TWI746361B - Inspection and correction system of server's configuration based on hash algorithm and method thereof - Google Patents
Inspection and correction system of server's configuration based on hash algorithm and method thereof Download PDFInfo
- Publication number
- TWI746361B TWI746361B TW110103491A TW110103491A TWI746361B TW I746361 B TWI746361 B TW I746361B TW 110103491 A TW110103491 A TW 110103491A TW 110103491 A TW110103491 A TW 110103491A TW I746361 B TWI746361 B TW I746361B
- Authority
- TW
- Taiwan
- Prior art keywords
- server
- program
- legal
- verification
- correction
- Prior art date
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
本發明係關於伺服器的組態檢核與修正,特別是一種透過授權裝置進行伺服器組態檢核及修正的系統及方法。The present invention relates to server configuration checking and modification, in particular to a system and method for server configuration checking and modification through an authorized device.
金融機構購入的新伺服器或電腦可安裝各種開放式作業系統例如Windows、AIX、Linux等。這些伺服器在實際上線運作之前,資安人員需要先確認每台伺服器或電腦中的安全設定皆符合內部規範。New servers or computers purchased by financial institutions can be installed with various open operating systems such as Windows, AIX, Linux, etc. Before these servers actually operate online, information security personnel need to confirm that the security settings in each server or computer comply with internal regulations.
然而,現今核對伺服器組態的方式耗費大量人力及工時。詳言之,檢核人員必須熟悉Windows 的PowerShell、Linux的Bash或IBM AIX的korn shell等命令列介面的指令操作方可順利進行檢核。此外,不只檢核費力費時,針對參數設定錯誤的伺服器組態進行修正的操作同樣需要大量時間及人力成本。再者,由於開放式伺服器作業系統的版本眾多,當伺服器更新作業系統的版本時,前次用於檢核或修正伺服器組態的指令亦可能隨之更新,因此導致檢核及程式開發人員未必能全部採用先前的指令迅速完成相關作業,增加檢核與修正作業上的困難程度。另外不容忽視的一點是,採用人工檢查的方式,很有可能因為檢核人員的一個小疏失而影響整個伺服器系統的穩定性與安全性。However, the current method of checking the server configuration consumes a lot of manpower and man-hours. In detail, the inspector must be familiar with the command operation of the command line interface such as PowerShell of Windows, Bash of Linux, or korn shell of IBM AIX in order to conduct the inspection smoothly. In addition, not only checking is laborious and time-consuming, but also correcting a server configuration with incorrect parameter settings also requires a lot of time and labor costs. Furthermore, due to the numerous versions of the open server operating system, when the server updates the version of the operating system, the previous commands used to check or modify the server configuration may also be updated, resulting in checks and programs Developers may not be able to use all previous instructions to quickly complete related operations, which increases the difficulty of checking and correcting operations. Another point that cannot be ignored is that the use of manual inspection is likely to affect the stability and security of the entire server system due to a small error by the inspector.
有鑑於此,本發明提出一種伺服器組態檢核修正系統與檢核及修正伺服器組態的方法,在達到金融機構對於資訊安全需求的前提下,節省進行伺服器組態檢核及修正程序的人力及時間成本。In view of this, the present invention proposes a server configuration verification and correction system and a method for verifying and correcting the server configuration. Under the premise of meeting the information security requirements of financial institutions, the server configuration verification and correction are saved. The labor and time cost of the procedure.
依據本發明一實施例的一種伺服器組態檢核及修正系統,包括授權裝置及伺服器。授權裝置包括儲存電路及控制電路。儲存電路用以存放硬體內碼及第一雜湊值。控制電路包括第一觸發元件及第二觸發元件。控制電路用以於第一觸發元件接收觸發操作時產生第一操作訊號,且於第二觸發元件接收另一觸發操作時產生第二操作訊號。伺服器電性連接授權裝置。伺服器用以安裝驗證程式、檢核程式及修正程式。驗證程式用以判斷授權裝置、檢核程式及修正程式是否合法。檢核程式用以於驗證程式判斷為合法之後且接收到第一操作訊號時執行以產生檢核報告。修正程式用以於驗證程式判斷為合法之後且接收到第二操作訊號時執行以修正伺服器之至少一組態值。A server configuration verification and correction system according to an embodiment of the present invention includes an authorization device and a server. The authorization device includes a storage circuit and a control circuit. The storage circuit is used to store the internal hardware code and the first hash value. The control circuit includes a first trigger element and a second trigger element. The control circuit is used for generating a first operation signal when the first trigger element receives a trigger operation, and generates a second operation signal when the second trigger element receives another trigger operation. The server is electrically connected to the authorization device. The server is used to install verification programs, verification programs, and correction programs. The verification program is used to determine whether the authorized device, the verification program, and the correction program are legal. The verification program is used to execute after the verification program is judged to be legal and when the first operation signal is received to generate a verification report. The correction program is used to execute after the verification program is judged to be legal and when the second operation signal is received to correct at least one configuration value of the server.
