TWI752813B - Inspection and correction system of server's configuration based on touch operation and method thereof - Google Patents

Inspection and correction system of server's configuration based on touch operation and method thereof Download PDF

Info

Publication number
TWI752813B
TWI752813B TW110103492A TW110103492A TWI752813B TW I752813 B TWI752813 B TW I752813B TW 110103492 A TW110103492 A TW 110103492A TW 110103492 A TW110103492 A TW 110103492A TW I752813 B TWI752813 B TW I752813B
Authority
TW
Taiwan
Prior art keywords
server
program
legal
correction
checking
Prior art date
Application number
TW110103492A
Other languages
Chinese (zh)
Other versions
TW202134875A (en
Inventor
許銘峻
傅傳雲
Original Assignee
華南商業銀行股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 華南商業銀行股份有限公司 filed Critical 華南商業銀行股份有限公司
Priority to TW110103492A priority Critical patent/TWI752813B/en
Publication of TW202134875A publication Critical patent/TW202134875A/en
Application granted granted Critical
Publication of TWI752813B publication Critical patent/TWI752813B/en

Links

Images

Landscapes

  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

An inspection and correction system of server’s configuration comprises an authorization device and a server. The authorization device comprises a storage circuit and a control circuit. The storage circuit stores a hardware internal code and a first hash value. The control circuit comprises a first and a second trigger component. The control circuit respectively generates a first or a second operating signal when the first or second trigger component receives a trigger operation. The server is configured to install a verification program, an inspection program, and a correction program. The verification program is configured to determine whether the authorization device, the inspection program and the correction program are valid. The inspection program is performed to generate an inspection report after the determination result of the verification program is valid and the first operating signal is received. The correction program is performed to fix at least one configuration of the server after the determination result of the verification program is valid and the second operating signal is received.

Description

基於觸發操作的伺服器組態檢核及修正系統及其方法System and method for checking and correcting server configuration based on trigger operation

本發明係關於伺服器的組態檢核與修正,特別是一種透過授權裝置進行伺服器組態檢核及修正的系統及方法。The present invention relates to the configuration check and correction of the server, and more particularly, to a system and method for performing the server configuration check and correction through an authorization device.

金融機構購入的新伺服器或電腦可安裝各種開放式作業系統例如Windows、AIX、Linux等。這些伺服器在實際上線運作之前,資安人員需要先確認每台伺服器或電腦中的安全設定皆符合內部規範。New servers or computers purchased by financial institutions can be installed with various open operating systems such as Windows, AIX, Linux, etc. Before these servers actually operate online, information security personnel need to confirm that the security settings in each server or computer comply with internal specifications.

然而,現今核對伺服器組態的方式耗費大量人力及工時。詳言之,檢核人員必須熟悉Windows 的PowerShell、Linux的Bash或IBM AIX的korn shell等命令列介面的指令操作方可順利進行檢核。此外,不只檢核費力費時,針對參數設定錯誤的伺服器組態進行修正的操作同樣需要大量時間及人力成本。再者,由於開放式伺服器作業系統的版本眾多,當伺服器更新作業系統的版本時,前次用於檢核或修正伺服器組態的指令亦可能隨之更新,因此導致檢核及程式開發人員未必能全部採用先前的指令迅速完成相關作業,增加檢核與修正作業上的困難程度。另外不容忽視的一點是,採用人工檢查的方式,很有可能因為檢核人員的一個小疏失而影響整個伺服器系統的穩定性與安全性。However, the current way of checking the server configuration consumes a lot of manpower and man-hours. To be more specific, the inspector must be familiar with the command operations of the command line interface such as PowerShell in Windows, Bash in Linux or korn shell in IBM AIX, etc. in order to perform the inspection smoothly. In addition, not only the checking is labor-intensive and time-consuming, but also the operation of correcting the server configuration with wrong parameter setting also requires a lot of time and labor cost. Furthermore, since there are many versions of open server operating systems, when the server updates the version of the operating system, the previous command used to check or correct the server configuration may also be updated accordingly, resulting in checking and programming. Developers may not be able to quickly complete related tasks using all previous instructions, increasing the difficulty of checking and correcting tasks. Another point that cannot be ignored is that the use of manual inspection is likely to affect the stability and security of the entire server system due to a small negligence of the inspector.

有鑑於此,本發明提出一種伺服器組態檢核修正系統與檢核及修正伺服器組態的方法,在達到金融機構對於資訊安全需求的前提下,節省進行伺服器組態檢核及修正程序的人力及時間成本。In view of this, the present invention proposes a system for checking and correcting server configuration and a method for checking and correcting server configuration, which saves server configuration checking and correction under the premise of meeting financial institutions' requirements for information security The human and time cost of the procedure.

