CN117251836A - Method, device, equipment and storage medium for logging in baseboard management controller - Google Patents

Method, device, equipment and storage medium for logging in baseboard management controller Download PDF

Info

Publication number
CN117251836A
CN117251836A CN202311523115.4A CN202311523115A CN117251836A CN 117251836 A CN117251836 A CN 117251836A CN 202311523115 A CN202311523115 A CN 202311523115A CN 117251836 A CN117251836 A CN 117251836A
Authority
CN
China
Prior art keywords
user
password
management controller
baseboard management
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311523115.4A
Other languages
Chinese (zh)
Other versions
CN117251836B (en
Inventor
迟江波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Metabrain Intelligent Technology Co Ltd
Original Assignee
Suzhou Metabrain Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Metabrain Intelligent Technology Co Ltd filed Critical Suzhou Metabrain Intelligent Technology Co Ltd
Priority to CN202311523115.4A priority Critical patent/CN117251836B/en
Publication of CN117251836A publication Critical patent/CN117251836A/en
Application granted granted Critical
Publication of CN117251836B publication Critical patent/CN117251836B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Abstract

The embodiment of the invention provides a login method, a login device, login equipment and a storage medium of a baseboard management controller, wherein the method is applied to a server, the server comprises the baseboard management controller, the server is connected with at least one terminal device through a wireless network, and the terminal device is provided with a management application program; according to the invention, the security of logging in the baseboard management controller is improved by performing first re-security authentication on the user and then performing second re-security authentication on the anti-counterfeiting code generated by the server.