依據本發明一實施例的一種檢核及修正伺服器組態的方法,包括:以授權裝置電性連接安裝有檢核程式及修正程式的伺服器;伺服器執行驗證程式以判斷授權裝置、檢核程式及修正程式是否合法;當驗證程式判斷授權裝置、檢核程式及修正程式皆合法時,以授權裝置輸出第一操作訊號及第二操作訊號其中一者;其中當伺服器接收第一操作訊號時,執行檢核程式以產生檢核報告;或當伺服器接收第二操作訊號時,執行修正程式以修正伺服器之至少一組態值。A method for checking and correcting server configuration according to an embodiment of the present invention includes: electrically connecting a server with a verification program and a correction program to an authorized device; the server executes the verification program to determine the authorized device, Whether the verification program and the correction program are legal; when the verification program determines that the authorized device, the verification program and the correction program are all legal, the authorized device outputs one of the first operation signal and the second operation signal; among them, when the server receives the first operation When the signal is detected, the verification program is executed to generate a verification report; or when the server receives the second operation signal, the correction program is executed to modify at least one configuration value of the server.
以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本發明之精神與原理,並且提供本發明之專利申請範圍更進一步之解釋。The above description of the disclosure and the following description of the embodiments are used to demonstrate and explain the spirit and principle of the present invention, and to provide a further explanation of the scope of the patent application of the present invention.
以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。以下之實施例係進一步詳細說明本發明之觀點,但非以任何觀點限制本發明之範疇。The detailed features and advantages of the present invention will be described in detail in the following embodiments. The content is sufficient to enable anyone familiar with the relevant art to understand the technical content of the present invention and implement it accordingly, and according to the content disclosed in this specification, the scope of patent application and the drawings. Anyone who is familiar with relevant skills can easily understand the purpose and advantages of the present invention. The following examples further illustrate the viewpoints of the present invention in detail, but do not limit the scope of the present invention by any viewpoint.
圖1係依據本發明一實施例的伺服器組態檢核及修正系統10所繪示的方塊架構圖。如圖1所示,伺服器組態檢核及修正系統10包括授權裝置1及伺服器3。授權裝置1電性連接伺服器3。具體來說,授權裝置1基於通用序列匯流排(Universal Serial Bus,USB)標準中的人性化界面裝置(Human Interface Device,HID)協定電性連接伺服器3。相較於使用通用序列匯流排(Universal Serial Bus,USB)標準中的USB大容量儲存裝置(Mass Stroage Device Class,MSC)協定作為連接介面的授權裝置,採用HID協定可降低電腦中毒的風險。另外,採用HID協定的授權裝置1可用於被禁用USB連接埠的伺服器3。FIG. 1 is a block diagram of a server configuration checking and correcting
請參考圖1。授權裝置1包括儲存電路12及控制電路14。儲存電路12可存放硬體內碼及第一雜湊值,其中硬體內碼及第一雜湊值係預先被寫入至儲存電路12。硬體內碼用以證明授權裝置1屬於可信賴的裝置。第一雜湊值用以供伺服器3比對以確認本身安裝的程式是否未遭竄改。關於硬體內碼及第一雜湊值的應用方式將於後文詳述之。Please refer to Figure 1. The authorization device 1 includes a
控制電路14包括第一觸發元件16及第二觸發元件18。請參考圖2,圖2係依據本發明一實施例的伺服器組態檢核及修正系統10所繪示的授權裝置1與伺服器3的連接示意圖。實務上,授權裝置1例如係以USB隨身碟型態的外觀呈現,透過連接頭11電性連接至伺服器3。而第一觸發元件16及第二觸發元件18例如係以按鈕或切換開關的方式呈現。第二觸發元件18的外部可更包括一保護殼19以防止誤觸。須注意的是,上述外觀型態僅作為示例而非用以限制本發明。The