依據本發明一實施例的一種伺服器組態檢核及修正系統,包括授權裝置及伺服器。授權裝置包括儲存電路及控制電路。儲存電路用以存放硬體內碼及第一雜湊值。控制電路包括第一觸發元件及第二觸發元件。控制電路用以於第一觸發元件接收觸發操作時產生第一操作訊號,且於第二觸發元件接收另一觸發操作時產生第二操作訊號。伺服器電性連接授權裝置。伺服器用以安裝驗證程式、檢核程式及修正程式。驗證程式用以判斷授權裝置、檢核程式及修正程式是否合法。檢核程式用以於驗證程式判斷為合法之後且接收到第一操作訊號時執行以產生檢核報告。修正程式用以於驗證程式判斷為合法之後且接收到第二操作訊號時執行以修正伺服器之至少一組態值。A system for checking and correcting server configuration according to an embodiment of the present invention includes an authorization device and a server. The authorization device includes a storage circuit and a control circuit. The storage circuit is used for storing the hardware internal code and the first hash value. The control circuit includes a first trigger element and a second trigger element. The control circuit is used for generating a first operation signal when the first trigger element receives a trigger operation, and generates a second operation signal when the second trigger element receives another trigger operation. The server is electrically connected to the authorization device. The server is used to install verification programs, verification programs and correction programs. The verification program is used to determine whether the authorization device, the verification program and the correction program are legal. The check program is used to generate a check report after the verification program is judged to be legal and when the first operation signal is received. The modification program is used for executing to modify at least one configuration value of the server after the verification program is determined to be valid and when the second operation signal is received.

依據本發明一實施例的一種檢核及修正伺服器組態的方法,包括:以授權裝置電性連接安裝有檢核程式及修正程式的伺服器;伺服器執行驗證程式以判斷授權裝置、檢核程式及修正程式是否合法;當驗證程式判斷授權裝置、檢核程式及修正程式皆合法時,以授權裝置輸出第一操作訊號及第二操作訊號其中一者;其中當伺服器接收第一操作訊號時,執行檢核程式以產生檢核報告;或當伺服器接收第二操作訊號時,執行修正程式以修正伺服器之至少一組態值。According to an embodiment of the present invention, a method for checking and revising a server configuration includes: using an authorization device to electrically connect a server on which a check program and a correction program are installed; Check whether the verification program and the correction program are legal; when the verification program determines that the authorization device, the verification program and the correction program are all legal, the authorization device outputs one of the first operation signal and the second operation signal; when the server receives the first operation signal When the signal is received, a check program is executed to generate a check report; or when the server receives the second operation signal, a correction program is executed to modify at least one configuration value of the server.

以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本發明之精神與原理,並且提供本發明之專利申請範圍更進一步之解釋。The above description of the present disclosure and the following description of the embodiments are used to demonstrate and explain the spirit and principle of the present invention, and provide further explanation of the scope of the patent application of the present invention.

以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。以下之實施例係進一步詳細說明本發明之觀點,但非以任何觀點限制本發明之範疇。The detailed features and advantages of the present invention are described in detail below in the embodiments, and the content is sufficient to enable any person skilled in the relevant art to understand the technical content of the present invention and implement it accordingly, and according to the content disclosed in this specification, the scope of the patent application and the drawings , any person skilled in the related art can easily understand the related objects and advantages of the present invention. The following examples further illustrate the viewpoints of the present invention in detail, but do not limit the scope of the present invention in any viewpoint.

圖1係依據本發明一實施例的伺服器組態檢核及修正系統10所繪示的方塊架構圖。如圖1所示,伺服器組態檢核及修正系統10包括授權裝置1及伺服器3。授權裝置1電性連接伺服器3。具體來說,授權裝置1基於通用序列匯流排(Universal Serial Bus,USB)標準中的人性化界面裝置(Human Interface Device,HID)協定電性連接伺服器3。相較於使用通用序列匯流排(Universal Serial Bus,USB)標準中的USB大容量儲存裝置(Mass Stroage Device Class,MSC)協定作為連接介面的授權裝置,採用HID協定可降低電腦中毒的風險。另外,採用HID協定的授權裝置1可用於被禁用USB連接埠的伺服器3。FIG. 1 is a block diagram of a server configuration checking and correcting system 10 according to an embodiment of the present invention. As shown in FIG. 1 , the server configuration checking and correcting system 10 includes an authorization device 1 and a server 3 . The authorization device 1 is electrically connected to the server 3 . Specifically, the authorization device 1 is electrically connected to the server 3 based on the Human Interface Device (HID) protocol in the Universal Serial Bus (USB) standard. Compared with using the USB Mass Stroage Device Class (MSC) protocol in the Universal Serial Bus (USB) standard as an authorized device for the connection interface, using the HID protocol can reduce the risk of computer poisoning. In addition, the authorization device 1 using the HID protocol can be used for the server 3 whose USB port is disabled.

請參考圖1。授權裝置1包括儲存電路12及控制電路14。儲存電路12可存放硬體內碼及第一雜湊值,其中硬體內碼及第一雜湊值係預先被寫入至儲存電路12。硬體內碼用以證明授權裝置1屬於可信賴的裝置。第一雜湊值用以供伺服器3比對以確認本身安裝的程式是否未遭竄改。關於硬體內碼及第一雜湊值的應用方式將於後文詳述之。Please refer to Figure 1. The authorization device 1 includes a storage circuit 12 and a control circuit 14 . The storage circuit 12 can store the hardware internal code and the first hash value, wherein the hardware internal code and the first hash value are written into the storage circuit 12 in advance. The hardware internal code is used to prove that the authorized device 1 is a trusted device. The first hash value is used for comparison by the server 3 to confirm whether the program installed by itself has not been tampered with. The application of the hardware inner code and the first hash value will be described in detail later.

