information and display interface setting information of a TF card state;
the memory system starting module: the memory operating system is used for booting and starting the memory operating system according to the preset memory operating system file, a hidden interface and a display interface of the TF card state are set in the BIOS, and the current state of the TF card is obtained;
a state modification module: if the current state is a hidden state, calling the display interface to modify the current state into a display state and restarting;
a checking module: the TF card is mounted if the current state is the display state, the version information of the target software on the TF card is obtained, and integrity verification is carried out on the target file of the TF card according to the version information to obtain a verification result;
the memory system starting module is specifically used for guiding and starting the memory operating system according to the preset memory operating system file, sending an IPMI command to the BMC, and setting a hidden interface and a display interface of the TF card state in the BIOS by using the BMC to acquire the current state of the TF card.
8. A server, comprising:
a memory: for storing a computer program;
a processor: for executing the computer program for carrying out the steps of the integrity checking method of TF card software according to any of the claims 1 to 6.
9. An integrity checking system of TF card software, comprising: a PXE server and a target server;
the PXE server is used for distributing a preset memory operating system file to the target server, wherein the preset memory operating system file comprises hidden interface setting information and display interface setting information of a TF card state;
the target server is used for guiding and starting the memory operating system according to the preset memory operating system file, setting a hidden interface and a display interface of the TF card state in the BIOS and acquiring the current state of the TF card; if the current state is a hidden state, calling the display interface to modify the current state into a display state, and restarting; if the current state is a display state, mounting the TF card, acquiring version information of target software on the TF card, and carrying out integrity check on a target file of the TF card according to the version information to obtain a check result;
the target server is specifically used for guiding and starting a memory operating system according to the preset memory operating system file, sending an IPMI command to the BMC, and setting a hidden interface and a display interface of the TF card state in the BIOS by using the BMC to acquire the current state of the TF card; if the current state is a hidden state, calling the display interface to modify the current state into a display state, and restarting; and if the current state is the display state, mounting the TF card, acquiring the version information of the target software on the TF card, and carrying out integrity check on the target file of the TF card according to the version information to obtain a check result.
CN202010567717.XA 2020-06-19 2020-06-19 Integrity verification method, device and system for TF card software Active CN111857845B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010567717.XA CN111857845B (en) 2020-06-19 2020-06-19 Integrity verification method, device and system for TF card software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010567717.XA CN111857845B (en) 2020-06-19 2020-06-19 Integrity verification method, device and system for TF card software

Publications (2)

Publication Number Publication Date
CN111857845A CN111857845A (en) 2020-10-30
CN111857845B true CN111857845B (en) 2022-04-22

Family

ID=72987043

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010567717.XA Active CN111857845B (en) 2020-06-19 2020-06-19 Integrity verification method, device and system for TF card software

Country Status (1)

Country Link
CN (1) CN111857845B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901158A (en) * 2010-08-02 2010-12-01 中颖电子有限公司 Update method and device of firmware
CN109657454A (en) * 2018-12-20 2019-04-19 成都三零瑞通移动通信有限公司 A kind of Android application trust authentication method based on TF crypto module
CN110543769A (en) * 2019-08-29 2019-12-06 武汉大学 Trusted starting method based on encrypted TF card

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080126705A1 (en) * 2006-08-08 2008-05-29 Fabrice Jogand-Coulomb Methods Used In A Portable Mass Storage Device With Virtual Machine Activation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901158A (en) * 2010-08-02 2010-12-01 中颖电子有限公司 Update method and device of firmware
CN109657454A (en) * 2018-12-20 2019-04-19 成都三零瑞通移动通信有限公司 A kind of Android application trust authentication method based on TF crypto module
CN110543769A (en) * 2019-08-29 2019-12-06 武汉大学 Trusted starting method based on encrypted TF card

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于加密SD卡的内网移动终端可信接入方案;李济洋;《网络与信息安全学报》;20190831;第5卷(第4期);第108-118页 *

Also Published As

Publication number Publication date
CN111857845A (en) 2020-10-30

Similar Documents

Publication Publication Date Title
CN109840096B (en) Installation method and device of operating system
CN112416377B (en) Method and device for manufacturing boot image, electronic equipment and storage medium
CN111736906A (en) BIOS-based boot entry synchronous storage method, system, terminal and storage medium
CN109905770B (en) Terminal starting method and device and terminal
CN102135893A (en) Method for integrating operating system on BIOS (Basic Input Output System) chip and starting operating system on server
US7143279B2 (en) Dynamic BIOS execution and concurrent update for a blade server
CN107844306B (en) Application program repairing method and device, storage medium and terminal
CN111552486A (en) SSD firmware burning method and related components
CN112162795A (en) Plug-in starting method and device, computer equipment and storage medium
CN111857845B (en) Integrity verification method, device and system for TF card software
CN117130672A (en) Server start flow control method, system, terminal and storage medium
CN115495161B (en) BIOS option modification validation method and device and storage medium
CN109471665B (en) Method for automatically installing Windows operating system
CN116339908A (en) Virtual machine starting method, device, computer equipment and storage medium
CN114153503A (en) BIOS control method, device and medium
CN106201546B (en) Full-scale formatting method and system for large disks in linux system installation processes
CN112231704A (en) Trusted network environment protection method, apparatus and computer readable storage medium
CN111158771A (en) Processing method and device and computer equipment
CN110908725A (en) Application program starting method and device, electronic equipment and readable medium
CN113900934B (en) Multi-mirror hybrid refresh test method, system, terminal and storage medium
CN115913913B (en) Network card pre-starting execution environment function fault positioning method and device
CN107256171B (en) Multi-system installation and switching method and system based on BIOS
CN114860336B (en) System auditing mode implementation method based on PXE and electronic equipment
US20240020103A1 (en) Parallelizing data processing unit provisioning
CN110007973B (en) Information processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231117

Address after: Room 2301, No. 395 Linjiang Avenue, Tianhe District, Guangzhou City, Guangdong Province, 510655 (Location: Self made Unit 01)

Patentee after: Guangdong Inspur Intelligent Computing Technology Co.,Ltd.

Patentee after: INSPUR ELECTRONIC INFORMATION INDUSTRY Co.,Ltd.

Address before: No. 1036, Shandong high tech Zone wave road, Ji'nan, Shandong

Patentee before: INSPUR ELECTRONIC INFORMATION INDUSTRY Co.,Ltd.

TR01 Transfer of patent right