Description

Method, device, equipment and storage medium for logging in baseboard management controller
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for logging in a baseboard management controller.
Background
The BMC (Baseboard Management Controller ) is a core component in a server management system defined by an IPMI (Intelligent Platform Management Interface ) protocol, and plays a vital role in a server, so that a user needs to input a correct user name and a correct password to log in when accessing a control page of the BMC. When the existing password authentication mode is adopted to log in the BMC, if the login account and the password of the user are stolen or decoded by an attacker, the attacker can log in the BMC by using the login account and the password of the user, so that the security of the BMC is threatened, namely, the existing password authentication mode is lower in security.
Disclosure of Invention
In view of the foregoing, embodiments of the present invention are directed to providing a baseboard management controller login method, apparatus, device, and storage medium that overcome or at least partially solve the foregoing problems.
In order to solve the problems, the embodiment of the invention discloses a login method of a baseboard management controller, which is applied to a server, wherein the server comprises the baseboard management controller, the server is connected with at least one terminal device through a wireless network, and the terminal device is provided with a management application program; the method comprises the following steps:
Judging whether a user logs in the baseboard management controller for the first time;
when the baseboard management controller is not logged in for the first time, checking the user information of the user;
after the user information of the user passes the verification, generating an anti-counterfeiting code according to the hardware information of the server, and sending the anti-counterfeiting code to terminal equipment corresponding to the user bound with the baseboard management controller;
receiving ciphertext information sent by a management application program of the terminal equipment, wherein the ciphertext information is obtained by encrypting the management application program of the terminal equipment based on the anti-fake code and the terminal user number;
decrypting the ciphertext information to obtain an anti-counterfeiting code and a terminal user number;
and checking the anti-counterfeiting code and the terminal user number, and allowing the user to log in the baseboard management controller if the anti-counterfeiting code and the terminal user number pass the checking.
Optionally, the server further includes: and after the step of determining whether the user logs in the baseboard management controller for the first time, the method further comprises the following steps:
when logging in the baseboard management controller for the first time, checking a first user name and a first password input by the user;
And when the first user name and the first password pass verification, modifying the initial password of the baseboard management controller, binding the initial user name of the baseboard management controller with the terminal user number of the user and the modified password, and storing the binding in the charged erasable programmable read-only memory.
Optionally, the charged eeprom includes an initial user name and an initial password of the baseboard management controller, and the verifying the first user name and the first password includes:
judging whether the first user name is the same as the initial user name of the baseboard management controller or not, and judging whether the first password is the same as the initial password of the baseboard management controller or not;
and if the first user name is the same as the initial user name and the first password is the same as the initial password, checking the first user name and the first password.
Optionally, the verifying the first user name and the first password further includes:
if the first user name is different from the initial user name and/or the first password is different from the initial password, the first user name and the first password are not checked;
The method further comprises the steps of:
and prohibiting the user from logging in the baseboard management controller.
Optionally, verifying the user information of the user includes:
acquiring a second user name and a second password input by the user;
judging whether the second user name is the same as the initial user name, and judging whether the second password is the same as the modified password;
and if the second user name is the same as the initial user name and the second password is the same as the modified password, checking the user information of the user.
Optionally, the verifying the user information of the user further includes:
if the second user name is different from the initial user name and/or the second password is different from the modified password, the user information verification of the user is not passed;
the method further comprises the steps of:
and prohibiting the user from logging in the baseboard management controller.
Optionally, after the step of prohibiting the user from logging into the baseboard management controller, the method further includes:
recording a first number of times that the second user name is different from the initial user name;
recording a second number of times the second password is different from the modified password;
And when the sum of the first times and the second times reaches the preset times, sending an alarm signal to the corresponding terminal equipment according to the terminal user number, wherein the alarm signal is used for indicating that the baseboard management controller is locked.
Optionally, the generating the anti-counterfeiting code according to the hardware information of the server includes:
and processing the hardware information of the server by adopting a time stamp algorithm to generate an anti-fake code.
Optionally, the hardware information of the server includes:
an ethernet address, a universally unique identification code.
Optionally, the encryption key adopted by the ciphertext information is an asymmetric encryption key or a symmetric encryption key.
Optionally, the method further comprises:
and sending instruction information to target terminal equipment according to the terminal user number, wherein the instruction information is used for characterizing a management application program allowing the user to log in the target terminal equipment.
The invention also discloses a login method of the baseboard management controller, which is applied to terminal equipment, wherein the terminal equipment is provided with a management application program, and the terminal equipment is connected with a server through a wireless network, and the method comprises the following steps:
receiving an anti-counterfeiting code sent by the server, and carrying out security verification on the anti-counterfeiting code, wherein the anti-counterfeiting code is generated based on hardware information after the server carries out security authentication on a user;
After the security verification of the anti-counterfeiting code is passed, encrypting the anti-counterfeiting code and the terminal user number to obtain ciphertext information;
acquiring an internet protocol address of a server, transmitting the ciphertext information to the server according to the internet protocol address, checking an anti-counterfeiting code and a terminal user number obtained after the ciphertext information is decrypted by the server, and allowing the user to log in the baseboard management controller when the checking is passed;
receiving instruction information sent by the server, wherein the instruction information is used for characterizing a management application program allowing the user to log in the terminal equipment;
and responding to the instruction information, and logging in the management application program.
Optionally, the terminal device includes a verification security code corresponding to the personal identification code; the security verification of the anti-counterfeiting code comprises the following steps:
judging whether the anti-counterfeiting code is the same as the verification anti-counterfeiting code or not;
and if the anti-counterfeiting code is the same as the check anti-counterfeiting code, the anti-counterfeiting code passes the security authentication.
The invention also discloses a login device of the baseboard management controller, which is applied to a server, wherein the server comprises the baseboard management controller, the server is connected with at least one terminal device through a wireless network, and the terminal device is provided with a management application program; the device comprises:
The judging module is used for judging whether the user logs in the baseboard management controller for the first time or not;
the first verification module is used for verifying the user information of the user when the baseboard management controller is not logged in for the first time;
the first sending module is used for generating anti-counterfeiting codes according to the hardware information of the server after the user information of the user passes verification, and sending the anti-counterfeiting codes to the terminal equipment corresponding to the user bound with the baseboard management controller;
the receiving module is used for receiving ciphertext information sent by the management application program of the terminal equipment, wherein the ciphertext information is obtained by encrypting the management application program of the terminal equipment based on the anti-fake code and the terminal user number;
the decryption module is used for decrypting the ciphertext information to obtain an anti-counterfeiting code and a terminal user number;
and the second checking module is used for checking the anti-counterfeiting code and the terminal user number, and if the anti-counterfeiting code and the terminal user number pass the checking, the user is allowed to log in the baseboard management controller.
Optionally, the server further includes: a charged erasable programmable read-only memory, the apparatus further comprising:
The third verification module is used for verifying the first user name and the first password input by the user when logging in the baseboard management controller for the first time;
and the storage module is used for modifying the initial password of the baseboard management controller after the first user name and the first password pass verification, binding the initial user name of the baseboard management controller with the terminal user number of the user and the modified password, and storing the binding into the electrified erasable programmable read-only memory.
Optionally, the charged erasable programmable read-only memory includes an initial user name and an initial password of the baseboard management controller, and the third verification module includes:
a first judging sub-module, configured to judge whether the first user name is the same as the initial user name of the baseboard management controller, and judge whether the first password is the same as the initial password of the baseboard management controller;
and the first determining submodule is used for checking the first user name and the first password if the first user name is the same as the initial user name and the first password is the same as the initial password.