控制電路14包括第一觸發元件16及第二觸發元件18。請參考圖2,圖2係依據本發明一實施例的伺服器組態檢核及修正系統10所繪示的授權裝置1與伺服器3的連接示意圖。實務上,授權裝置1例如係以USB隨身碟型態的外觀呈現,透過連接頭11電性連接至伺服器3。而第一觸發元件16及第二觸發元件18例如係以按鈕或切換開關的方式呈現。第二觸發元件18的外部可更包括一保護殼19以防止誤觸。須注意的是,上述外觀型態僅作為示例而非用以限制本發明。The control circuit 14 includes a first trigger element 16 and a second trigger element 18 . Please refer to FIG. 2 . FIG. 2 is a schematic diagram illustrating the connection between the authorization device 1 and the server 3 according to the server configuration checking and correcting system 10 according to an embodiment of the present invention. In practice, the authorization device 1 is presented in the form of a USB flash drive, for example, and is electrically connected to the server 3 through the connector 11 . The first trigger element 16 and the second trigger element 18 are presented in the form of buttons or toggle switches, for example. The outside of the second trigger element 18 may further include a protective shell 19 to prevent accidental touch. It should be noted that the above-mentioned appearance patterns are only used as examples and are not used to limit the present invention.

請參考圖1。在第一觸發元件16接收觸發操作時,控制電路14產生第一操作訊號。在第二觸發元件18接收另一觸發操作時,控制電路14產生第二操作訊號。所述的觸發操作例如係按下按鈕或是撥動切換開關,本發明並不限制觸發操作的方式。Please refer to Figure 1. When the first trigger element 16 receives a trigger operation, the control circuit 14 generates a first operation signal. When the second trigger element 18 receives another trigger operation, the control circuit 14 generates a second operation signal. The triggering operation is, for example, pressing a button or flipping a switch, and the present invention does not limit the manner of the triggering operation.

請一併參考圖1及圖3,圖3係繪示本發明一實施例的檢核及修正伺服器組態的方法的流程圖。伺服器3包括運算電路32及儲存電路34。運算電路32電性連接至儲存電路34。儲存電路34可預先安裝驗證程式、檢核程式及修正程式,如圖3的步驟S0所示。Please refer to FIG. 1 and FIG. 3 together. FIG. 3 is a flowchart illustrating a method for checking and correcting server configuration according to an embodiment of the present invention. The server 3 includes an arithmetic circuit 32 and a storage circuit 34 . The arithmetic circuit 32 is electrically connected to the storage circuit 34 . The storage circuit 34 can be pre-installed with a verification program, a check program and a correction program, as shown in step S0 in FIG. 3 .

請參考步驟S1:將授權裝置1電性連接至伺服器3。在步驟S1完成後,伺服器3將以運算電路32執行驗證程式以判斷連接到本身的裝置是否為合法裝置,再依據此合法授權裝置1判斷本身安裝的檢核程式及修正程式是否合法,所述的「合法」係指檢核程式及修正程式未受電腦病毒感染或因故毀損。Please refer to step S1 : electrically connecting the authorization device 1 to the server 3 . After step S1 is completed, the server 3 will execute the verification program with the arithmetic circuit 32 to determine whether the device connected to itself is a legal device, and then determine whether the verification program and the correction program installed by itself are legal according to the legal authorization device 1. The "legitimate" mentioned here means that the checking programs and correction programs have not been infected by computer viruses or damaged for any reason.

詳言之,如步驟S2所示,驗證程式首先取得硬體內碼及系統當前時間。實務上,可藉由伺服器3的運算電路32發出適當的電子訊號以獲取授權裝置1的硬體內碼;授權裝置1亦可在電性連接伺服器3之後主動向伺服器3發送本身的硬體內碼,本發明對於取得硬體內碼的方式不予限制。Specifically, as shown in step S2, the verification program first obtains the hardware internal code and the current system time. In practice, the hardware internal code of the authorization device 1 can be obtained by sending an appropriate electronic signal from the computing circuit 32 of the server 3; In vivo code, the present invention does not limit the manner of obtaining the hardware inner code.

在取得硬體內碼之後,驗證程式再行判斷硬體內碼是否合法,如步驟S3所示。舉例來說,驗證程式中儲存一清單,此清單包括複數個子清單。每一子清單中包括複數個合法硬體內碼及一合法時間區段。這些合法硬體內碼例如由資安單位預先寫入到清單中。所述合法時間區段代表該子清單中的硬體內碼的有效使用時間。因此,驗證程式找出當前時間落於合法時間區段的子清單,再依據所取得的硬體內碼和該子清單中的合法硬體內碼逐一比對;若找到相符者,則代表該授權裝置1為合法授權裝置;若未找到相符者,則運算單元32發送通知訊號告知使用者該授權裝置1為非法授權裝置,並回到步驟S2重新取得硬體內碼。After obtaining the internal code of the hardware, the verification program determines whether the internal code of the hardware is legal, as shown in step S3. For example, the verification program stores a list that includes a plurality of sub-lists. Each sub-list includes a plurality of valid hardware internal codes and a valid time period. These legal hardware internal codes are pre-written into the list by the information security unit, for example. The legal time segment represents the valid usage time of the hardware inner code in the sub-list. Therefore, the verification program finds a sub-list whose current time falls within the legal time zone, and then compares the obtained hardware internal code with the legal hardware internal code in the sub-list one by one; if a match is found, it represents the authorized device 1 is a legitimate authorized device; if no match is found, the computing unit 32 sends a notification signal to inform the user that the authorized device 1 is an illegal authorized device, and returns to step S2 to obtain the hardware internal code again.