請參考圖1。在第一觸發元件16接收觸發操作時,控制電路14產生第一操作訊號。在第二觸發元件18接收另一觸發操作時,控制電路14產生第二操作訊號。所述的觸發操作例如係按下按鈕或是撥動切換開關,本發明並不限制觸發操作的方式。Please refer to Figure 1. When the
請一併參考圖1及圖3,圖3係繪示本發明一實施例的檢核及修正伺服器組態的方法的流程圖。伺服器3包括運算電路32及儲存電路34。運算電路32電性連接至儲存電路34。儲存電路34可預先安裝驗證程式、檢核程式及修正程式,如圖3的步驟S0所示。Please refer to FIG. 1 and FIG. 3 together. FIG. 3 shows a flowchart of a method for checking and correcting a server configuration according to an embodiment of the present invention. The
請參考步驟S1:將授權裝置1電性連接至伺服器3。在步驟S1完成後,伺服器3將以運算電路32執行驗證程式以判斷連接到本身的裝置是否為合法裝置,再依據此合法授權裝置1判斷本身安裝的檢核程式及修正程式是否合法,所述的「合法」係指檢核程式及修正程式未受電腦病毒感染或因故毀損。Please refer to Step S1: Electrically connect the authorization device 1 to the
詳言之,如步驟S2所示,驗證程式首先取得硬體內碼及系統當前時間。實務上,可藉由伺服器3的運算電路32發出適當的電子訊號以獲取授權裝置1的硬體內碼;授權裝置1亦可在電性連接伺服器3之後主動向伺服器3發送本身的硬體內碼,本發明對於取得硬體內碼的方式不予限制。In detail, as shown in step S2, the verification program first obtains the internal hardware code and the current system time. In practice, the
在取得硬體內碼之後,驗證程式再行判斷硬體內碼是否合法,如步驟S3所示。舉例來說,驗證程式中儲存一清單,此清單包括複數個子清單。每一子清單中包括複數個合法硬體內碼及一合法時間區段。這些合法硬體內碼例如由資安單位預先寫入到清單中。所述合法時間區段代表該子清單中的硬體內碼的有效使用時間。因此,驗證程式找出當前時間落於合法時間區段的子清單,再依據所取得的硬體內碼和該子清單中的合法硬體內碼逐一比對;若找到相符者,則代表該授權裝置1為合法授權裝置;若未找到相符者,則運算單元32發送通知訊號告知使用者該授權裝置1為非法授權裝置,並回到步驟S2重新取得硬體內碼。After obtaining the internal hardware code, the verification program then determines whether the internal hardware code is legal, as shown in step S3. For example, a list is stored in the verification program, and this list includes a plurality of sub-lists. Each sublist includes a plurality of legal hardware codes and a legal time segment. These legal hardware codes are pre-written into the list by the information security unit, for example. The legal time segment represents the effective use time of the internal hardware code in the sublist. Therefore, the verification program finds the sublist whose current time falls within the legal time zone, and then compares the obtained hardware code with the legal hardware code in the sublist one by one; if a match is found, it represents the authorized device 1 is a legally authorized device; if no match is found, the
在確認授權裝置1合法之後,驗證程式繼續取得授權裝置1的儲存電路12中存放的第一雜湊值,如步驟S4所示。驗證程式依據檢核程式及修正程式執行一雜湊演算法以產生第二雜湊值,如步驟S5所示。所述的雜湊演算法例如係第三代安全雜湊演算法(Secure Hash Algorithm 3,SHA-3),但本發明並不以此為限。請參考步驟S6,驗證程式比對第一雜湊值及第二雜湊值是否相同,藉此確認安裝於伺服器3的檢核程式及修正程式是否仍為原本安裝時的版本。若第一雜湊值與第二雜湊值相同,代表檢核程式及修正程式之內容未被變更。因此,驗證程式產生一合法訊號以指示合法。所述的合法訊號例如指示運算電路32發送另一通知訊號,藉此告知使用者可開始執行伺服器3組態之檢核或修正。After confirming that the authorization device 1 is legal, the verification program continues to obtain the first hash value stored in the
請參考步驟S7,在確認檢核程式及修正程式合法之後,使用者可觸發授權裝置1上的第一觸發元件16以選擇在伺服器3上執行檢核程式,或觸發授權裝置1上的第二觸發元件18以選擇在伺服器3上或修正程式。Please refer to step S7. After confirming that the verification program and the correction program are legal, the user can trigger the
當接收到第一觸發元件16產生的第一操作訊號時(相當於使用者按下檢核按鈕),則執行步驟S8:運算單元32執行檢核程式以產生一檢核報告。詳言之,檢核程式係偵測伺服器3之作業系統類型及執行對應於該作業系統類型之複數個檢核指令,所述的檢核指令用以取得伺服器3之複數個組態設定值。檢核程式可依據一標準設定值列表(例如由金融機構內部自行定義的規格表)比對所取得的組態設定值,並將比對結果輸出至檢核報告中,使用者可根據檢核報告得知伺服器3的各項組態設定值。When the first operation signal generated by the
