TWI746361B - Inspection and correction system of server's configuration based on hash algorithm and method thereof - Google Patents

Inspection and correction system of server's configuration based on hash algorithm and method thereof Download PDF

Info

Publication number
TWI746361B
TWI746361B TW110103491A TW110103491A TWI746361B TW I746361 B TWI746361 B TW I746361B TW 110103491 A TW110103491 A TW 110103491A TW 110103491 A TW110103491 A TW 110103491A TW I746361 B TWI746361 B TW I746361B
Authority
TW
Taiwan
Prior art keywords
server
program
legal
verification
correction
Prior art date
Application number
TW110103491A
Other languages
Chinese (zh)
Other versions
TW202134874A (en
Inventor
許銘峻
傅傳雲
Original Assignee
華南商業銀行股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 華南商業銀行股份有限公司 filed Critical 華南商業銀行股份有限公司
Priority to TW110103491A priority Critical patent/TWI746361B/en
Publication of TW202134874A publication Critical patent/TW202134874A/en
Application granted granted Critical
Publication of TWI746361B publication Critical patent/TWI746361B/en

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

An inspection and correction system of server’s configuration comprises an authorization device and a server. The authorization device comprises a storage circuit and a control circuit. The storage circuit stores a hardware internal code and a first hash value. The control circuit comprises a first and a second trigger component. The control circuit respectively generates a first or a second operating signal when the first or second trigger component receives a trigger operation. The server is configured to install a verification program, an inspection program, and a correction program. The verification program is configured to determine whether the authorization device, the inspection program and the correction program are valid. The inspection program is performed to generate an inspection report after the determination result of the verification program is valid and the first operating signal is received. The correction program is performed to fix at least one configuration of the server after the determination result of the verification program is valid and the second operating signal is received.

Description

基於雜湊演算法的伺服器組態檢核及修正系統及其方法Server configuration checking and correcting system and method based on hash algorithm

本發明係關於伺服器的組態檢核與修正,特別是一種透過授權裝置進行伺服器組態檢核及修正的系統及方法。The present invention relates to server configuration checking and modification, in particular to a system and method for server configuration checking and modification through an authorized device.

金融機構購入的新伺服器或電腦可安裝各種開放式作業系統例如Windows、AIX、Linux等。這些伺服器在實際上線運作之前,資安人員需要先確認每台伺服器或電腦中的安全設定皆符合內部規範。New servers or computers purchased by financial institutions can be installed with various open operating systems such as Windows, AIX, Linux, etc. Before these servers actually operate online, information security personnel need to confirm that the security settings in each server or computer comply with internal regulations.

然而,現今核對伺服器組態的方式耗費大量人力及工時。詳言之,檢核人員必須熟悉Windows 的PowerShell、Linux的Bash或IBM AIX的korn shell等命令列介面的指令操作方可順利進行檢核。此外,不只檢核費力費時,針對參數設定錯誤的伺服器組態進行修正的操作同樣需要大量時間及人力成本。再者,由於開放式伺服器作業系統的版本眾多,當伺服器更新作業系統的版本時,前次用於檢核或修正伺服器組態的指令亦可能隨之更新,因此導致檢核及程式開發人員未必能全部採用先前的指令迅速完成相關作業,增加檢核與修正作業上的困難程度。另外不容忽視的一點是,採用人工檢查的方式,很有可能因為檢核人員的一個小疏失而影響整個伺服器系統的穩定性與安全性。However, the current method of checking the server configuration consumes a lot of manpower and man-hours. In detail, the inspector must be familiar with the command operation of the command line interface such as PowerShell of Windows, Bash of Linux, or korn shell of IBM AIX in order to conduct the inspection smoothly. In addition, not only checking is laborious and time-consuming, but also correcting a server configuration with incorrect parameter settings also requires a lot of time and labor costs. Furthermore, due to the numerous versions of the open server operating system, when the server updates the version of the operating system, the previous commands used to check or modify the server configuration may also be updated, resulting in checks and programs Developers may not be able to use all previous instructions to quickly complete related operations, which increases the difficulty of checking and correcting operations. Another point that cannot be ignored is that the use of manual inspection is likely to affect the stability and security of the entire server system due to a small error by the inspector.

有鑑於此,本發明提出一種伺服器組態檢核修正系統與檢核及修正伺服器組態的方法,在達到金融機構對於資訊安全需求的前提下,節省進行伺服器組態檢核及修正程序的人力及時間成本。In view of this, the present invention proposes a server configuration verification and correction system and a method for verifying and correcting the server configuration. Under the premise of meeting the information security requirements of financial institutions, the server configuration verification and correction are saved. The labor and time cost of the procedure.