在確認授權裝置1合法之後,驗證程式繼續取得授權裝置1的儲存電路12中存放的第一雜湊值,如步驟S4所示。驗證程式依據檢核程式及修正程式執行一雜湊演算法以產生第二雜湊值,如步驟S5所示。所述的雜湊演算法例如係第三代安全雜湊演算法(Secure Hash Algorithm 3,SHA-3),但本發明並不以此為限。請參考步驟S6,驗證程式比對第一雜湊值及第二雜湊值是否相同,藉此確認安裝於伺服器3的檢核程式及修正程式是否仍為原本安裝時的版本。若第一雜湊值與第二雜湊值相同,代表檢核程式及修正程式之內容未被變更。因此,驗證程式產生一合法訊號以指示合法。所述的合法訊號例如指示運算電路32發送另一通知訊號,藉此告知使用者可開始執行伺服器3組態之檢核或修正。After confirming that the authorization device 1 is legal, the verification program continues to obtain the first hash value stored in the storage circuit 12 of the authorization device 1, as shown in step S4. The verification program executes a hash algorithm to generate a second hash value according to the check program and the correction program, as shown in step S5. The hash algorithm is, for example, the third generation secure hash algorithm (Secure Hash Algorithm 3, SHA-3), but the present invention is not limited to this. Referring to step S6, the verification program compares whether the first hash value and the second hash value are the same, thereby confirming whether the check program and the correction program installed on the server 3 are still the original versions. If the first hash value is the same as the second hash value, it means that the contents of the checking program and the correction program have not been changed. Therefore, the verification program generates a legal signal to indicate legal. The legal signal, for example, instructs the arithmetic circuit 32 to send another notification signal, thereby informing the user that the check or correction of the configuration of the server 3 can be started.

請參考步驟S7,在確認檢核程式及修正程式合法之後,使用者可觸發授權裝置1上的第一觸發元件16以選擇在伺服器3上執行檢核程式,或觸發授權裝置1上的第二觸發元件18以選擇在伺服器3上或修正程式。Please refer to step S7. After confirming that the verification program and the correction program are valid, the user can trigger the first trigger element 16 on the authorization device 1 to choose to execute the verification program on the server 3, or trigger the first trigger element 16 on the authorization device 1 to execute the verification program. Two trigger elements 18 to select on the server 3 or to modify the program.

當接收到第一觸發元件16產生的第一操作訊號時(相當於使用者按下檢核按鈕),則執行步驟S8:運算單元32執行檢核程式以產生一檢核報告。詳言之,檢核程式係偵測伺服器3之作業系統類型及執行對應於該作業系統類型之複數個檢核指令,所述的檢核指令用以取得伺服器3之複數個組態設定值。檢核程式可依據一標準設定值列表(例如由金融機構內部自行定義的規格表)比對所取得的組態設定值,並將比對結果輸出至檢核報告中,使用者可根據檢核報告得知伺服器3的各項組態設定值。When the first operation signal generated by the first trigger element 16 is received (equivalent to the user pressing the check button), step S8 is executed: the operation unit 32 executes the check program to generate a check report. Specifically, the check program detects the operating system type of the server 3 and executes a plurality of check commands corresponding to the operating system type, and the check commands are used to obtain a plurality of configuration settings of the server 3 value. The checking program can compare the obtained configuration setting values against a standard setting value list (such as a specification sheet defined by the financial institution), and output the comparison result to the checking report. The report shows the configuration settings of server 3.

所述的組態值例如伺服器3的密碼長度設定值,或是開啟作業系統的保護堆疊功能以防止IP傳送或主機欺騙(Host spoofing)。實務上,可根據金融機構的內部規範而自行定義檢核程式中的檢核指令。The configuration value is, for example, the password length setting value of the server 3, or enabling the protection stack function of the operating system to prevent IP transmission or host spoofing. In practice, the verification instructions in the verification program can be defined by themselves according to the internal regulations of the financial institution.

當接收到第二觸發元件18產生的第二操作訊號時(相當於使用者按下修正按鈕),則執行步驟S9:運算單元32執行修正程式以修正伺服器3之至少一組態值。詳言之,修正程式係偵測伺服器3之作業系統類型及執行對應於該作業系統類型之複數個修正指令。所述的修正指令用以依據標準設定值列表之複數個設定值分別取代伺服器3之複數個組態設定值。When the second operation signal generated by the second trigger element 18 is received (equivalent to the user pressing the correction button), step S9 is executed: the arithmetic unit 32 executes a correction program to correct at least one configuration value of the server 3 . Specifically, the correction program detects the operating system type of the server 3 and executes a plurality of correction commands corresponding to the operating system type. The modification command is used to replace the plurality of configuration setting values of the server 3 respectively according to the plurality of setting values of the standard setting value list.

本發明另一實施例中,在執行步驟S8或步驟S9之前,可再包括一密碼驗證程序。使用者須在伺服器3提供的介面輸入指定密碼後方可繼續執行步驟S8的檢核程式或步驟S9的修正程式。上述方式可加強檢核或修正操作的安全性。In another embodiment of the present invention, before step S8 or step S9 is executed, a password verification program may be further included. The user must input the designated password on the interface provided by the server 3 before continuing to execute the checking procedure of step S8 or the correction procedure of step S9. The above approach can enhance the security of checking or correcting operations.