Optionally, the third verification module further includes:
a second determining sub-module, configured to, if the first user name is different from the initial user name and/or the first password is different from the initial password, fail the verification of the first user name and the first password;
the apparatus further comprises:
and the first prohibition submodule is used for prohibiting the user from logging in the baseboard management controller.
Optionally, the first verification module includes:
the first acquisition sub-module is used for acquiring a second user name and a second password input by the user;
a second judging sub-module, configured to judge whether the second user name is the same as the initial user name, and judge whether the second password is the same as the modified password;
and the third determining submodule is used for passing the security authentication if the second user name is the same as the initial user name and the second password is the same as the modified password.
Optionally, the first verification module further includes:
a fourth determining sub-module, if the second user name is different from the initial user name and/or the second password is different from the modified password, the user information verification of the user is not passed;
The apparatus further comprises:
and the second prohibition submodule is used for prohibiting the user from logging in the baseboard management controller.
Optionally, the first verification module further includes:
a first recording sub-module, configured to record a first number of times that the second user name is different from the initial user name;
a second recording sub-module for recording a second number of times that the second password is different from the modified password;
and the alarm sub-module is used for sending an alarm signal to the corresponding terminal equipment according to the terminal user number when the sum of the first times and the second times reaches the preset times, wherein the alarm signal is used for indicating that the baseboard management controller is locked.
Optionally, the first sending module includes:
and the generation sub-module is used for processing the hardware information of the server by adopting a time stamp algorithm to generate the anti-counterfeiting code.
Optionally, the hardware information of the server includes:
an ethernet address, a universally unique identification code.
Optionally, the encryption key adopted by the ciphertext information is an asymmetric encryption key or a symmetric encryption key.
Optionally, the apparatus further comprises:
and the second sending module is used for sending instruction information to the target terminal equipment according to the terminal user number, wherein the instruction information is used for characterizing a management application program allowing the user to log in the target terminal equipment.
The invention also discloses an electronic device, comprising: a processor, a memory and a computer program stored on the memory and capable of running on the processor, which when executed by the processor performs the steps of the baseboard management controller login method as described above.
The invention also discloses a computer readable storage medium, wherein the computer readable storage medium stores a computer program, and the computer program realizes the steps of the login method of the baseboard management controller when being executed by a processor.
The embodiment of the invention has the following advantages:
the invention checks the user information of the user when the user logs in the baseboard management controller for the first time by judging whether the user logs in the baseboard management controller for the first time, when the user information of the user passes the check, the server can generate the anti-counterfeiting code according to the hardware information and then send the anti-counterfeiting code to the terminal equipment corresponding to the user, so that the terminal equipment corresponding to the user can encrypt the anti-counterfeiting code and the terminal user number and send the encrypted anti-counterfeiting code and the encrypted terminal user number to the server as ciphertext information after receiving the anti-counterfeiting code and the terminal user number, and the server can check the decrypted anti-counterfeiting code and the decrypted terminal user number after receiving the ciphertext information and allow the user to log in the baseboard management controller if the check passes; according to the invention, the security of logging in the baseboard management controller is improved by performing first re-security authentication on the user information of the user and then performing second re-security authentication on the basis of the anti-counterfeiting code generated by the server, and the anti-counterfeiting code is encrypted by the terminal equipment corresponding to the user and sent to the baseboard management controller and is not directly input into the baseboard management controller interface, so that the risk that the anti-counterfeiting code is stolen to log in directly is avoided, the BMC login is safer and not easy to crack, and the security of the server is further ensured.
Drawings
Fig. 1 is a flowchart of a login method of a baseboard management controller according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of another method for logging in a baseboard management controller according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating another method for logging in a baseboard management controller according to an embodiment of the present invention;
fig. 4 is a flowchart of a login method of a baseboard management controller according to an embodiment of the present invention;
fig. 5 is a block diagram of a baseboard management controller registration device according to an embodiment of the present invention;
fig. 6 is a block diagram of an electronic device according to an embodiment of the present invention;
fig. 7 is a block diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description.
The BMC (Baseboard Management Controller ) is a core component in a server management system defined by an IPMI (Intelligent Platform Management Interface ) protocol, can be used as a core component of a deployment/diagnosis/management server, is responsible for managing interfaces between system management software and platform management hardware, and provides functions of autonomous monitoring, event recording, recovery control and the like. The BMC plays a vital role in the server, and when accessing the control page of the BMC, the BMC needs to input a correct user name and password to log in and then can operate. The user name and the password are security barriers for logging in the BMC, the security of the BMC and the server is determined, and if the login account number and the password of the user are stolen or decoded by an attacker when the BMC and the server are logged in the existing password verification mode, the attacker can log in the BMC by using the login account number and the password of the user, so that the security of the BMC is threatened, namely, the security of logging in the BMC in the existing password verification mode is lower.
One of the core ideas of the embodiment of the invention is that the security of logging in the baseboard management controller is improved by carrying out first re-security authentication on the user and then carrying out second re-security authentication on the basis of the anti-counterfeiting code generated by the server, and the anti-counterfeiting code is encrypted by the terminal equipment corresponding to the user and sent to the baseboard management controller and is not directly input at the interface of the baseboard management controller, so that the risk that the anti-counterfeiting code is stolen to log in directly is avoided, the BMC login is safer and is not easy to crack, and the security of the server is further ensured.
Referring to fig. 1, a step flow chart of a login method of a baseboard management controller provided by an embodiment of the present invention is shown and applied to a server, where the server includes a BMC, and the server is connected to at least one terminal device through a wireless network, and the terminal device is deployed with a management application, where the method specifically may include the following steps:
step 101, determining whether the user logs in the baseboard management controller for the first time.
In the embodiment of the invention, when a user logs in, whether the user logs in the baseboard management controller for the first time needs to be judged.
Step 102, when the baseboard management controller is not logged in for the first time, checking user information of the user.
In the embodiment of the invention, when the user does not log in the BMC for the first time, the server can carry out security verification on the user information of the user, the method for carrying out security authentication on the user can comprise authentication on the user name and the password of the user, the method can also comprise carrying out security authentication on the basis of the pre-stored human body characteristics of the user of the server, for example, the facial information of the user stored in advance by the server can be obtained by shooting the facial picture of the user, then the shot facial picture of the user is compared with the pre-stored facial information of the user, and if the shot facial picture of the user is consistent with the pre-stored facial information of the user, the method indicates that the security authentication on the user is passed.
The manner in which the user is authenticated for security is not particularly limited.
Step 103, after the user information of the user passes the verification, generating an anti-counterfeiting code according to the hardware information of the server, and sending the anti-counterfeiting code to the terminal equipment corresponding to the user bound with the baseboard management controller.
In the embodiment of the invention, the baseboard management controllers and the users are bound one by one, namely, one user is not allowed to bind a plurality of baseboard management controllers or one baseboard management controller is not allowed to bind a plurality of users, the hardware information of the server can comprise the coding information of the server and the Ethernet address information, after the safety authentication of the users is passed, the anti-counterfeiting code can be generated according to the hardware information of the server, and then the anti-counterfeiting code is sent to the terminal equipment corresponding to the user bound with the BMC, wherein in one example, the binding relation between the BMC and the user is the BMC user name and the terminal user number, and the anti-counterfeiting code can be sent to the terminal equipment corresponding to the terminal user number; the invention sends the anti-fake code to the user terminal after the background, only the user can know the anti-fake code in the process, the password stealer is unclear, and the verification security in the login process is improved.
And 104, receiving ciphertext information sent by the management application program of the terminal equipment, wherein the ciphertext information is obtained by encrypting the management application program of the terminal equipment based on the anti-fake code and the terminal user number.