依據本發明一實施例的一種伺服器組態檢核及修正系統,包括授權裝置及伺服器。授權裝置包括儲存電路及控制電路。儲存電路用以存放硬體內碼及第一雜湊值。控制電路包括第一觸發元件及第二觸發元件。控制電路用以於第一觸發元件接收觸發操作時產生第一操作訊號,且於第二觸發元件接收另一觸發操作時產生第二操作訊號。伺服器電性連接授權裝置。伺服器用以安裝驗證程式、檢核程式及修正程式。驗證程式用以判斷授權裝置、檢核程式及修正程式是否合法。檢核程式用以於驗證程式判斷為合法之後且接收到第一操作訊號時執行以產生檢核報告。修正程式用以於驗證程式判斷為合法之後且接收到第二操作訊號時執行以修正伺服器之至少一組態值。A server configuration verification and correction system according to an embodiment of the present invention includes an authorization device and a server. The authorization device includes a storage circuit and a control circuit. The storage circuit is used to store the internal hardware code and the first hash value. The control circuit includes a first trigger element and a second trigger element. The control circuit is used for generating a first operation signal when the first trigger element receives a trigger operation, and generates a second operation signal when the second trigger element receives another trigger operation. The server is electrically connected to the authorization device. The server is used to install verification programs, verification programs, and correction programs. The verification program is used to determine whether the authorized device, the verification program, and the correction program are legal. The verification program is used to execute after the verification program is judged to be legal and when the first operation signal is received to generate a verification report. The correction program is used to execute after the verification program is judged to be legal and when the second operation signal is received to correct at least one configuration value of the server.

依據本發明一實施例的一種檢核及修正伺服器組態的方法,包括:以授權裝置電性連接安裝有檢核程式及修正程式的伺服器;伺服器執行驗證程式以判斷授權裝置、檢核程式及修正程式是否合法;當驗證程式判斷授權裝置、檢核程式及修正程式皆合法時,以授權裝置輸出第一操作訊號及第二操作訊號其中一者;其中當伺服器接收第一操作訊號時,執行檢核程式以產生檢核報告;或當伺服器接收第二操作訊號時,執行修正程式以修正伺服器之至少一組態值。A method for checking and correcting server configuration according to an embodiment of the present invention includes: electrically connecting a server with a verification program and a correction program to an authorized device; the server executes the verification program to determine the authorized device, Whether the verification program and the correction program are legal; when the verification program determines that the authorized device, the verification program and the correction program are all legal, the authorized device outputs one of the first operation signal and the second operation signal; among them, when the server receives the first operation When the signal is detected, the verification program is executed to generate a verification report; or when the server receives the second operation signal, the correction program is executed to modify at least one configuration value of the server.

以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本發明之精神與原理,並且提供本發明之專利申請範圍更進一步之解釋。The above description of the disclosure and the following description of the embodiments are used to demonstrate and explain the spirit and principle of the present invention, and to provide a further explanation of the scope of the patent application of the present invention.

以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。以下之實施例係進一步詳細說明本發明之觀點,但非以任何觀點限制本發明之範疇。The detailed features and advantages of the present invention will be described in detail in the following embodiments. The content is sufficient to enable anyone familiar with the relevant art to understand the technical content of the present invention and implement it accordingly, and according to the content disclosed in this specification, the scope of patent application and the drawings. Anyone who is familiar with relevant skills can easily understand the purpose and advantages of the present invention. The following examples further illustrate the viewpoints of the present invention in detail, but do not limit the scope of the present invention by any viewpoint.

圖1係依據本發明一實施例的伺服器組態檢核及修正系統10所繪示的方塊架構圖。如圖1所示,伺服器組態檢核及修正系統10包括授權裝置1及伺服器3。授權裝置1電性連接伺服器3。具體來說,授權裝置1基於通用序列匯流排(Universal Serial Bus,USB)標準中的人性化界面裝置(Human Interface Device,HID)協定電性連接伺服器3。相較於使用通用序列匯流排(Universal Serial Bus,USB)標準中的USB大容量儲存裝置(Mass Stroage Device Class,MSC)協定作為連接介面的授權裝置,採用HID協定可降低電腦中毒的風險。另外,採用HID協定的授權裝置1可用於被禁用USB連接埠的伺服器3。FIG. 1 is a block diagram of a server configuration checking and correcting system 10 according to an embodiment of the present invention. As shown in FIG. 1, the server configuration verification and correction system 10 includes an authorization device 1 and a server 3. The authorization device 1 is electrically connected to the server 3. Specifically, the authorization device 1 is electrically connected to the server 3 based on the Human Interface Device (HID) protocol in the Universal Serial Bus (USB) standard. Compared with the use of the USB Mass Stroage Device Class (MSC) protocol in the Universal Serial Bus (USB) standard as the authorized device for the connection interface, the use of the HID protocol can reduce the risk of computer poisoning. In addition, the authorization device 1 using the HID protocol can be used for the server 3 whose USB port is disabled.

請參考圖1。授權裝置1包括儲存電路12及控制電路14。儲存電路12可存放硬體內碼及第一雜湊值,其中硬體內碼及第一雜湊值係預先被寫入至儲存電路12。硬體內碼用以證明授權裝置1屬於可信賴的裝置。第一雜湊值用以供伺服器3比對以確認本身安裝的程式是否未遭竄改。關於硬體內碼及第一雜湊值的應用方式將於後文詳述之。Please refer to Figure 1. The authorization device 1 includes a storage circuit 12 and a control circuit 14. The storage circuit 12 can store the internal hardware code and the first hash value, wherein the internal hardware code and the first hash value are written into the storage circuit 12 in advance. The internal hardware code is used to prove that the authorized device 1 is a trusted device. The first hash value is used for comparison by the server 3 to confirm whether the installed program has not been tampered with. The application method of the internal code and the first hash value will be described in detail later.