實務上,檢核程式及修正程式例如採用Java語言撰寫,並以Java Development Kit開發。因此,檢核程式及修正程式可在多種作業系統的環境運行,並呼叫對應於當前作業系統的檢核指令或修正指令。由於採用跨平台的程式語言開發檢核及修正程式,因此可降低後續程式維護的成本,同時也降低教育訓練的成本。另外,對於後續伺服器3作業系統的更新,僅需對應調整檢核程式中的檢核指令或修正程式中的修正指令便可輕易地適用於運行不同作業系統的伺服器3。In practice, the check program and the correction program are written in the Java language, for example, and developed with the Java Development Kit. Therefore, the check program and the correction program can run in the environment of various operating systems, and call the check command or the correction command corresponding to the current operating system. Because of the use of cross-platform programming language to develop inspection and correction programs, the cost of subsequent program maintenance can be reduced, and the cost of education and training can also be reduced. In addition, for the subsequent update of the operating system of the server 3, it is only necessary to correspondingly adjust the check command in the check program or the correction command in the correction program, which can be easily applied to the server 3 running different operating systems.

綜合以上所述,本發明所揭露的伺服器組態檢核及修正系統與檢核及修正伺服器組態的方法,只需連接授權裝置至伺服器再按壓授權裝置上的檢核或修正按鈕,伺服器本身便可採取批次作業的方式檢核或修正本身的組態設定,因此可大幅縮短作業時程並增加作業效率。其次,本發明所提出的授權裝置係使用USB Human Interface Device協定,而非傳統USB隨身碟所採用之USB Mass Storage Device協定。因此,可避免隨身碟造成伺服器系統中毒之風險,採用HID協定亦可在限制USB裝置使用的伺服器上進行伺服器檢核修正作業。再者,在修正及檢核程式執行之前,必需先確認授權裝置的硬體內碼是否合法,藉此避免未經授權的操作。因此,本發明可實現資訊安全原則中的驗證性(Authenticity)及可歸責性(Accountability)。另外,本發明所揭露的檢核及修正程式係採用SHA-3演算法提前進行安全雜湊計算,並將雜湊值置入授權裝置中。在執行檢核及修正程式之前,必需與授權裝置互相進行雜湊值驗證,在驗證程式通過後才可繼續執行。因此,可避免檢核程式及修正程式遭病毒竄改,故可達成資訊安全原則中的完整性(Integrity)。當雜湊值驗證失敗時,亦可提醒使用者伺服器可能已遭病毒感染。此外,本發明所述的檢核及修正程式係以JDK進行程式開發,故可於不同平台執行相同程式。因此,可降低檢核及修正作業操作人員的教育訓練及使用成本,並且提升檢核及修正程式的可攜性。本發明更可藉由檢核及修正程式的更新,一併更新作業系統的指令,藉此解決各作業系統間因指令不同而造成檢核或修正作業中斷的問題。To sum up the above, the system for checking and correcting the server configuration and the method for checking and correcting the server configuration disclosed in the present invention only need to connect the authorization device to the server and then press the check or correction button on the authorization device , the server itself can check or correct its own configuration settings by batch operation, so it can greatly shorten the operation time and increase the operation efficiency. Secondly, the authorization device proposed by the present invention uses the USB Human Interface Device protocol instead of the USB Mass Storage Device protocol adopted by the conventional USB flash drives. Therefore, the risk of server system poisoning caused by the flash drive can be avoided, and the HID protocol can also be used to perform server check and correction operations on the server that restricts the use of USB devices. Furthermore, before the modification and verification program is executed, it is necessary to confirm whether the hardware internal code of the authorized device is legal, thereby avoiding unauthorized operations. Therefore, the present invention can realize the authentication (Authenticity) and the accountability (Accountability) in the information security principle. In addition, the verification and correction program disclosed in the present invention uses the SHA-3 algorithm to perform secure hash calculation in advance, and puts the hash value into the authorization device. Before the verification and correction procedures are executed, hash value verification must be carried out with the authorization device, and the execution can be continued after the verification procedure is passed. Therefore, the checking program and the correction program can be prevented from being tampered with by viruses, so the integrity in the information security principle can be achieved. When the hash value verification fails, it can also alert the user that the server may be infected by a virus. In addition, the checking and correcting programs of the present invention are developed with JDK, so the same programs can be executed on different platforms. Therefore, it is possible to reduce the cost of education, training and use of the inspection and correction operators, and to improve the portability of the inspection and correction programs. The present invention can also update the instructions of the operating system by updating the checking and correcting programs, thereby solving the problem that the checking or correcting operation is interrupted due to different instructions among the operating systems.

雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明。在不脫離本發明之精神和範圍內,所為之更動與潤飾,均屬本發明之專利保護範圍。關於本發明所界定之保護範圍請參考所附之申請專利範圍。Although the present invention is disclosed in the foregoing embodiments, it is not intended to limit the present invention. Changes and modifications made without departing from the spirit and scope of the present invention belong to the scope of patent protection of the present invention. For the protection scope defined by the present invention, please refer to the attached patent application scope.