所述的組態值例如伺服器3的密碼長度設定值,或是開啟作業系統的保護堆疊功能以防止IP傳送或主機欺騙(Host spoofing)。實務上,可根據金融機構的內部規範而自行定義檢核程式中的檢核指令。The configuration value is, for example, the password length setting value of the
當接收到第二觸發元件18產生的第二操作訊號時(相當於使用者按下修正按鈕),則執行步驟S9:運算單元32執行修正程式以修正伺服器3之至少一組態值。詳言之,修正程式係偵測伺服器3之作業系統類型及執行對應於該作業系統類型之複數個修正指令。所述的修正指令用以依據標準設定值列表之複數個設定值分別取代伺服器3之複數個組態設定值。When the second operation signal generated by the
本發明另一實施例中,在執行步驟S8或步驟S9之前,可再包括一密碼驗證程序。使用者須在伺服器3提供的介面輸入指定密碼後方可繼續執行步驟S8的檢核程式或步驟S9的修正程式。上述方式可加強檢核或修正操作的安全性。In another embodiment of the present invention, before step S8 or step S9 is executed, a password verification program may be further included. The user must enter the designated password on the interface provided by the
實務上,檢核程式及修正程式例如採用Java語言撰寫,並以Java Development Kit開發。因此,檢核程式及修正程式可在多種作業系統的環境運行,並呼叫對應於當前作業系統的檢核指令或修正指令。由於採用跨平台的程式語言開發檢核及修正程式,因此可降低後續程式維護的成本,同時也降低教育訓練的成本。另外,對於後續伺服器3作業系統的更新,僅需對應調整檢核程式中的檢核指令或修正程式中的修正指令便可輕易地適用於運行不同作業系統的伺服器3。In practice, the verification programs and correction programs are written in the Java language, and developed with the Java Development Kit, for example. Therefore, the verification program and the correction program can run in a variety of operating system environments, and call the verification command or correction command corresponding to the current operating system. As a cross-platform programming language is used to develop verification and correction programs, the cost of subsequent program maintenance can be reduced, and the cost of education and training can also be reduced. In addition, for the subsequent update of the operating system of the
綜合以上所述,本發明所揭露的伺服器組態檢核及修正系統與檢核及修正伺服器組態的方法,只需連接授權裝置至伺服器再按壓授權裝置上的檢核或修正按鈕,伺服器本身便可採取批次作業的方式檢核或修正本身的組態設定,因此可大幅縮短作業時程並增加作業效率。其次,本發明所提出的授權裝置係使用USB Human Interface Device協定,而非傳統USB隨身碟所採用之USB Mass Storage Device協定。因此,可避免隨身碟造成伺服器系統中毒之風險,採用HID協定亦可在限制USB裝置使用的伺服器上進行伺服器檢核修正作業。再者,在修正及檢核程式執行之前,必需先確認授權裝置的硬體內碼是否合法,藉此避免未經授權的操作。因此,本發明可實現資訊安全原則中的驗證性(Authenticity)及可歸責性(Accountability)。另外,本發明所揭露的檢核及修正程式係採用SHA-3演算法提前進行安全雜湊計算,並將雜湊值置入授權裝置中。在執行檢核及修正程式之前,必需與授權裝置互相進行雜湊值驗證,在驗證程式通過後才可繼續執行。因此,可避免檢核程式及修正程式遭病毒竄改,故可達成資訊安全原則中的完整性(Integrity)。當雜湊值驗證失敗時,亦可提醒使用者伺服器可能已遭病毒感染。此外,本發明所述的檢核及修正程式係以JDK進行程式開發,故可於不同平台執行相同程式。因此,可降低檢核及修正作業操作人員的教育訓練及使用成本,並且提升檢核及修正程式的可攜性。本發明更可藉由檢核及修正程式的更新,一併更新作業系統的指令,藉此解決各作業系統間因指令不同而造成檢核或修正作業中斷的問題。In summary, the server configuration verification and correction system and the method for verifying and correcting the server configuration disclosed in the present invention only need to connect the authorization device to the server and then press the verification or correction button on the authorization device , The server itself can adopt batch operation to check or modify its configuration settings, so it can greatly shorten the operation time and increase the operation efficiency. Secondly, the authorization device proposed by the present invention uses the USB Human Interface Device protocol instead of the USB Mass Storage Device protocol used by traditional USB flash drives. Therefore, the risk of server system poisoning caused by the flash drive can be avoided, and the HID protocol can also be used to perform server verification and correction