控制電路14包括第一觸發元件16及第二觸發元件18。請參考圖2,圖2係依據本發明一實施例的伺服器組態檢核及修正系統10所繪示的授權裝置1與伺服器3的連接示意圖。實務上,授權裝置1例如係以USB隨身碟型態的外觀呈現,透過連接頭11電性連接至伺服器3。而第一觸發元件16及第二觸發元件18例如係以按鈕或切換開關的方式呈現。第二觸發元件18的外部可更包括一保護殼19以防止誤觸。須注意的是,上述外觀型態僅作為示例而非用以限制本發明。The control circuit 14 includes a first trigger element 16 and a second trigger element 18. Please refer to FIG. 2, which is a schematic diagram of the connection between the authorization device 1 and the server 3 shown in the server configuration verification and correction system 10 according to an embodiment of the present invention. In practice, the authorization device 1 is presented in the appearance of a USB flash drive, for example, and is electrically connected to the server 3 through the connector 11. The first trigger element 16 and the second trigger element 18 are presented in the form of buttons or toggle switches, for example. The outside of the second trigger element 18 may further include a protective shell 19 to prevent accidental touch. It should be noted that the above-mentioned appearance types are only examples and not intended to limit the present invention.

請參考圖1。在第一觸發元件16接收觸發操作時,控制電路14產生第一操作訊號。在第二觸發元件18接收另一觸發操作時,控制電路14產生第二操作訊號。所述的觸發操作例如係按下按鈕或是撥動切換開關,本發明並不限制觸發操作的方式。Please refer to Figure 1. When the first trigger element 16 receives a trigger operation, the control circuit 14 generates a first operation signal. When the second trigger element 18 receives another trigger operation, the control circuit 14 generates a second operation signal. The triggering operation is, for example, pressing a button or flipping a switch, and the present invention does not limit the way of triggering operation.

請一併參考圖1及圖3,圖3係繪示本發明一實施例的檢核及修正伺服器組態的方法的流程圖。伺服器3包括運算電路32及儲存電路34。運算電路32電性連接至儲存電路34。儲存電路34可預先安裝驗證程式、檢核程式及修正程式,如圖3的步驟S0所示。Please refer to FIG. 1 and FIG. 3 together. FIG. 3 shows a flowchart of a method for checking and correcting a server configuration according to an embodiment of the present invention. The server 3 includes an arithmetic circuit 32 and a storage circuit 34. The arithmetic circuit 32 is electrically connected to the storage circuit 34. The storage circuit 34 can be pre-installed with a verification program, a verification program, and a correction program, as shown in step S0 of FIG. 3.

請參考步驟S1:將授權裝置1電性連接至伺服器3。在步驟S1完成後,伺服器3將以運算電路32執行驗證程式以判斷連接到本身的裝置是否為合法裝置,再依據此合法授權裝置1判斷本身安裝的檢核程式及修正程式是否合法,所述的「合法」係指檢核程式及修正程式未受電腦病毒感染或因故毀損。Please refer to Step S1: Electrically connect the authorization device 1 to the server 3. After the completion of step S1, the server 3 will use the arithmetic circuit 32 to execute a verification program to determine whether the device connected to itself is a legal device, and then determine whether the verification program and correction program installed by itself are legal based on the legal authorization device 1, so The "legal" mentioned means that the verification program and the correction program are not infected by computer viruses or damaged due to any reason.

詳言之,如步驟S2所示,驗證程式首先取得硬體內碼及系統當前時間。實務上,可藉由伺服器3的運算電路32發出適當的電子訊號以獲取授權裝置1的硬體內碼;授權裝置1亦可在電性連接伺服器3之後主動向伺服器3發送本身的硬體內碼,本發明對於取得硬體內碼的方式不予限制。In detail, as shown in step S2, the verification program first obtains the internal hardware code and the current system time. In practice, the arithmetic circuit 32 of the server 3 can send appropriate electronic signals to obtain the internal hardware code of the authorization device 1; the authorization device 1 can also actively send its own hardware to the server 3 after being electrically connected to the server 3 In-body code, the present invention does not limit the way to obtain the hardware-in-body code.

在取得硬體內碼之後,驗證程式再行判斷硬體內碼是否合法,如步驟S3所示。舉例來說,驗證程式中儲存一清單,此清單包括複數個子清單。每一子清單中包括複數個合法硬體內碼及一合法時間區段。這些合法硬體內碼例如由資安單位預先寫入到清單中。所述合法時間區段代表該子清單中的硬體內碼的有效使用時間。因此,驗證程式找出當前時間落於合法時間區段的子清單,再依據所取得的硬體內碼和該子清單中的合法硬體內碼逐一比對;若找到相符者,則代表該授權裝置1為合法授權裝置;若未找到相符者,則運算單元32發送通知訊號告知使用者該授權裝置1為非法授權裝置,並回到步驟S2重新取得硬體內碼。After obtaining the internal hardware code, the verification program then determines whether the internal hardware code is legal, as shown in step S3. For example, a list is stored in the verification program, and this list includes a plurality of sub-lists. Each sublist includes a plurality of legal hardware codes and a legal time segment. These legal hardware codes are pre-written into the list by the information security unit, for example. The legal time segment represents the effective use time of the internal hardware code in the sublist. Therefore, the verification program finds the sublist whose current time falls within the legal time zone, and then compares the obtained hardware code with the legal hardware code in the sublist one by one; if a match is found, it represents the authorized device 1 is a legally authorized device; if no match is found, the arithmetic unit 32 sends a notification signal to inform the user that the authorized device 1 is an illegally authorized device, and returns to step S2 to obtain the internal hardware code again.