10:伺服器組態檢核及修正系統 1:授權裝置 11:連接頭 12:儲存電路 14:控制電路 16:第一觸發元件 18:第二觸發元件 19:保護蓋 3:伺服器 32:運算電路 34:儲存電路10: Server configuration check and correction system 1: Authorization device 11: Connector 12: Storage circuit 14: Control circuit 16: The first trigger element 18: Second trigger element 19: Protective cover 3: Server 32: Operational circuit 34: Storage circuit

圖1係依據本發明一實施例的伺服器組態檢核及修正系統所繪示的方塊架構圖。 圖2係依據本發明一實施例的伺服器組態檢核及修正系統所繪示的授權裝置與伺服器的連接示意圖。 圖3係依據本發明一實施例的檢核及修正伺服器組態的方法所繪示的流程圖。FIG. 1 is a block diagram illustrating a system for checking and correcting server configuration according to an embodiment of the present invention. FIG. 2 is a schematic diagram showing the connection between the authorization device and the server according to the server configuration checking and correction system according to an embodiment of the present invention. FIG. 3 is a flowchart illustrating a method for checking and correcting server configuration according to an embodiment of the present invention.

1:授權裝置 1: Authorization device

3:伺服器 3: Server

11:連接頭 11: Connector

16:第一觸發元件 16: The first trigger element

18:第二觸發元件 18: Second trigger element

19:保護蓋 19: Protective cover

Claims (8)