In the embodiment of the invention, after the management application program of the terminal equipment receives the anti-counterfeiting code, the acquired anti-counterfeiting code and the terminal user number of the terminal equipment can be encrypted and then sent to the server according to the IP address of the server, in one example, the terminal is introduced by taking a mobile phone as an example, the terminal user number is introduced by taking the mobile phone number as an example, after the mobile phone of the user receives the anti-counterfeiting code, the IP address of the server and the terminal user number can be input into the management application program by the user, then the management application program can be clicked and logged in, the anti-counterfeiting code and the terminal user number can be encrypted to obtain ciphertext information, then the ciphertext information is sent to the server corresponding to the IP address based on a wireless network, and the terminal equipment is connected to the network through WIFI, so that the server and the terminal equipment are in the same internal local area network, and the interference of external tools can be avoided.
Step 105, decrypting the ciphertext information to obtain an anti-counterfeiting code and a terminal user number;
in the embodiment of the invention, after receiving the ciphertext information generated by the terminal equipment corresponding to the user bound with the BMC, the server can decrypt the ciphertext information, thereby obtaining the anti-counterfeiting code and the terminal user number.
And 106, checking the anti-counterfeiting code and the terminal user number, and allowing the user to log in the baseboard management controller if the anti-counterfeiting code and the terminal user number pass the checking.
In the embodiment of the invention, the server can verify the anti-counterfeiting code and the terminal user number obtained by decryption, and if the anti-counterfeiting code and the terminal user number are consistent with the pre-stored anti-counterfeiting code and the terminal user number in the server, the verification of the anti-counterfeiting code and the terminal user number is passed, and the user is allowed to log in the baseboard management controller.
According to the invention, the security of logging in the baseboard management controller is improved by performing first re-security authentication on the user and then performing second re-security authentication on the anti-counterfeiting code generated by the server, and the anti-counterfeiting code is encrypted by the terminal equipment corresponding to the user and sent to the baseboard management controller and is not directly input into the interface of the baseboard management controller, so that the risk that the anti-counterfeiting code is stolen to log in directly is avoided, the BMC login is safer and is not easy to crack, and the security of the server is further ensured.
Referring to fig. 2, a flowchart of steps of another login method of a baseboard management controller provided by an embodiment of the present invention is shown, and the flowchart is applied to a server, where the server includes a BMC, and the server is connected to at least one terminal device through a wireless network, where the terminal device is deployed with a management application, and the method specifically may include the following steps:
Step 201, it is determined whether the user is first logging into the baseboard management controller.
Step 202, when logging in the baseboard management controller for the first time, judging whether the first user name is the same as the initial user name of the baseboard management controller, and judging whether the first password is the same as the initial password of the baseboard management controller.
In the embodiment of the invention, the first user name is the user name input by the user logging in the BMC for the first time, the first password is the password input by the user logging in the BMC for the first time, the initial user name is the default user name delivered by the BMC, the initial password is the default password delivered by the BMC, when the user logging in the BMC for the first time, whether the first user name input by the user and the initial user name are the same or not can be judged, and whether the first password input by the user is the same as the initial password or not can be judged.
In step 203, if the first user name is the same as the initial user name and the first password is the same as the initial password, the first user name and the first password pass verification.
In the embodiment of the invention, if the first user name is the same as the initial user name and the first password is the same as the initial password, the first user name and the first password pass verification, namely the user name and the password input by the user logging in the BMC for the first time are correct.
In one embodiment of the present invention, verifying the first user name and the first password further includes:
if the first user name is different from the initial user name and/or the first password is different from the initial password, the first user name and the first password are not checked and the user is forbidden to log in the baseboard management controller.
In the embodiment of the invention, if the first user name is different from the initial user name and/or the first password is different from the initial password, the user is forbidden to log in the baseboard management controller, namely, the user is forbidden to log in the baseboard management controller if the user inputs the user name and the password in the BMC only by one error.
And 204, after the first user name and the first password pass verification, modifying the initial password of the baseboard management controller, binding the initial user name of the baseboard management controller with the end user number of the user and the modified password, and storing the binding in the electrified erasable programmable read-only memory.
In the embodiment of the invention, after the first user name and the first password pass verification, in order to improve the privacy of the BMC login password, a user can modify the password into the user password after logging in by using the login default password, namely, modify the initial password, then bind the initial user name of the baseboard management controller with the terminal user number of the user and the modified password and store the bound initial user name, the modified password and the terminal user number of the user in the server into the charged erasable programmable read-only memory, and further, because each BMC user is bound with the corresponding terminal user number one by one, special people are realized, and the sharing of account numbers is avoided.
It should be noted that the modified password needs to include both a case letter, a number and a special character, and the length of the password cannot be less than 8 bits, and the password that has been set and used five times before cannot be used.
Further, the user can modify the initial user name of the BMC, after the user name and the password are modified, the terminal equipment number of the user, the modified user name and the password can be bound one by one and stored in the charged erasable programmable read-only memory, and the initial password and the initial user name stored before the charged erasable programmable read-only memory are covered.
Step 205, when the baseboard management controller is not logged in for the first time, a second user name and a second password input by the user are obtained.
Specifically, after modifying the initial password and the initial user name of the BMC, that is, when the user does not log into the baseboard management controller for the first time, the server may obtain the second user name and the second password input by the user into the BMC.
Step 206, determining whether the second user name is the same as the initial user name, and determining whether the second password is the same as the modified password.
In one example, where the initial username is BMC202310 and the modified password is MIma2023%, a comparison of the second username to BMC202310 may be performed, a comparison of the second password to MIma2023% may be performed to verify that the second username is the same as the initial username, and a determination of whether the second password is the same as the modified password.
Step 207, if the second user name is the same as the initial user name and the second password is the same as the modified password, the user information of the user passes verification.
In the embodiment of the invention, if the second user name is BMC202310 and the second password is mia 2023%, the user information verification of the user is indicated to pass.
In an embodiment of the present invention, verifying user information of a user further includes:
if the second user name is different from the initial user name and/or the second password is different from the modified password, the user information of the user is not checked and the user is forbidden to log in the baseboard management controller.
In the embodiment of the invention, if the second user name is BMC202310 and the second password is mia 2023%, it can be seen that the user name input to the BMC is different from the initial user name, that is, the user information verification of the user fails, and at this time, the user is forbidden to log in the baseboard management controller.
In another embodiment, if the second user name is BMC202310 and the second password is mima2023%, it can be seen that the password input to the BMC is different from the password after modification, that is, the user information of the user fails to verify, and the user is prohibited from logging in the baseboard management controller.
In another embodiment, if the second user name is BMC202310 and the second password is mima2023, it can be seen that the password and the user name input to the BMC are both wrong, i.e. the user information of the user fails to verify, and the user is forbidden to log in the baseboard management controller.
In one embodiment of the present invention, after the step of prohibiting the user from logging into the baseboard management controller, the method further includes:
recording a first number of times that the second user name is different from the initial user name; recording a second number of times that the second password is different from the modified password; when the sum of the first times and the second times reaches the preset times, sending an alarm signal to the corresponding terminal equipment according to the terminal user number, wherein the alarm signal is used for indicating that the baseboard management controller is locked.
In the embodiment of the invention, the preset times refer to the times of allowing the BMC to input errors, the first times are the times of inputting the error user name, the second times are the times of inputting the error password, in one example, the preset times are 3 times, if the first times are 1, the second times are 1, and the sum of the first times and the second times is 2 to be less than 3, the user name and the password are indicated to be input once more.