在確認授權裝置1合法之後,驗證程式繼續取得授權裝置1的儲存電路12中存放的第一雜湊值,如步驟S4所示。驗證程式依據檢核程式及修正程式執行一雜湊演算法以產生第二雜湊值,如步驟S5所示。所述的雜湊演算法例如係第三代安全雜湊演算法(Secure Hash Algorithm 3,SHA-3),但本發明並不以此為限。請參考步驟S6,驗證程式比對第一雜湊值及第二雜湊值是否相同,藉此確認安裝於伺服器3的檢核程式及修正程式是否仍為原本安裝時的版本。若第一雜湊值與第二雜湊值相同,代表檢核程式及修正程式之內容未被變更。因此,驗證程式產生一合法訊號以指示合法。所述的合法訊號例如指示運算電路32發送另一通知訊號,藉此告知使用者可開始執行伺服器3組態之檢核或修正。After confirming that the authorization device 1 is legal, the verification program continues to obtain the first hash value stored in the storage circuit 12 of the authorization device 1, as shown in step S4. The verification program executes a hash algorithm according to the verification program and the correction program to generate a second hash value, as shown in step S5. The hash algorithm is, for example, the third-generation Secure Hash Algorithm 3 (SHA-3), but the present invention is not limited to this. Please refer to step S6 to verify whether the program compares the first hash value and the second hash value to the same, so as to confirm whether the verification program and the correction program installed on the server 3 are still the original installed version. If the first hash value is the same as the second hash value, it means that the content of the check program and the correction program has not been changed. Therefore, the verification program generates a legal signal to indicate legality. The legal signal, for example, instructs the arithmetic circuit 32 to send another notification signal, thereby informing the user that the verification or modification of the configuration of the server 3 can be started.

請參考步驟S7,在確認檢核程式及修正程式合法之後,使用者可觸發授權裝置1上的第一觸發元件16以選擇在伺服器3上執行檢核程式,或觸發授權裝置1上的第二觸發元件18以選擇在伺服器3上或修正程式。Please refer to step S7. After confirming that the verification program and the correction program are legal, the user can trigger the first trigger element 16 on the authorization device 1 to choose to execute the verification program on the server 3 or trigger the first trigger on the authorization device 1. The two trigger elements 18 can be selected on the server 3 or modified programs.

當接收到第一觸發元件16產生的第一操作訊號時(相當於使用者按下檢核按鈕),則執行步驟S8:運算單元32執行檢核程式以產生一檢核報告。詳言之,檢核程式係偵測伺服器3之作業系統類型及執行對應於該作業系統類型之複數個檢核指令,所述的檢核指令用以取得伺服器3之複數個組態設定值。檢核程式可依據一標準設定值列表(例如由金融機構內部自行定義的規格表)比對所取得的組態設定值,並將比對結果輸出至檢核報告中,使用者可根據檢核報告得知伺服器3的各項組態設定值。When the first operation signal generated by the first trigger element 16 is received (equivalent to the user pressing the check button), step S8 is executed: the arithmetic unit 32 executes the check program to generate a check report. In detail, the verification program detects the operating system type of server 3 and executes multiple verification commands corresponding to the operating system type. The verification commands are used to obtain multiple configuration settings of server 3 value. The verification program can compare the obtained configuration setting values according to a standard setting value list (for example, a specification table defined by the financial institution itself), and output the comparison result to the verification report. The user can check according to The report knows the configuration settings of server 3.

所述的組態值例如伺服器3的密碼長度設定值,或是開啟作業系統的保護堆疊功能以防止IP傳送或主機欺騙(Host spoofing)。實務上,可根據金融機構的內部規範而自行定義檢核程式中的檢核指令。The configuration value is, for example, the password length setting value of the server 3, or the protection stack function of the operating system is turned on to prevent IP transmission or host spoofing. In practice, the verification instructions in the verification program can be defined by oneself in accordance with the internal regulations of the financial institution.

當接收到第二觸發元件18產生的第二操作訊號時(相當於使用者按下修正按鈕),則執行步驟S9:運算單元32執行修正程式以修正伺服器3之至少一組態值。詳言之,修正程式係偵測伺服器3之作業系統類型及執行對應於該作業系統類型之複數個修正指令。所述的修正指令用以依據標準設定值列表之複數個設定值分別取代伺服器3之複數個組態設定值。When the second operation signal generated by the second trigger element 18 is received (equivalent to the user pressing the correction button), step S9 is executed: the arithmetic unit 32 executes a correction program to correct at least one configuration value of the server 3. In detail, the correction program detects the operating system type of the server 3 and executes a plurality of correction commands corresponding to the operating system type. The correction command is used to replace the plurality of configuration setting values of the server 3 according to the plurality of setting values of the standard setting value list.