一種基於觸發操作的伺服器組態檢核及修正系統,包括:一授權裝置,包括一儲存電路及一控制電路,該儲存電路電性連接該控制電路並用以存放一硬體內碼及一第一雜湊值;該控制電路包括一第一觸發元件及一第二觸發元件,該控制電路用以於該第一觸發元件接收一觸發操作時產生一第一操作訊號,且於該第二觸發元件接收另一觸發操作時產生一第二操作訊號;以及一伺服器,電性連接該授權裝置,該伺服器用以安裝一驗證程式、一檢核程式及一修正程式,其中該驗證程式用以判斷該授權裝置、該檢核程式及該修正程式是否合法;該檢核程式用以於該驗證程式判斷為合法之後且接收到該第一操作訊號時執行以產生一檢核報告;該修正程式用以於該驗證程式判斷為合法之後且接收到該第二操作訊號時執行以修正該伺服器之至少一組態值;其中該授權裝置基於人性化界面裝置(Human Interface Device)協定電性連接該伺服器,且該第一觸發元件及第二觸發元件係按鈕或切換開關。A system for checking and correcting server configuration based on trigger operation, comprising: an authorization device, including a storage circuit and a control circuit, the storage circuit is electrically connected to the control circuit and used to store a hardware internal code and a first Hash value; the control circuit includes a first trigger element and a second trigger element, the control circuit is used to generate a first operation signal when the first trigger element receives a trigger operation, and the second trigger element receives Another trigger operation generates a second operation signal; and a server is electrically connected to the authorization device, the server is used to install a verification program, a verification program and a correction program, wherein the verification program is used to determine Whether the authorization device, the verification program and the correction program are legal; the verification program is used to generate a verification report after the verification program is judged to be legal and when the first operation signal is received; the correction program uses to modify at least one configuration value of the server after the verification program is judged to be valid and when the second operation signal is received; wherein the authorization device is electrically connected to the server based on a human interface device (Human Interface Device) protocol a server, and the first trigger element and the second trigger element are buttons or switches. 如請求項1所述的基於觸發操作的伺服器組態檢核及修正系統,其中該驗證程式更用以取得該授權裝置之該硬體內碼、判斷該硬體內碼是否合法以決定該授權裝置是否合法;該驗證程式更用以取得該授權裝置之該第一雜湊值、依據該檢核程式及該修正程式執行一雜湊演算法以產生一第二雜湊值、以及比對該第一雜湊值及該第二雜湊值並選擇性地產生一合法訊號以指示該檢核程式及該修正程式是否合法;其中,該雜湊演算法係一第三代安全雜湊演算法(Secure Hash Algorithm 3,SHA-3)。The trigger operation-based server configuration checking and correction system as claimed in claim 1, wherein the verification program is further used to obtain the hardware internal code of the authorized device and determine whether the hardware internal code is legal to determine the authorized device Whether it is legal; the verification program is further used to obtain the first hash value of the authorized device, execute a hash algorithm according to the check program and the correction program to generate a second hash value, and compare the first hash value and the second hash value and selectively generate a legal signal to indicate whether the checking program and the correcting program are legal; wherein, the hash algorithm is a third-generation secure hash algorithm (Secure Hash Algorithm 3, SHA- 3). 如請求項2所述的基於觸發操作的伺服器組態檢核及修正系統,其中該驗證程式更用以儲存一清單,該清單包括複數個子清單,每一該子清單包括複數個合法硬體內碼,該些子清單各自具有一合法時間區段;該驗證程序更用以依據一當前時間及該授權裝置之該硬體內碼比對該些子清單的該合法時間區段及該些子清單其中一者之該些合法硬體內碼,其中該當前時間落於該些子清單其中一者之該合法時間區段。The trigger-based server configuration check and correction system as claimed in claim 2, wherein the verification program is further configured to store a list, the list includes a plurality of sub-lists, each of the sub-lists includes a plurality of legal hardware each of the sub-lists has a valid time zone; the verification procedure is further used to compare the valid time zone and the sub-lists of the sub-lists according to a current time and the hardware internal code of the authorization device The legal hardware internal codes of one of them, wherein the current time falls within the legal time zone of one of the sub-lists. 如請求項1所述的基於觸發操作的伺服器組態檢核及修正系統,其中該檢核程式及該修正程式係以Java Development Kit開發;該檢核程式更用以偵測該伺服器之一作業系統及執行對應於該作業系統之複數個檢核指令,該些檢核指令用以取得該伺服器之複數個組態設定值,依據一標準設定值列表比對該些組態設定值,及輸出一檢核報表,以及該修正程式更用以偵測該伺服器之該作業系統及執行對應於該作業系統之複數個修正指令,該些修正指令用以依據該標準設定值列表之複數個設定值分別取代該伺服器之該些組態設定值。The trigger operation-based server configuration checking and correction system as claimed in claim 1, wherein the checking program and the correction program are developed with a Java Development Kit; the checking program is further used to detect the server an operating system and executing a plurality of check commands corresponding to the operating system, the check commands are used to obtain a plurality of configuration setting values of the server, and compare the configuration setting values according to a standard setting value list , and output a check report, and the correction program is further used to detect the operating system of the server and execute a plurality of correction commands corresponding to the operating system, and the correction commands are used to set the value list according to the standard. The plurality of setting values respectively replace the configuration setting values of the server. 一種基於觸發操作的檢核及修正伺服器組態的方法,包括:以一授權裝置電性連接一伺服器,其中該伺服器安裝有一檢核程式及一修正程式,該授權裝置基於人性化界面裝置(Human Interface Device)協定電性連接該伺服器;以該伺服器執行一驗證程式以判斷該授權裝置、該檢核程式及該修正程式是否合法;當該驗證程式判斷該授權裝置、該檢核程式及該修正程式皆合法時,以該授權裝置輸出一第一操作訊號及一第二操作訊號其中一者;其中該授權裝置包括一控制電路,該控制電路包括一第一觸發元件及一第二觸發元件,該控制電路用以於該第一觸發元件接收一觸發操作時產生一第一操作訊號,且於該第二觸發元件接收另一觸發操作時產生一第二操作訊號,且該第一觸發元件及該第二觸發元件係按鈕或切換開關;當該伺服器接收該第一操作訊號時,執行一檢核程式以產生一檢核報告;或當該伺服器接收該第二操作訊號時,執行一修正程式以修正該伺服器之至少一組態值。A method for checking and correcting server configuration based on trigger operation, comprising: electrically connecting a server with an authorization device, wherein the server is installed with a check program and a correction program, and the authorization device is based on a user-friendly interface The device (Human Interface Device) agreement is electrically connected to the server; a verification program is executed by the server to determine whether the authorization device, the verification program and the correction program are legal; when the verification program determines the authorization device, the verification program When both the kernel program and the correction program are legal, use the authorization device to output one of a first operation signal and a second operation signal; wherein the authorization device includes a control circuit, and the control circuit includes a first trigger element and a a second trigger element, the control circuit is used for generating a first operation signal when the first trigger element receives a trigger operation, and generates a second operation signal when the second trigger element receives another trigger operation, and the The first trigger element and the second trigger element are buttons or switches; when the server receives the first operation signal, a check program is executed to generate a check report; or when the server receives the second operation When the signal is received, a correction program is executed to correct at least one configuration value of the server. 如請求項5所述的基於觸發操作的檢核及修正伺服器組態的方法,其中該驗證程式包括:取得該授權裝置之一硬體內碼並判斷該硬體內碼是否合法;當該硬體內碼合法時,取得該授權裝置之一第一雜湊值;在取得該第一雜湊值之後,依據該檢核程式及該修正程式執行一雜湊演算法以產生一第二雜湊值;以及比對該第一雜湊值及該第二雜湊值,且當該第一雜湊值及該第二雜湊值相等時,輸出一合法訊號以指示該授權裝置合法;其中,該雜湊演算法係一第三代安全雜湊演算法(Secure Hash Algorithm 3,SHA-3)。The method for checking and correcting server configuration based on a trigger operation as claimed in claim 5, wherein the verification procedure comprises: obtaining a hardware internal code of the authorized device and judging whether the hardware internal code is legal; When the code is valid, obtain a first hash value of the authorization device; after obtaining the first hash value, execute a hash algorithm according to the checking program and the correction program to generate a second hash value; and compare the the first hash value and the second hash value, and when the first hash value and the second hash value are equal, output a legal signal to indicate that the authorization device is legal; wherein, the hash algorithm is a third-generation security Hash algorithm (Secure Hash Algorithm 3, SHA-3). 如請求項6所述的基於觸發操作的檢核及修正伺服器組態的方法,其中判斷該硬體內碼是否合法更包括:以該伺服器讀取該驗證程式之一清單,該清單包括複數個子清單,每一該子清單包括複數個合法硬體內碼,該些子清單各自具有一合法時間區段;以該伺服器分別比對一當前時間及該些子清單的該合法時間區段以取得該當前時間落於該合法時間區段之該些子清單其中一者; 在該伺服器取得該些子清單其中一者之後,以該伺服器依據該授權裝置之該硬體內碼比對該子清單之該些合法硬體內碼;以及當該授權裝置之該硬體內碼與該些合法硬體內碼其中一者相符時,始以該伺服器取得該授權裝置之該第一雜湊值。The method for checking and correcting server configuration based on a trigger operation as described in claim 6, wherein determining whether the hardware internal code is legal further comprises: reading a list of the verification program with the server, the list including a plurality of sub-lists, each sub-list includes a plurality of valid hardware internal codes, each of the sub-lists has a valid time zone; the server compares a current time with the valid time zone of the sub-lists to obtain Obtaining one of the sub-lists whose current time falls within the legal time zone; after the server obtains one of the sub-lists, using the server according to the hardware internal code of the authorized device to compare the the legal hardware internal codes of the sub-list; and when the hardware internal code of the authorized device matches one of the legal hardware internal codes, the first hash value of the authorized device is obtained from the server. 如請求項5所述的基於觸發操作的檢核及修正伺服器組態的方法,其中該檢核程式及該修正程式係以Java Development Kit開發,且在執行該檢核程式或該修正程式時更包括:偵測該伺服器之一作業系統;以及執行對應於該作業系統之複數個檢核指令或修正指令。The method for checking and correcting server configuration based on a trigger operation as claimed in claim 5, wherein the checking program and the correcting program are developed with a Java Development Kit, and when the checking program or the correcting program is executed It further includes: detecting an operating system of the server; and executing a plurality of checking commands or correction commands corresponding to the operating system.
TW110103492A 2019-05-22 2019-05-22 Inspection and correction system of server's configuration based on touch operation and method thereof TWI752813B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW110103492A TWI752813B (en) 2019-05-22 2019-05-22 Inspection and correction system of server's configuration based on touch operation and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW110103492A TWI752813B (en) 2019-05-22 2019-05-22 Inspection and correction system of server's configuration based on touch operation and method thereof