In another example, if the first number is 2, the second number is 1, and the sum of the first number and the second number is 3 and is equal to 3, then it indicates that the user has reached the number of times that the BMC allows the error transmission, and the server may send an alarm signal to the terminal device corresponding to the user bound to the BMC according to the terminal user number, so that the user knows that the BMC has been locked; the invention sends the alarm information to the user through the server background when the abnormal login exceeds the specified times so as to know the risk in advance.
And step 208, after the user information of the user passes the verification, generating an anti-counterfeiting code according to the hardware information of the server, and sending the anti-counterfeiting code to the terminal equipment corresponding to the user bound with the baseboard management controller.
In the embodiment of the invention, if the second user name is BMC202310 and the second password is MIma2023%, the security authentication is indicated to pass; in one example, the user's end user number is described by way of example as a phone number, i.e., the phone number bound to the initial user of the BMC is 133XXXXXX, and the server may send the security code to the corresponding phone 133 XXXXXX.
In one embodiment of the present invention, generating an anti-fake code according to hardware information of a server includes:
and processing the hardware information of the server by adopting a time stamp algorithm to generate an anti-counterfeiting code.
In one embodiment of the present invention, the hardware information of the server includes: an ethernet address, a universally unique identification code.
In the embodiment of the invention, the server can acquire the Ethernet address as E0-06-E6-39-86-31 and the universal unique identification code as 123E4567-E89b-12d3-a456-426655440000, and then adopts a time stamp algorithm to process the Ethernet address and the universal unique identification code to generate the anti-counterfeiting code.
The anti-fake code is also stored in the EEPROM of the server.
Step 209, receiving ciphertext information sent by the management application of the terminal device, where the ciphertext information is obtained by encrypting the management application of the terminal device based on the anti-counterfeiting code and the terminal user number.
In one embodiment of the present invention, the encryption key used for ciphertext information is an asymmetric encryption key or a symmetric encryption key.
Step 210, decrypting the ciphertext information to obtain an anti-counterfeiting code and a terminal user number;
step 211, checking the anti-counterfeiting code and the end user number, and if the anti-counterfeiting code and the end user number pass the checking, allowing the user to log in the baseboard management controller.
In the embodiment of the invention, the decrypted anti-counterfeiting code can be compared with the pre-stored anti-counterfeiting code in the EEPROM, the decrypted terminal user number is compared with the pre-stored terminal user number in the EEPROM, and if the decrypted anti-counterfeiting code is consistent with the pre-stored anti-counterfeiting code in the EEPROM and the decrypted terminal user number is consistent with the pre-stored terminal user number in the EEPROM, the verification of the anti-counterfeiting code and the terminal user number is passed; if the decrypted anti-counterfeiting code is inconsistent with the pre-stored anti-counterfeiting code in the EEPROM, and/or the decrypted end user number is inconsistent with the pre-stored end user number of the user in the EEPROM, the anti-counterfeiting code and the end user number are not verified, and the user is not allowed to log in the baseboard management controller.
In one embodiment of the present invention, the method further comprises:
and sending instruction information to the target terminal equipment according to the terminal user number, wherein the instruction information is used for characterizing a management application program allowing the user to log in the target terminal equipment.
In the embodiment of the invention, if the anti-counterfeiting code and the terminal user number pass verification, the server can send instruction information to the terminal equipment bound with the BMC at the moment so as to allow the management application program of the terminal equipment to log in.
According to the invention, the security of logging in the baseboard management controller is improved by performing first re-security authentication on the user and then performing second re-security authentication on the anti-counterfeiting code generated by the server, and the anti-counterfeiting code is encrypted by the terminal equipment corresponding to the user and sent to the baseboard management controller and is not directly input into the interface of the baseboard management controller, so that the risk that the anti-counterfeiting code is stolen to log in directly is avoided, the BMC login is safer and is not easy to crack, and the security of the server is further ensured.
Fig. 3 shows a flowchart of steps of another login method of a baseboard management controller according to an embodiment of the present invention, where the flowchart is applied to a terminal device, and the terminal device is deployed with a management application, and the terminal device is connected to a server through a wireless network, where the method may include the following steps:
step 301, receiving an anti-counterfeiting code sent by a server, and performing security verification on the anti-counterfeiting code, wherein the anti-counterfeiting code is generated based on hardware information after the server performs security authentication on a user.
In the embodiment of the invention, the terminal equipment can receive the anti-counterfeiting code sent by the user, and then the anti-counterfeiting code is subjected to security verification so as to prevent a stealer from automatically installing an application program and logging in after the anti-counterfeiting code is stolen.
In one embodiment of the present invention, the terminal device includes a verification security code corresponding to the personal identification code; performing security verification on the anti-counterfeiting code, including:
judging whether the anti-counterfeiting code is identical to the check anti-counterfeiting code or not; if the anti-counterfeiting code is the same as the verification anti-counterfeiting code, the anti-counterfeiting code passes the security authentication.
In the embodiment of the invention, the personal identification code of the terminal equipment corresponds to the verification anti-counterfeiting code one by one, namely, one terminal only corresponds to the unique verification code, if the anti-counterfeiting code is identical to the verification anti-counterfeiting code, the anti-counterfeiting security authentication is proved to pass, if the anti-counterfeiting code is not identical to the verification anti-counterfeiting code, the anti-counterfeiting code security authentication is not passed, at the moment, after the server receives the ciphertext information, the user is forbidden to log in the BMC because the anti-counterfeiting code security authentication is not passed, and the user is forbidden to log in the management application program of the terminal equipment.
According to the invention, even though the stealer acquires the anti-fake code and the terminal user number and downloads the management application program, the server cannot allow the stealer to log in the BMC or allow the stealer to log in the management application program because the anti-fake code is inconsistent with the verification anti-fake code of the stealer, so that the login safety of the BMC is further improved.
And 302, encrypting the anti-counterfeiting code and the terminal user number to obtain ciphertext information after the anti-counterfeiting code passes the security verification.
Specifically, after the security verification of the security code is passed, the user may input the security code and the end user number in the management application, and then the management application encrypts the security code and the end user number to obtain ciphertext information, where the encryption mode is specifically selected, and is not limited herein.
Step 303, obtain the internet protocol address of the server, send the ciphertext information to the server according to the internet protocol address, in order to make the server check anti-counterfeiting code and end user number that the ciphertext information is decrypted, and allow users to log in the baseboard management controller when checking passes.
In the embodiment of the invention, a user can input the internet protocol address of the server on the login interface of the management application program, then click on the login control, and at the moment, ciphertext information can be sent to the server according to the internet protocol address.
After the server receives the ciphertext information, the ciphertext information can be decrypted by adopting a decryption key corresponding to the encryption key to obtain an anti-counterfeiting code and a terminal user number, the anti-counterfeiting code and the terminal user number obtained by decryption are verified according to the anti-counterfeiting code and the terminal user number which are stored in the EEPROM in advance, if the anti-counterfeiting code and the terminal user number are consistent, the verification is passed, and at the moment, the server can send a login permission command to the BMC so that the user can log in the baseboard management controller successfully.
Step 304, receiving instruction information sent by the server, where the instruction information is used to characterize a management application program that allows a user to log in to the terminal device.
In response to the instruction information, the management application is logged in step 305.
According to the invention, the security of logging in the baseboard management controller is improved by performing first re-security authentication on the user and then performing second re-security authentication on the anti-counterfeiting code generated by the server, and the anti-counterfeiting code is encrypted by the terminal equipment corresponding to the user and sent to the baseboard management controller and is not directly input into the interface of the baseboard management controller, so that the risk that the anti-counterfeiting code is stolen to log in directly is avoided, the BMC login is safer and is not easy to crack, and the security of the server is further ensured.
As shown in fig. 4, a flow chart of a BMC login method provided by the embodiment of the present invention may determine whether a first user name and an initial user name of a user input BMC are the same when the user logs in the BMC for the first time, and determine whether a first password of the user input BMC is the same as the initial password, and if the first user name is different from the initial user name, and/or the first password is different from the initial password, prohibit the user from logging in the baseboard management controller.
If the first user name is the same as the initial user name, and the first password is the same as the initial password, the initial password is modified, the BMC initial user name, the mobile phone number (terminal user number) and the modified password are bound into the EEPROM one by one, when logging in for the second time, a user inputs a second user name and a second password on a BMC interface, a server calls the BMC initial user name and the modified password stored in the EEPROM to verify the second user name and the second password, if the verification is not passed, the user name and the password are displayed to be incorrect, when the continuous error transmission is carried out for three times, the BMC is locked, and at the moment, the BMC bound with the BMC can be sent with alarm information to inform the user that the BMC is locked.