本發明另一實施例中,在執行步驟S8或步驟S9之前,可再包括一密碼驗證程序。使用者須在伺服器3提供的介面輸入指定密碼後方可繼續執行步驟S8的檢核程式或步驟S9的修正程式。上述方式可加強檢核或修正操作的安全性。In another embodiment of the present invention, before step S8 or step S9 is executed, a password verification program may be further included. The user must enter the designated password on the interface provided by the server 3 before continuing to execute the verification program of step S8 or the correction program of step S9. The above method can strengthen the safety of the inspection or correction operation.

實務上,檢核程式及修正程式例如採用Java語言撰寫,並以Java Development Kit開發。因此,檢核程式及修正程式可在多種作業系統的環境運行,並呼叫對應於當前作業系統的檢核指令或修正指令。由於採用跨平台的程式語言開發檢核及修正程式,因此可降低後續程式維護的成本,同時也降低教育訓練的成本。另外,對於後續伺服器3作業系統的更新,僅需對應調整檢核程式中的檢核指令或修正程式中的修正指令便可輕易地適用於運行不同作業系統的伺服器3。In practice, the verification programs and correction programs are written in the Java language, and developed with the Java Development Kit, for example. Therefore, the verification program and the correction program can run in a variety of operating system environments, and call the verification command or correction command corresponding to the current operating system. As a cross-platform programming language is used to develop verification and correction programs, the cost of subsequent program maintenance can be reduced, and the cost of education and training can also be reduced. In addition, for the subsequent update of the operating system of the server 3, it can be easily applied to the server 3 running different operating systems only by corresponding to the verification command in the adjustment verification program or the correction command in the correction program.

綜合以上所述,本發明所揭露的伺服器組態檢核及修正系統與檢核及修正伺服器組態的方法,只需連接授權裝置至伺服器再按壓授權裝置上的檢核或修正按鈕,伺服器本身便可採取批次作業的方式檢核或修正本身的組態設定,因此可大幅縮短作業時程並增加作業效率。其次,本發明所提出的授權裝置係使用USB Human Interface Device協定,而非傳統USB隨身碟所採用之USB Mass Storage Device協定。因此,可避免隨身碟造成伺服器系統中毒之風險,採用HID協定亦可在限制USB裝置使用的伺服器上進行伺服器檢核修正作業。再者,在修正及檢核程式執行之前,必需先確認授權裝置的硬體內碼是否合法,藉此避免未經授權的操作。因此,本發明可實現資訊安全原則中的驗證性(Authenticity)及可歸責性(Accountability)。另外,本發明所揭露的檢核及修正程式係採用SHA-3演算法提前進行安全雜湊計算,並將雜湊值置入授權裝置中。在執行檢核及修正程式之前,必需與授權裝置互相進行雜湊值驗證,在驗證程式通過後才可繼續執行。因此,可避免檢核程式及修正程式遭病毒竄改,故可達成資訊安全原則中的完整性(Integrity)。當雜湊值驗證失敗時,亦可提醒使用者伺服器可能已遭病毒感染。此外,本發明所述的檢核及修正程式係以JDK進行程式開發,故可於不同平台執行相同程式。因此,可降低檢核及修正作業操作人員的教育訓練及使用成本,並且提升檢核及修正程式的可攜性。本發明更可藉由檢核及修正程式的更新,一併更新作業系統的指令,藉此解決各作業系統間因指令不同而造成檢核或修正作業中斷的問題。In summary, the server configuration verification and correction system and the method for verifying and correcting the server configuration disclosed in the present invention only need to connect the authorization device to the server and then press the verification or correction button on the authorization device , The server itself can adopt batch operation to check or modify its configuration settings, so it can greatly shorten the operation time and increase the operation efficiency. Secondly, the authorization device proposed by the present invention uses the USB Human Interface Device protocol instead of the USB Mass Storage Device protocol used by traditional USB flash drives. Therefore, the risk of server system poisoning caused by the flash drive can be avoided, and the HID protocol can also be used to perform server verification and correction operations on the server that restricts the use of USB devices. Furthermore, before the execution of the correction and verification program, it is necessary to confirm whether the hardware internal code of the authorized device is legal, so as to avoid unauthorized operations. Therefore, the present invention can realize the authenticity and accountability in the principle of information security. In addition, the verification and correction program disclosed in the present invention uses the SHA-3 algorithm to perform secure hash calculation in advance, and puts the hash value into the authorization device. Before executing the verification and correction program, it is necessary to mutually verify the hash value with the authorized device, and the execution can only be continued after the verification program is passed. Therefore, it is possible to prevent the check program and the correction program from being tampered with by the virus, so that the integrity of the information security policy can be achieved. When the hash value verification fails, it can also alert the user that the server may have been infected by a virus. In addition, the verification and correction programs of the present invention are developed using JDK, so the same programs can be executed on different platforms. Therefore, it is possible to reduce the cost of education, training and use of the operators of the inspection and correction operations, and to improve the portability of the inspection and correction programs. The present invention can also update the commands of the operating system by updating the checking and correcting programs, thereby solving the problem of interruption of checking or correcting operations due to different commands among various operating systems.

雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明。在不脫離本發明之精神和範圍內,所為之更動與潤飾,均屬本發明之專利保護範圍。關於本發明所界定之保護範圍請參考所附之申請專利範圍。Although the present invention is disclosed in the foregoing embodiments, it is not intended to limit the present invention. All changes and modifications made without departing from the spirit and scope of the present invention fall within the scope of the patent protection of the present invention. For the scope of protection defined by the present invention, please refer to the attached scope of patent application.

10            伺服器組態檢核及修正系統 1              授權裝置 11            連接頭 12            儲存電路 14            控制電路 16            第一觸發元件 18            第二觸發元件 19            保護蓋 3              伺服器 32            運算電路 34            儲存電路 10 Server configuration verification and correction system 1 Authorized device 11 Connector 12 Storage circuit 14 Control circuit 16 The first trigger element 18 Second trigger element 19 Protective cover 3 Server 32 Operational circuit 34 Storage circuit

圖1係依據本發明一實施例的伺服器組態檢核及修正系統所繪示的方塊架構圖。 圖2係依據本發明一實施例的伺服器組態檢核及修正系統所繪示的授權裝置與伺服器的連接示意圖。 圖3係依據本發明一實施例的檢核及修正伺服器組態的方法所繪示的流程圖。 FIG. 1 is a block diagram of a system for checking and correcting a server configuration according to an embodiment of the present invention. 2 is a schematic diagram of the connection between the authorization device and the server shown in the server configuration verification and correction system according to an embodiment of the present invention. FIG. 3 is a flowchart of a method for checking and correcting a server configuration according to an embodiment of the present invention.

1              授權裝置 3              伺服器 11            連接頭 16            第一觸發元件 18            第二觸發元件 19            保護蓋 1 Authorized device 3 Server 11 Connector 16 The first trigger element 18 Second trigger element 19 Protective cover

Claims (4)