operations on the server that restricts the use of USB devices. Furthermore, before the execution of the correction and verification program, it is necessary to confirm whether the hardware internal code of the authorized device is legal, so as to avoid unauthorized operations. Therefore, the present invention can realize the authenticity and accountability in the principle of information security. In addition, the verification and correction program disclosed in the present invention uses the SHA-3 algorithm to perform secure hash calculation in advance, and puts the hash value into the authorization device. Before executing the verification and correction program, it is necessary to mutually verify the hash value with the authorized device, and the execution can only be continued after the verification program is passed. Therefore, it is possible to prevent the check program and the correction program from being tampered with by the virus, so that the integrity of the information security policy can be achieved. When the hash value verification fails, it can also alert the user that the server may have been infected by a virus. In addition, the verification and correction programs of the present invention are developed using JDK, so the same programs can be executed on different platforms. Therefore, it is possible to reduce the cost of education, training and use of the operators of the inspection and correction operations, and to improve the portability of the inspection and correction programs. The present invention can also update the commands of the operating system by updating the checking and correcting programs, thereby solving the problem of interruption of checking or correcting operations due to different commands among various operating systems.
雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明。在不脫離本發明之精神和範圍內,所為之更動與潤飾,均屬本發明之專利保護範圍。關於本發明所界定之保護範圍請參考所附之申請專利範圍。Although the present invention is disclosed in the foregoing embodiments, it is not intended to limit the present invention. All changes and modifications made without departing from the spirit and scope of the present invention fall within the scope of the patent protection of the present invention. For the scope of protection defined by the present invention, please refer to the attached scope of patent application.
10 伺服器組態檢核及修正系統
1 授權裝置
11 連接頭
12 儲存電路
14 控制電路
16 第一觸發元件
18 第二觸發元件
19 保護蓋
3 伺服器
32 運算電路
34 儲存電路
10 Server configuration verification and correction system
1
圖1係依據本發明一實施例的伺服器組態檢核及修正系統所繪示的方塊架構圖。 圖2係依據本發明一實施例的伺服器組態檢核及修正系統所繪示的授權裝置與伺服器的連接示意圖。 圖3係依據本發明一實施例的檢核及修正伺服器組態的方法所繪示的流程圖。 FIG. 1 is a block diagram of a system for checking and correcting a server configuration according to an embodiment of the present invention. 2 is a schematic diagram of the connection between the authorization device and the server shown in the server configuration verification and correction system according to an embodiment of the present invention. FIG. 3 is a flowchart of a method for checking and correcting a server configuration according to an embodiment of the present invention.