Publications (2)

Publication Number Publication Date
TW202134875A TW202134875A (en) 2021-09-16
TWI752813B true TWI752813B (en) 2022-01-11

Family

ID=78777330

Family Applications (1)

Application Number Title Priority Date Filing Date
TW110103492A TWI752813B (en) 2019-05-22 2019-05-22 Inspection and correction system of server's configuration based on touch operation and method thereof

Country Status (1)

Country Link
TW (1) TWI752813B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200520490A (en) * 2003-12-15 2005-06-16 Microsoft Corp System and method for managing and communicating software updates
US20050198235A1 (en) * 2004-01-29 2005-09-08 Arvind Kumar Server configuration and management
CN101908967A (en) * 2009-06-02 2010-12-08 百度在线网络技术(北京)有限公司 Configuration method and system of Linux virtual server
CN104092555A (en) * 2013-12-04 2014-10-08 腾讯数码(天津)有限公司 Parameter value updating method, device and system
CN105812570A (en) * 2016-04-21 2016-07-27 深圳市旭子科技有限公司 Terminal firmware updating method and device
CN109241747A (en) * 2007-04-13 2019-01-18 瑞典爱立信有限公司 Trusted component update system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200520490A (en) * 2003-12-15 2005-06-16 Microsoft Corp System and method for managing and communicating software updates
US20050198235A1 (en) * 2004-01-29 2005-09-08 Arvind Kumar Server configuration and management
CN109241747A (en) * 2007-04-13 2019-01-18 瑞典爱立信有限公司 Trusted component update system and method
CN101908967A (en) * 2009-06-02 2010-12-08 百度在线网络技术(北京)有限公司 Configuration method and system of Linux virtual server
CN104092555A (en) * 2013-12-04 2014-10-08 腾讯数码(天津)有限公司 Parameter value updating method, device and system
CN105812570A (en) * 2016-04-21 2016-07-27 深圳市旭子科技有限公司 Terminal firmware updating method and device

Also Published As

Publication number Publication date
TW202134875A (en) 2021-09-16

Similar Documents

Publication Publication Date Title
CN111008379B (en) Firmware safety detection method of electronic equipment and related equipment
US9542337B2 (en) Device side host integrity validation
US10397230B2 (en) Service processor and system with secure booting and monitoring of service processor integrity
CN106452783B (en) Computer system and method for secure execution
JP5265662B2 (en) Trusted component update system and trusted component update method
JP5735509B2 (en) Method and apparatus for obtaining a reliable path that can be verified by a user in the presence of malware
JP4708414B2 (en) Autonomous memory checker for runtime security assurance
US8490179B2 (en) Computing platform
JP4769608B2 (en) Information processing apparatus having start verification function
US20180285127A1 (en) Method for trusted booting of plc based on measurement mechanism
US20180089414A1 (en) User trusted device for detecting a virtualized environment
US20060236122A1 (en) Secure boot
US8266691B2 (en) Renewable integrity rooted system
JP2007102791A (en) Execution environment enhanced in safety by preventing execution of unauthorized boot loader
KR20160042897A (en) Secure os boot as per reference platform manifest and data sealing
US9519786B1 (en) Firmware integrity ensurance and update
US11422901B2 (en) Operating system repairs via recovery agents
CN109804378A (en) BIOS safety
CN110674494B (en) Process protection method, system and data processing method
CN106919845B (en) System security trust chain construction device and method
US20190286825A1 (en) Automated workflow management and monitoring of datacenter it security compliance
CN106951785B (en) JAVA virtual machine and trust chain extension method thereof
TWI752813B (en) Inspection and correction system of server's configuration based on touch operation and method thereof
JP6744256B2 (en) Confirmation system, control device, and confirmation method
TWI715047B (en) Inspection and correction system of server's configuration and method of inspecting and correcting server's configuration