When the second user name and the second password pass verification, the server can process the acquired Ethernet address and the universal unique identification code by adopting a time stamp algorithm, generate an anti-counterfeiting code, store the anti-counterfeiting code into an EEPROM, and send the anti-counterfeiting code to a mobile phone corresponding to the mobile phone number bound with the BMC.
After receiving the anti-counterfeiting code, the user can input the IP address, the mobile phone number and the anti-counterfeiting code of the server in the management application program, then click a login button in the management application program, and at the moment, the management application program can encrypt the mobile phone number and the anti-counterfeiting code to obtain ciphertext information and then send the ciphertext information to the server.
After receiving the ciphertext information, the server can decrypt the ciphertext information to obtain the mobile phone number and the anti-counterfeiting code, and perform login verification on the mobile phone number and the anti-counterfeiting code obtained by decryption, if verification is successful, the user is allowed to login the BMC, and instruction information is sent to the mobile phone of the user to enable the management application program to allow the user to login, so that collaborative login of the BMC and the management application program is realized.
If the verification of the mobile phone number and the anti-counterfeiting code obtained through decryption fails, the BMC login fails, and the login management application program is forbidden at the moment.
According to the invention, the security of logging in the baseboard management controller is improved by performing first re-security authentication on the user and then performing second re-security authentication on the anti-counterfeiting code generated by the server, and the anti-counterfeiting code is encrypted by the terminal equipment corresponding to the user and sent to the baseboard management controller and is not directly input into the interface of the baseboard management controller, so that the risk that the anti-counterfeiting code is stolen to log in directly is avoided, the BMC login is safer and is not easy to crack, and the security of the server is further ensured.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred embodiments, and that the acts are not necessarily required by the embodiments of the invention.
Referring to fig. 5, a block diagram of an apparatus provided by an embodiment of the present invention is shown and applied to a server, where the server includes a baseboard management controller, and the server is connected to at least one terminal device through a wireless network, and the terminal device is deployed with a management application; the method specifically comprises the following modules:
the determining module 401 is configured to determine whether the user logs in to the baseboard management controller for the first time.
A first verification module 402, configured to verify user information of the user when the baseboard management controller is not logged in for the first time;
the first sending module 403 is configured to generate an anti-counterfeiting code according to hardware information of the server after user information of the user passes verification, and send the anti-counterfeiting code to a terminal device corresponding to the user bound to the baseboard management controller;
The receiving module 404 is configured to receive ciphertext information sent by a management application of the terminal device, where the ciphertext information is obtained by encrypting the management application of the terminal device based on an anti-counterfeiting code and a terminal user number;
a decryption module 405, configured to decrypt the ciphertext information to obtain an anti-counterfeiting code and a terminal user number;
and a second checking module 406, configured to check the anti-counterfeiting code and the end user number, and if the anti-counterfeiting code and the end user number pass the check, allow the user to log in the baseboard management controller.
In an embodiment of the present invention, the server further includes: a charged erasable programmable read-only memory, the apparatus further comprising:
the third verification module is used for verifying the first user name and the first password input by the user when logging in the baseboard management controller for the first time;
and the storage module is used for modifying the initial password of the baseboard management controller after the first user name and the first password pass verification, binding the initial user name of the baseboard management controller with the terminal user number of the user and the modified password, and storing the binding into the electrified erasable programmable read-only memory.
In one embodiment of the present invention, the charged eeprom includes an initial user name and an initial password of the baseboard management controller, and the third verification module includes:
a first judging sub-module, configured to judge whether the first user name is the same as the initial user name of the baseboard management controller, and judge whether the first password is the same as the initial password of the baseboard management controller;
and the first determining submodule is used for checking the first user name and the first password if the first user name is the same as the initial user name and the first password is the same as the initial password.
In an embodiment of the present invention, the third verification module further includes:
and the second determining submodule is used for checking whether the first user name and the initial user name are different and/or whether the first password and the initial password are different or not.
The apparatus further comprises:
and the first prohibition submodule is used for prohibiting the user from logging in the baseboard management controller.
In an embodiment of the present invention, the first verification module includes:
The first acquisition sub-module is used for acquiring a second user name and a second password input by the user;
a second judging sub-module, configured to judge whether the second user name is the same as the initial user name, and judge whether the second password is the same as the modified password;
and the third determining submodule is used for passing the security authentication if the second user name is the same as the initial user name and the second password is the same as the modified password.
In an embodiment of the present invention, the first verification module further includes:
and a fourth determining sub-module, if the second user name is different from the initial user name and/or the second password is different from the modified password, the user information verification of the user is not passed.
The apparatus further comprises:
and the second prohibition submodule is used for prohibiting the user from logging in the baseboard management controller.
In an embodiment of the present invention, the first verification module further includes:
a first recording sub-module, configured to record a first number of times that the second user name is different from the initial user name;
a second recording sub-module for recording a second number of times that the second password is different from the modified password;
And the alarm sub-module is used for sending an alarm signal to the corresponding terminal equipment according to the terminal user number when the sum of the first times and the second times reaches the preset times, wherein the alarm signal is used for indicating that the baseboard management controller is locked.
In an embodiment of the present invention, the first transmitting module includes:
and the generation sub-module is used for processing the hardware information of the server by adopting a time stamp algorithm to generate the anti-counterfeiting code.
Optionally, the hardware information of the server includes:
an ethernet address, a universally unique identification code.
In one embodiment of the present invention, the encryption key used for the ciphertext information is an asymmetric encryption key or a symmetric encryption key.
In one embodiment of the present invention, the apparatus further comprises:
and the second sending module is used for sending instruction information to the target terminal equipment according to the terminal user number, wherein the instruction information is used for characterizing a management application program allowing the user to log in the target terminal equipment.
The invention discloses a login device of a baseboard management controller, which improves the security of the login baseboard management controller by carrying out first re-security authentication on a user and then carrying out second re-security authentication on the basis of an anti-counterfeiting code generated by a server, and the anti-counterfeiting code is encrypted by terminal equipment corresponding to the user and sent to the baseboard management controller and is not directly input at an interface of the baseboard management controller, thereby avoiding the risk that the anti-counterfeiting code is stolen to be directly logged in, ensuring that the BMC login is safer and not easy to crack, and further guaranteeing the security of the server.
For the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
Referring to fig. 6, a block diagram of an electronic device 50 according to an embodiment of the present invention is provided, including:
the processor 501, the memory 502, and the computer program 5021 stored in the memory 502 and capable of running on the processor 501, where the computer program 5021 when executed by the processor 501 implements the processes of the above embodiment of the baseboard management controller login method, and the same technical effects can be achieved, and for avoiding repetition, a detailed description is omitted herein.
Fig. 7 shows a block diagram of a computer readable storage medium 60 according to an embodiment of the present invention, where a computer program 601 is stored on the computer readable storage medium 60, and when the computer program 601 is executed by a processor, the processes of the above embodiment of the baseboard management controller login method are implemented, and the same technical effects can be achieved, so that repetition is avoided and redundant description is omitted.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described by differences from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other.
It will be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the invention may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or terminal device comprising the element.
The above description of the present invention provides a method, apparatus, device and storage medium for logging in a baseboard management controller, and specific examples are applied to illustrate the principles and embodiments of the present invention, and the above description of the embodiments is only used to help understand the method and core idea of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (16)