1 授權裝置
3 伺服器
11 連接頭
16 第一觸發元件
18 第二觸發元件
19 保護蓋
1
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW110103491A TWI746361B (en) | 2019-05-22 | 2019-05-22 | Inspection and correction system of server's configuration based on hash algorithm and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW110103491A TWI746361B (en) | 2019-05-22 | 2019-05-22 | Inspection and correction system of server's configuration based on hash algorithm and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
TW202134874A TW202134874A (en) | 2021-09-16 |
TWI746361B true TWI746361B (en) | 2021-11-11 |
Family
ID=78777323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW110103491A TWI746361B (en) | 2019-05-22 | 2019-05-22 | Inspection and correction system of server's configuration based on hash algorithm and method thereof |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI746361B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200520490A (en) * | 2003-12-15 | 2005-06-16 | Microsoft Corp | System and method for managing and communicating software updates |
US20050198235A1 (en) * | 2004-01-29 | 2005-09-08 | Arvind Kumar | Server configuration and management |
CN101908967A (en) * | 2009-06-02 | 2010-12-08 | 百度在线网络技术(北京)有限公司 | Configuration method and system of Linux virtual server |
CN104092555A (en) * | 2013-12-04 | 2014-10-08 | 腾讯数码(天津)有限公司 | Parameter value updating method, device and system |
CN105812570A (en) * | 2016-04-21 | 2016-07-27 | 深圳市旭子科技有限公司 | Terminal firmware updating method and device |
CN109241747A (en) * | 2007-04-13 | 2019-01-18 | 瑞典爱立信有限公司 | Trusted component update system and method |
-
2019
- 2019-05-22 TW TW110103491A patent/TWI746361B/en active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200520490A (en) * | 2003-12-15 | 2005-06-16 | Microsoft Corp | System and method for managing and communicating software updates |
US20050198235A1 (en) * | 2004-01-29 | 2005-09-08 | Arvind Kumar | Server configuration and management |
CN109241747A (en) * | 2007-04-13 | 2019-01-18 | 瑞典爱立信有限公司 | Trusted component update system and method |
CN101908967A (en) * | 2009-06-02 | 2010-12-08 | 百度在线网络技术(北京)有限公司 | Configuration method and system of Linux virtual server |
CN104092555A (en) * | 2013-12-04 | 2014-10-08 | 腾讯数码(天津)有限公司 | Parameter value updating method, device and system |
CN105812570A (en) * | 2016-04-21 | 2016-07-27 | 深圳市旭子科技有限公司 | Terminal firmware updating method and device |
Also Published As
Publication number | Publication date |
---|---|
TW202134874A (en) | 2021-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111008379B (en) | Firmware safety detection method of electronic equipment and related equipment | |
US9542337B2 (en) | Device side host integrity validation | |
JP5265662B2 (en) | Trusted component update system and trusted component update method | |
JP4769608B2 (en) | Information processing apparatus having start verification function | |
US20060236122A1 (en) | Secure boot | |
US8266691B2 (en) | Renewable integrity rooted system | |
US11163886B2 (en) | Information handling system firmware bit error detection and correction | |
US7454616B2 (en) | Code authentication upon bootup for cable modems | |
US20110154010A1 (en) | Security to extend trust | |
US9519786B1 (en) | Firmware integrity ensurance and update | |
MX2007013590A (en) | System and method for secure operating system boot. | |
KR20070119619A (en) | Systems and methods for verifying trust of executable files | |
CN105426750A (en) | Startup method of embedded system, and embedded device | |
US11422901B2 (en) | Operating system repairs via recovery agents | |
US7237126B2 (en) | Method and apparatus for preserving the integrity of a management subsystem environment | |
CN111291381A (en) | Method, equipment and medium for building trust chain based on TCM | |
CN106919845B (en) | System security trust chain construction device and method | |
CN110674494A (en) | Process protection method, system and data processing method | |
TWI746361B (en) | Inspection and correction system of server's configuration based on hash algorithm and method thereof | |
TWI715047B (en) | Inspection and correction system of server's configuration and method of inspecting and correcting server's configuration | |
JP6744256B2 (en) | Confirmation system, control device, and confirmation method | |
TWI752813B (en) | Inspection and correction system of server's configuration based on touch operation and method thereof | |
TWM583959U (en) | Inspection and correction system of server's configuration | |
CN111241548A (en) | Computer starting method | |
CN117726343B (en) | Method, device, equipment and medium for supervising execution of intelligent contracts in block chain |