一種基於雜湊演算法的伺服器組態檢核及修正系統,包括:一授權裝置,包括一儲存電路及一控制電路,該儲存電路電性連接該控制電路並用以存放一硬體內碼及一第一雜湊值;該控制電路包括一第一觸發元件及一第二觸發元件,該控制電路用以於該第一觸發元件接收一觸發操作時產生一第一操作訊號,且於該第二觸發元件接收另一觸發操作時產生一第二操作訊號;以及一伺服器,電性連接該授權裝置,該伺服器用以安裝一驗證程式、一檢核程式及一修正程式,其中該驗證程式用以判斷該授權裝置、該檢核程式及該修正程式是否合法;該檢核程式用以於該驗證程式判斷為合法之後且接收到該第一操作訊號時執行以產生一檢核報告;該修正程式用以於該驗證程式判斷為合法之後且接收到該第二操作訊號時執行以修正該伺服器之至少一組態值;其中該授權裝置基於人性化界面裝置(Human Interface Device)協定電性連接該伺服器;其中該驗證程式更用以取得該授權裝置之該硬體內碼、判斷該硬體內碼是否合法以決定該授權裝置是否合法;該驗證程式更用以取得該授權裝置之該第一雜湊值、依據該檢核程式及該修正程式執行一雜湊演算法以產生一第二雜湊值、以及比對該第一雜湊值及該第二雜湊值並選擇性地產生一合法訊號以指示該檢核程式及該修正程式是否合法;其中,該雜湊演算法係一第三代安全雜湊演算法(Secure Hash Algorithm 3,SHA-3); 其中該檢核程式及該修正程式係以Java Development Kit開發;該檢核程式更用以偵測該伺服器之一作業系統及執行對應於該作業系統之複數個檢核指令,該些檢核指令用以取得該伺服器之複數個組態設定值,依據一標準設定值列表比對該些組態設定值,及輸出一檢核報表,以及該修正程式更用以偵測該伺服器之該作業系統及執行對應於該作業系統之複數個修正指令,該些修正指令用以依據該標準設定值列表之複數個設定值分別取代該伺服器之該些組態設定值。 A server configuration verification and correction system based on a hash algorithm includes: an authorization device, including a storage circuit and a control circuit, the storage circuit is electrically connected to the control circuit and used to store a hardware internal code and a first A hash value; the control circuit includes a first trigger element and a second trigger element, the control circuit is used to generate a first operation signal when the first trigger element receives a trigger operation, and the second trigger element When receiving another trigger operation, a second operation signal is generated; and a server is electrically connected to the authorization device. The server is used to install a verification program, a verification program and a correction program, wherein the verification program is used for Determine whether the authorization device, the verification program, and the correction program are legal; the verification program is used to generate a verification report after the verification program is judged to be legal and when the first operation signal is received; the correction program Used to modify at least one configuration value of the server after the verification program is judged to be legal and when the second operation signal is received; wherein the authorization device is electrically connected based on the Human Interface Device protocol The server; wherein the verification program is used to obtain the internal hardware code of the authorized device, determine whether the internal hardware code is legal to determine whether the authorized device is legal; the verification program is further used to obtain the first authorization device Hash value, execute a hash algorithm based on the check program and the correction program to generate a second hash value, compare the first hash value and the second hash value, and selectively generate a legal signal to indicate the Check whether the program and the modified program are legal; among them, the hash algorithm is a third-generation Secure Hash Algorithm 3 (SHA-3); The verification program and the correction program are developed with the Java Development Kit; the verification program is used to detect an operating system of the server and execute a plurality of verification commands corresponding to the operating system. The command is used to obtain a plurality of configuration settings of the server, compare the configuration settings according to a list of standard settings, and output a check report, and the correction program is used to detect the server’s The operating system executes a plurality of correction commands corresponding to the operating system, and the correction commands are used to replace the configuration setting values of the server according to the plurality of setting values of the standard setting value list. 如請求項1所述的基於雜湊演算法的伺服器組態檢核及修正系統,其中該驗證程式更用以儲存一清單,該清單包括複數個子清單,每一該子清單包括複數個合法硬體內碼,該些子清單各自具有一合法時間區段;該驗證程序更用以依據一當前時間及該授權裝置之該硬體內碼比對該些子清單的該合法時間區段及該些子清單其中一者之該些合法硬體內碼,其中該當前時間落於該些子清單其中一者之該合法時間區段。 The server configuration verification and correction system based on the hash algorithm as described in claim 1, wherein the verification program is further used to store a list, the list includes a plurality of sub-lists, and each of the sub-lists includes a plurality of legal hardware In-body code, each of the sub-lists has a legal time section; the verification procedure is further used to compare the legal time section and the sub-lists of the sub-lists based on a current time and the hardware in-body code of the authorized device The legal hardware code of one of the lists, wherein the current time falls within the legal time zone of one of the sublists. 一種基於雜湊演算法的檢核及修正伺服器組態的方法,包括:以一授權裝置電性連接一伺服器,其中該伺服器安裝有一檢核程式及一修正程式,該授權裝置基於人性化界面裝置(Human Interface Device)協定電性連接該伺服器;以該伺服器執行一驗證程式以判斷該授權裝置、該檢核程式及該修正程式是否合法;當該驗證程式判斷該授權裝置、該檢核程式及該修正程式皆合法時,以該授權裝置輸出一第一操作訊號及一第二操作訊號其中一者;其中 當該伺服器接收該第一操作訊號時,執行一檢核程式以產生一檢核報告;或當該伺服器接收該第二操作訊號時,執行一修正程式以修正該伺服器之至少一組態值;其中該驗證程式包括:取得該授權裝置之一硬體內碼並判斷該硬體內碼是否合法;當該硬體內碼合法時,取得該授權裝置之一第一雜湊值;在取得該第一雜湊值之後,依據該檢核程式及該修正程式執行一雜湊演算法以產生一第二雜湊值;以及比對該第一雜湊值及該第二雜湊值,且當該第一雜湊值及該第二雜湊值相等時,輸出一合法訊號以指示該授權裝置合法;其中,該雜湊演算法係一第三代安全雜湊演算法(Secure Hash Algorithm 3,SHA-3);其中該檢核程式及該修正程式係以Java Development Kit開發,且在執行該檢核程式或該修正程式時更包括:偵測該伺服器之一作業系統;以及執行對應於該作業系統之複數個檢核指令或修正指令。 A method for checking and modifying server configuration based on a hash algorithm includes: electrically connecting a server with an authorization device, wherein the server is installed with a verification program and a correction program, and the authorization device is based on humanization An interface device (Human Interface Device) protocol is electrically connected to the server; a verification program is executed with the server to determine whether the authorized device, the verification program, and the correction program are legal; when the verification program determines that the authorized device, the When the verification program and the correction program are both legal, use the authorized device to output one of a first operation signal and a second operation signal; When the server receives the first operation signal, it executes a verification program to generate a verification report; or when the server receives the second operation signal, it executes a correction program to modify at least one set of the server The verification program includes: obtaining a hardware internal code of the authorized device and determining whether the hardware internal code is legal; when the hardware internal code is legal, obtaining a first hash value of the authorized device; After a hash value, a hash algorithm is executed according to the check program and the correction program to generate a second hash value; and the first hash value and the second hash value are compared, and when the first hash value and When the second hash value is equal, a legal signal is output to indicate that the authorized device is legal; wherein the hash algorithm is a third-generation secure hash algorithm (Secure Hash Algorithm 3, SHA-3); and the check program And the correction program is developed by the Java Development Kit, and when the check program or the correction program is executed, it further includes: detecting an operating system of the server; and executing a plurality of check commands corresponding to the operating system or Correction instructions. 如請求項3所述的基於雜湊演算法的檢核及修正伺服器組態的方法,其中判斷該硬體內碼是否合法更包括:以該伺服器讀取該驗證程式之一清單,該清單包括複數個子清單,每一該子清單包括複數個合法硬體內碼,該些子清單各自具有一合法時間區段; 以該伺服器分別比對一當前時間及該些子清單的該合法時間區段以取得該當前時間落於該合法時間區段之該些子清單其中一者;在該伺服器取得該些子清單其中一者之後,以該伺服器依據該授權裝置之該硬體內碼比對該子清單之該些合法硬體內碼;以及當該授權裝置之該硬體內碼與該些合法硬體內碼其中一者相符時,始以該伺服器取得該授權裝置之該第一雜湊值。 The method for checking and modifying server configuration based on the hash algorithm as described in claim 3, wherein determining whether the hardware code is legal or not further includes: reading a list of the verification program with the server, the list including A plurality of sub-lists, each of the sub-lists includes a plurality of legal hardware codes, and each of the sub-lists has a legal time zone; Use the server to compare a current time and the legal time range of the sublists to obtain one of the sublists whose current time falls within the legal time range; obtain the sublists from the server After one of the lists, the server compares the legal internal codes of the sublist with the internal hardware codes of the authorized device; and when the internal hardware codes of the authorized device are among the legal internal codes When one of them matches, the server will start to obtain the first hash value of the authorized device.
TW110103491A 2019-05-22 2019-05-22 Inspection and correction system of server's configuration based on hash algorithm and method thereof TWI746361B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW110103491A TWI746361B (en) 2019-05-22 2019-05-22 Inspection and correction system of server's configuration based on hash algorithm and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW110103491A TWI746361B (en) 2019-05-22 2019-05-22 Inspection and correction system of server's configuration based on hash algorithm and method thereof

Publications (2)

Publication Number Publication Date
TW202134874A TW202134874A (en) 2021-09-16
TWI746361B true TWI746361B (en) 2021-11-11

Family

ID=78777323

Family Applications (1)

Application Number Title Priority Date Filing Date
TW110103491A TWI746361B (en) 2019-05-22 2019-05-22 Inspection and correction system of server's configuration based on hash algorithm and method thereof

Country Status (1)

Country Link
TW (1) TWI746361B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200520490A (en) * 2003-12-15 2005-06-16 Microsoft Corp System and method for managing and communicating software updates
US20050198235A1 (en) * 2004-01-29 2005-09-08 Arvind Kumar Server configuration and management
CN101908967A (en) * 2009-06-02 2010-12-08 百度在线网络技术(北京)有限公司 Configuration method and system of Linux virtual server
CN104092555A (en) * 2013-12-04 2014-10-08 腾讯数码(天津)有限公司 Parameter value updating method, device and system
CN105812570A (en) * 2016-04-21 2016-07-27 深圳市旭子科技有限公司 Terminal firmware updating method and device
CN109241747A (en) * 2007-04-13 2019-01-18 瑞典爱立信有限公司 Trusted component update system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200520490A (en) * 2003-12-15 2005-06-16 Microsoft Corp System and method for managing and communicating software updates
US20050198235A1 (en) * 2004-01-29 2005-09-08 Arvind Kumar Server configuration and management
CN109241747A (en) * 2007-04-13 2019-01-18 瑞典爱立信有限公司 Trusted component update system and method
CN101908967A (en) * 2009-06-02 2010-12-08 百度在线网络技术(北京)有限公司 Configuration method and system of Linux virtual server
CN104092555A (en) * 2013-12-04 2014-10-08 腾讯数码(天津)有限公司 Parameter value updating method, device and system
CN105812570A (en) * 2016-04-21 2016-07-27 深圳市旭子科技有限公司 Terminal firmware updating method and device

Also Published As

Publication number Publication date
TW202134874A (en) 2021-09-16

Similar Documents

Publication Publication Date Title
CN111008379B (en) Firmware safety detection method of electronic equipment and related equipment
US9542337B2 (en) Device side host integrity validation
JP5265662B2 (en) Trusted component update system and trusted component update method
JP4769608B2 (en) Information processing apparatus having start verification function
US20060236122A1 (en) Secure boot
US8266691B2 (en) Renewable integrity rooted system
US11163886B2 (en) Information handling system firmware bit error detection and correction
US7454616B2 (en) Code authentication upon bootup for cable modems
US20110154010A1 (en) Security to extend trust
US9519786B1 (en) Firmware integrity ensurance and update
MX2007013590A (en) System and method for secure operating system boot.
KR20070119619A (en) Systems and methods for verifying trust of executable files
CN105426750A (en) Startup method of embedded system, and embedded device
US11422901B2 (en) Operating system repairs via recovery agents
US7237126B2 (en) Method and apparatus for preserving the integrity of a management subsystem environment
CN111291381A (en) Method, equipment and medium for building trust chain based on TCM
CN106919845B (en) System security trust chain construction device and method
CN110674494A (en) Process protection method, system and data processing method
TWI746361B (en) Inspection and correction system of server's configuration based on hash algorithm and method thereof
TWI715047B (en) Inspection and correction system of server's configuration and method of inspecting and correcting server's configuration
JP6744256B2 (en) Confirmation system, control device, and confirmation method
TWI752813B (en) Inspection and correction system of server's configuration based on touch operation and method thereof
TWM583959U (en) Inspection and correction system of server's configuration
CN111241548A (en) Computer starting method
CN117726343B (en) Method, device, equipment and medium for supervising execution of intelligent contracts in block chain