1. The login method of the baseboard management controller is characterized by being applied to a server, wherein the server comprises the baseboard management controller, the server is connected with at least one terminal device through a wireless network, and the terminal device is provided with a management application program; the method comprises the following steps:
judging whether a user logs in the baseboard management controller for the first time;
when the baseboard management controller is not logged in for the first time, checking the user information of the user;
after the user information of the user passes the verification, generating an anti-counterfeiting code according to the hardware information of the server, and sending the anti-counterfeiting code to terminal equipment corresponding to the user bound with the baseboard management controller;
receiving ciphertext information sent by a management application program of the terminal equipment, wherein the ciphertext information is obtained by encrypting the management application program of the terminal equipment based on the anti-fake code and the terminal user number;
decrypting the ciphertext information to obtain an anti-counterfeiting code and a terminal user number;
and checking the anti-counterfeiting code and the terminal user number, and allowing the user to log in the baseboard management controller if the anti-counterfeiting code and the terminal user number pass the checking.
2. The method of claim 1, wherein the server further comprises: and after the step of determining whether the user logs in the baseboard management controller for the first time, the method further comprises the following steps:
when logging in the baseboard management controller for the first time, checking a first user name and a first password input by the user;
and when the first user name and the first password pass verification, modifying the initial password of the baseboard management controller, binding the initial user name of the baseboard management controller with the terminal user number of the user and the modified password, and storing the binding in the charged erasable programmable read-only memory.
3. The method of claim 2, wherein the charged eeprom comprises an initial username and an initial password of a baseboard management controller, and wherein verifying the first username and the first password entered by the user comprises:
judging whether the first user name is the same as the initial user name of the baseboard management controller or not, and judging whether the first password is the same as the initial password of the baseboard management controller or not;
And if the first user name is the same as the initial user name and the first password is the same as the initial password, checking the first user name and the first password.
4. The method of claim 3, wherein the verifying the first username and the first password further comprises:
if the first user name is different from the initial user name and/or the first password is different from the initial password, the first user name and the first password are not checked;
the method further comprises the steps of:
and prohibiting the user from logging in the baseboard management controller.
5. The method of claim 2, wherein verifying the user information of the user comprises:
acquiring a second user name and a second password input by the user;
judging whether the second user name is the same as the initial user name, and judging whether the second password is the same as the modified password;
and if the second user name is the same as the initial user name and the second password is the same as the modified password, checking the user information of the user.
6. The method of claim 5, wherein verifying the user information of the user further comprises:
if the second user name is different from the initial user name and/or the second password is different from the modified password, the user information verification of the user is not passed;
the method further comprises the steps of:
and prohibiting the user from logging in the baseboard management controller.
7. The method of claim 6, wherein after the step of prohibiting the user from logging into the baseboard management controller, further comprising:
recording a first number of times that the second user name is different from the initial user name;
recording a second number of times the second password is different from the modified password;
and when the sum of the first times and the second times reaches the preset times, sending an alarm signal to the corresponding terminal equipment according to the terminal user number, wherein the alarm signal is used for indicating that the baseboard management controller is locked.
8. The method of claim 1, wherein generating anti-counterfeiting code according to the hardware information of the server comprises:
and processing the hardware information of the server by adopting a time stamp algorithm to generate an anti-fake code.
9. The method of claim 8, wherein the hardware information of the server comprises:
an ethernet address, a universally unique identification code.
10. The method of claim 1, wherein the cipher text information employs an encryption key that is an asymmetric encryption key or a symmetric encryption key.
11. The method according to claim 1, wherein the method further comprises:
and sending instruction information to target terminal equipment according to the terminal user number, wherein the instruction information is used for characterizing a management application program allowing the user to log in the target terminal equipment.
12. A method for logging in a baseboard management controller, which is applied to a terminal device, wherein a management application program is deployed on the terminal device, and the terminal device is connected with a server through a wireless network, the method comprising:
receiving an anti-counterfeiting code sent by the server, and carrying out security verification on the anti-counterfeiting code, wherein the anti-counterfeiting code is generated based on hardware information after the server carries out security authentication on a user;
after the security verification of the anti-counterfeiting code is passed, encrypting the anti-counterfeiting code and the terminal user number to obtain ciphertext information;
Acquiring an internet protocol address of a server, transmitting the ciphertext information to the server according to the internet protocol address, checking an anti-counterfeiting code and a terminal user number obtained after the ciphertext information is decrypted by the server, and allowing the user to log in the baseboard management controller when the checking is passed;
receiving instruction information sent by the server, wherein the instruction information is used for characterizing a management application program allowing the user to log in the terminal equipment;
and responding to the instruction information, and logging in the management application program.
13. The method of claim 12, wherein the terminal device includes a verification security code corresponding to a personal identification code; the security verification of the anti-counterfeiting code comprises the following steps:
judging whether the anti-counterfeiting code is the same as the verification anti-counterfeiting code or not;
and if the anti-counterfeiting code is the same as the check anti-counterfeiting code, the anti-counterfeiting code passes the security authentication.
14. The login device of the baseboard management controller is characterized by being applied to a server, wherein the server comprises the baseboard management controller, the server is connected with at least one terminal device through a wireless network, and the terminal device is provided with a management application program; the device comprises:
The judging module is used for judging whether the user logs in the baseboard management controller for the first time or not;
the first verification module is used for verifying the user information of the user when the baseboard management controller is not logged in for the first time;
the first sending module is used for generating anti-counterfeiting codes according to the hardware information of the server after the user information of the user passes verification, and sending the anti-counterfeiting codes to terminal equipment corresponding to the user bound with the baseboard management controller;
the receiving module is used for receiving ciphertext information sent by the management application program of the terminal equipment, wherein the ciphertext information is obtained by encrypting the management application program of the terminal equipment based on the anti-counterfeiting code and the terminal user number;
the decryption module is used for decrypting the ciphertext information to obtain an anti-counterfeiting code and a terminal user number;
and the second checking module is used for checking the anti-counterfeiting code and the terminal user number, and if the anti-counterfeiting code and the terminal user number pass the checking, the user is allowed to log in the baseboard management controller.
15. An electronic device, comprising: a processor, a memory and a computer program stored on the memory and capable of running on the processor, which when executed by the processor performs the steps of the baseboard management controller login method according to any one of claims 1-13.
16. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the baseboard management controller login method according to any one of claims 1-13.
CN202311523115.4A 2023-11-15 2023-11-15 Method, device, equipment and storage medium for logging in baseboard management controller Active CN117251836B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311523115.4A CN117251836B (en) 2023-11-15 2023-11-15 Method, device, equipment and storage medium for logging in baseboard management controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311523115.4A CN117251836B (en) 2023-11-15 2023-11-15 Method, device, equipment and storage medium for logging in baseboard management controller

Publications (2)

Publication Number Publication Date
CN117251836A true CN117251836A (en) 2023-12-19
CN117251836B CN117251836B (en) 2024-02-20

Family

ID=89126746

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311523115.4A Active CN117251836B (en) 2023-11-15 2023-11-15 Method, device, equipment and storage medium for logging in baseboard management controller

Country Status (1)

Country Link
CN (1) CN117251836B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210871A (en) * 2019-02-15 2019-09-06 浙江萨宝信息科技有限公司 A kind of false proof device and its method of cash register
CN111884814A (en) * 2020-08-06 2020-11-03 山东省计算中心(国家超级计算济南中心) Method and system for preventing counterfeiting of intelligent terminal
CN112671749A (en) * 2020-12-17 2021-04-16 武汉理工大学 Artificial intelligence platform anti-counterfeiting login method based on high security
CN113472793A (en) * 2021-07-01 2021-10-01 中易通科技股份有限公司 Personal data protection system based on hardware password equipment
CN115576779A (en) * 2022-10-26 2023-01-06 苏州浪潮智能科技有限公司 Management method and device of server hardware information, computer equipment and storage medium
WO2023071990A1 (en) * 2021-10-27 2023-05-04 北京琥珀创想科技有限公司 Privacy protection method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210871A (en) * 2019-02-15 2019-09-06 浙江萨宝信息科技有限公司 A kind of false proof device and its method of cash register
CN111884814A (en) * 2020-08-06 2020-11-03 山东省计算中心(国家超级计算济南中心) Method and system for preventing counterfeiting of intelligent terminal
CN112671749A (en) * 2020-12-17 2021-04-16 武汉理工大学 Artificial intelligence platform anti-counterfeiting login method based on high security
CN113472793A (en) * 2021-07-01 2021-10-01 中易通科技股份有限公司 Personal data protection system based on hardware password equipment
WO2023071990A1 (en) * 2021-10-27 2023-05-04 北京琥珀创想科技有限公司 Privacy protection method and system
CN115576779A (en) * 2022-10-26 2023-01-06 苏州浪潮智能科技有限公司 Management method and device of server hardware information, computer equipment and storage medium

Also Published As

Publication number Publication date
CN117251836B (en) 2024-02-20

Similar Documents

Publication Publication Date Title
US8930700B2 (en) Remote device secure data file storage system and method
CN108684041B (en) System and method for login authentication
CN108322461B (en) Method, system, device, equipment and medium for automatically logging in application program
JP4016019B2 (en) Apparatus, system, and method for providing authorized remote access to a target system
US8590024B2 (en) Method for generating digital fingerprint using pseudo random number code
CN108965222B (en) Identity authentication method, system and computer readable storage medium
CN109101795A (en) A kind of account number safe login method, apparatus and system
EP3648396A1 (en) Maintenance system and maintenance method
CN109040070B (en) File transmission method, device and computer readable storage medium
US20190026456A1 (en) Methods and Apparatus for Authentication of Joint Account Login
CN109272617B (en) Unlocking verification method, server, door lock, electronic device and storage medium
WO2016014120A1 (en) Device authentication agent
CN106790183A (en) Logging on authentication method of calibration, device
CN104717224B (en) A kind of login method and device
CN103825738A (en) Registration information authentication method and device
CN101841814B (en) Terminal authentication method and system
CN112887340B (en) Password resetting method and device, service management terminal and storage medium
CN110311895A (en) Session authorization check method, system and the electronic equipment of identity-based verifying
CN106302606A (en) A kind of across application access method and device
CN109981677B (en) Credit granting management method and device
CN105187417B (en) Authority acquiring method and apparatus
CN105099686A (en) Data synchronization method, server, terminal and system
CN117251836B (en) Method, device, equipment and storage medium for logging in baseboard management controller
CN114070571B (en) Method, device, terminal and storage medium for establishing connection
CN110582986B (en) Security authentication method for generating security key by combining authentication factors of multiple users

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant