TWM583959U - Inspection and correction system of server's configuration - Google Patents

Inspection and correction system of server's configuration Download PDF

Info

Publication number
TWM583959U
TWM583959U TW108206445U TW108206445U TWM583959U TW M583959 U TWM583959 U TW M583959U TW 108206445 U TW108206445 U TW 108206445U TW 108206445 U TW108206445 U TW 108206445U TW M583959 U TWM583959 U TW M583959U
Authority
TW
Taiwan
Prior art keywords
program
server
check
correction
legal
Prior art date
Application number
TW108206445U
Other languages
Chinese (zh)
Inventor
許銘峻
Original Assignee
華南商業銀行股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 華南商業銀行股份有限公司 filed Critical 華南商業銀行股份有限公司
Priority to TW108206445U priority Critical patent/TWM583959U/en
Publication of TWM583959U publication Critical patent/TWM583959U/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

一種伺服器組態檢核及修正系統,包括授權裝置及伺服器。授權裝置包括儲存電路及控制電路。儲存電路存放硬體內碼及第一雜湊值。控制電路包括第一及第二觸發元件。控制電路於第一或第二觸發元件接收觸發操作時分別產生第一或第二操作訊號。伺服器用以安裝驗證程式、檢核程式及修正程式。驗證程式用以判斷授權裝置、檢核程式及修正程式是否合法。檢核程式於驗證程式判斷為合法後且接收到第一操作訊號時執行以產生檢核報告。修正程式於驗證程式判斷為合法之後且接收到第二操作訊號時執行以修正伺服器之至少一組態值。A server configuration check and correction system, including an authorization device and a server. The authorization device includes a storage circuit and a control circuit. The storage circuit stores the hard body code and the first hash value. The control circuit includes first and second triggering elements. The control circuit generates the first or second operation signals respectively when the first or second triggering element receives the triggering operation. The server is used to install the verification program, check program and correction program. The verification program is used to determine whether the authorization device, the verification program and the correction program are legal. The check program is executed after the verification program determines that it is legal and receives the first operation signal to generate an inspection report. The correction program is executed to correct at least one configuration value of the server after the verification program determines that it is legal and receives the second operation signal.

Description

伺服器組態檢核及修正系統Server configuration check and correction system

本創作係關於伺服器的組態檢核與修正,特別是一種透過授權裝置進行伺服器組態檢核及修正的系統及方法。This creation is about the configuration check and correction of the server, especially a system and method for checking and correcting the configuration of the server through the authorization device.

金融機構購入的新伺服器或電腦可安裝各種開放式作業系統例如Windows、AIX、Linux等。這些伺服器在實際上線運作之前,資安人員需要先確認每台伺服器或電腦中的安全設定皆符合內部規範。New servers or computers purchased by financial institutions can be installed with various open operating systems such as Windows, AIX, Linux, etc. Before these servers are actually operating, the security personnel need to confirm that the security settings in each server or computer are in compliance with internal specifications.

然而,現今核對伺服器組態的方式耗費大量人力及工時。詳言之,檢核人員必須熟悉Windows 的PowerShell、Linux的Bash或IBM AIX的korn shell等命令列介面的指令操作方可順利進行檢核。此外,不只檢核費力費時,針對參數設定錯誤的伺服器組態進行修正的操作同樣需要大量時間及人力成本。再者,由於開放式伺服器作業系統的版本眾多,當伺服器更新作業系統的版本時,前次用於檢核或修正伺服器組態的指令亦可能隨之更新,因此導致檢核及程式開發人員未必能全部採用先前的指令迅速完成相關作業,增加檢核與修正作業上的困難程度。另外不容忽視的一點是,採用人工檢查的方式,很有可能因為檢核人員的一個小疏失而影響整個伺服器系統的穩定性與安全性。However, the way in which the server configuration is now checked is labor intensive and labor intensive. In particular, the auditor must be familiar with the command operations of the command line interface such as Windows PowerShell, Linux Bash or IBM AIX korn shell to check smoothly. In addition, not only the laborious and time-consuming inspection, but also the correction of the server configuration with incorrect parameter settings requires a lot of time and labor costs. Furthermore, due to the large number of open server operating systems, when the server updates the version of the operating system, the instructions used to check or correct the server configuration may be updated, resulting in checks and programs. Developers may not be able to quickly complete related operations using previous instructions, increasing the difficulty of checking and correcting operations. Another point that cannot be ignored is that the manual inspection method is likely to affect the stability and security of the entire server system due to a small error of the auditor.

有鑑於此,本創作提出一種伺服器組態檢核修正系統與檢核及修正伺服器組態的方法,在達到金融機構對於資訊安全需求的前提下,節省進行伺服器組態檢核及修正程序的人力及時間成本。In view of this, this author proposes a server configuration check correction system and a method for checking and correcting the configuration of the server. Under the premise of meeting the financial security requirements of the financial institution, the server configuration check and correction are saved. Manpower and time costs of the program.

依據本創作一實施例的一種伺服器組態檢核及修正系統,包括授權裝置及伺服器。授權裝置包括儲存電路及控制電路。儲存電路用以存放硬體內碼及第一雜湊值。控制電路包括第一觸發元件及第二觸發元件。控制電路用以於第一觸發元件接收觸發操作時產生第一操作訊號,且於第二觸發元件接收另一觸發操作時產生第二操作訊號。伺服器電性連接授權裝置。伺服器用以安裝驗證程式、檢核程式及修正程式。驗證程式用以判斷授權裝置、檢核程式及修正程式是否合法。檢核程式用以於驗證程式判斷為合法之後且接收到第一操作訊號時執行以產生檢核報告。修正程式用以於驗證程式判斷為合法之後且接收到第二操作訊號時執行以修正伺服器之至少一組態值。A server configuration check and correction system, including an authorization device and a server, according to an embodiment of the present invention. The authorization device includes a storage circuit and a control circuit. The storage circuit is used to store the hard body code and the first hash value. The control circuit includes a first trigger element and a second trigger element. The control circuit is configured to generate a first operation signal when the first trigger element receives the trigger operation, and generate a second operation signal when the second trigger element receives another trigger operation. The server is electrically connected to the authorized device. The server is used to install the verification program, check program and correction program. The verification program is used to determine whether the authorization device, the verification program and the correction program are legal. The check program is executed after the verification program determines that it is legal and receives the first operation signal to generate an inspection report. The correction program is configured to perform at least one configuration value of the correction server after the verification program determines that it is legal and receives the second operation signal.

依據本創作一實施例的一種檢核及修正伺服器組態的方法,包括:以授權裝置電性連接安裝有檢核程式及修正程式的伺服器;伺服器執行驗證程式以判斷授權裝置、檢核程式及修正程式是否合法;當驗證程式判斷授權裝置、檢核程式及修正程式皆合法時,以授權裝置輸出第一操作訊號及第二操作訊號其中一者;其中當伺服器接收第一操作訊號時,執行檢核程式以產生檢核報告;或當伺服器接收第二操作訊號時,執行修正程式以修正伺服器之至少一組態值。A method for checking and correcting a server configuration according to an embodiment of the present invention includes: electrically connecting a server with a check program and a correction program to an authorized device; and executing a verification program to determine an authorized device and checking the server Whether the nuclear program and the correction program are legal; when the verification program determines that the authorization device, the verification program and the correction program are both legal, the authorized device outputs one of the first operation signal and the second operation signal; wherein the server receives the first operation When the signal is received, the check program is executed to generate a check report; or when the server receives the second operation signal, the correction program is executed to correct at least one configuration value of the server.

以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本創作之精神與原理,並且提供本創作之專利申請範圍更進一步之解釋。The above description of the disclosure and the following description of the embodiments are intended to illustrate and explain the spirit and principles of the present invention, and to provide further explanation of the scope of the patent application of the present invention.

以下在實施方式中詳細敘述本創作之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本創作之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本創作相關之目的及優點。以下之實施例係進一步詳細說明本創作之觀點,但非以任何觀點限制本創作之範疇。The detailed features and advantages of the present invention are described in detail below in the embodiments, which are sufficient to enable any skilled artisan to understand the technical contents of the present invention and implement it according to the contents, the scope of the patent application and the drawings. Anyone familiar with the relevant art can easily understand the purpose and advantages of this creation. The following examples are intended to further illustrate the scope of this creation, but do not limit the scope of the creation in any way.

圖1係依據本創作一實施例的伺服器組態檢核及修正系統10所繪示的方塊架構圖。如圖1所示,伺服器組態檢核及修正系統10包括授權裝置1及伺服器3。授權裝置1電性連接伺服器3。具體來說,授權裝置1基於通用序列匯流排(Universal Serial Bus,USB)標準中的人性化界面裝置(Human Interface Device,HID)協定電性連接伺服器3。相較於使用通用序列匯流排(Universal Serial Bus,USB)標準中的USB大容量儲存裝置(Mass Stroage Device Class,MSC)協定作為連接介面的授權裝置,採用HID協定可降低電腦中毒的風險。另外,採用HID協定的授權裝置1可用於被禁用USB連接埠的伺服器3。1 is a block diagram of a server configuration check and correction system 10 in accordance with an embodiment of the present invention. As shown in FIG. 1, the server configuration check and correction system 10 includes an authorization device 1 and a server 3. The authorization device 1 is electrically connected to the server 3. Specifically, the authorization device 1 is electrically connected to the server 3 based on a Human Interface Device (HID) protocol in the Universal Serial Bus (USB) standard. Compared with the USB Stroage Device Class (MSC) protocol in the Universal Serial Bus (USB) standard as the authorization device for the connection interface, the HID protocol can reduce the risk of computer poisoning. In addition, the authorization device 1 employing the HID protocol can be used for the server 3 to which the USB port is disabled.

請參考圖1。授權裝置1包括儲存電路12及控制電路14。儲存電路12可存放硬體內碼及第一雜湊值,其中硬體內碼及第一雜湊值係預先被寫入至儲存電路12。硬體內碼用以證明授權裝置1屬於可信賴的裝置。第一雜湊值用以供伺服器3比對以確認本身安裝的程式是否未遭竄改。關於硬體內碼及第一雜湊值的應用方式將於後文詳述之。Please refer to Figure 1. The authorization device 1 includes a storage circuit 12 and a control circuit 14. The storage circuit 12 can store the hard body code and the first hash value, wherein the hard body code and the first hash value are written to the storage circuit 12 in advance. The hard body code is used to prove that the authorizing device 1 belongs to a trusted device. The first hash value is used by server 3 to verify that the program installed by itself has not been tampered with. The application of the hard body code and the first hash value will be described later.

控制電路14包括第一觸發元件16及第二觸發元件18。請參考圖2,圖2係依據本創作一實施例的伺服器組態檢核及修正系統10所繪示的授權裝置1與伺服器3的連接示意圖。實務上,授權裝置1例如係以USB隨身碟型態的外觀呈現,透過連接頭11電性連接至伺服器3。而第一觸發元件16及第二觸發元件18例如係以按鈕或切換開關的方式呈現。第二觸發元件18的外部可更包括一保護殼19以防止誤觸。須注意的是,上述外觀型態僅作為示例而非用以限制本創作。The control circuit 14 includes a first trigger element 16 and a second trigger element 18. Please refer to FIG. 2. FIG. 2 is a schematic diagram of the connection between the authorization device 1 and the server 3 according to the server configuration check and correction system 10 according to an embodiment of the present invention. In practice, the authorization device 1 is presented, for example, in the appearance of a USB flash drive type, and is electrically connected to the server 3 through the connector 11 . The first triggering element 16 and the second triggering element 18 are presented, for example, in the form of buttons or toggle switches. The exterior of the second triggering element 18 may further include a protective casing 19 to prevent false touches. It should be noted that the above appearance is merely an example and is not intended to limit the creation.

請參考圖1。在第一觸發元件16接收觸發操作時,控制電路14產生第一操作訊號。在第二觸發元件18接收另一觸發操作時,控制電路14產生第二操作訊號。所述的觸發操作例如係按下按鈕或是撥動切換開關,本創作並不限制觸發操作的方式。Please refer to Figure 1. The control circuit 14 generates a first operational signal when the first triggering component 16 receives the triggering operation. When the second triggering element 18 receives another triggering operation, the control circuit 14 generates a second operational signal. The triggering operation is, for example, pressing a button or a toggle switch, and the present creation does not limit the manner in which the operation is triggered.

請一併參考圖1及圖3,圖3係繪示本創作一實施例的檢核及修正伺服器組態的方法的流程圖。伺服器3包括運算電路32及儲存電路34。運算電路32電性連接至儲存電路34。儲存電路34可預先安裝驗證程式、檢核程式及修正程式,如圖3的步驟S0所示。Please refer to FIG. 1 and FIG. 3 together. FIG. 3 is a flow chart showing a method for checking and correcting the configuration of the server according to an embodiment of the present invention. The server 3 includes an arithmetic circuit 32 and a storage circuit 34. The arithmetic circuit 32 is electrically connected to the storage circuit 34. The storage circuit 34 can be pre-installed with the verification program, the check program, and the correction program, as shown in step S0 of FIG.

請參考步驟S1:將授權裝置1電性連接至伺服器3。在步驟S1完成後,伺服器3將以運算電路32執行驗證程式以判斷連接到本身的裝置是否為合法裝置,再依據此合法授權裝置1判斷本身安裝的檢核程式及修正程式是否合法,所述的「合法」係指檢核程式及修正程式未受電腦病毒感染或因故毀損。Please refer to step S1: electrically connecting the authorization device 1 to the server 3. After the step S1 is completed, the server 3 will execute the verification program by the operation circuit 32 to determine whether the device connected to itself is a legitimate device, and then according to the legal authorization device 1 to determine whether the check program and the correction program installed by itself are legal. The term "legal" means that the check-up procedure and the correction program have not been infected by a computer virus or have been damaged.

詳言之,如步驟S2所示,驗證程式首先取得硬體內碼及系統當前時間。實務上,可藉由伺服器3的運算電路32發出適當的電子訊號以獲取授權裝置1的硬體內碼;授權裝置1亦可在電性連接伺服器3之後主動向伺服器3發送本身的硬體內碼,本創作對於取得硬體內碼的方式不予限制。In detail, as shown in step S2, the verification program first obtains the hardware code and the current time of the system. In practice, the hardware signal of the authorization device 1 can be obtained by the operation circuit 32 of the server 3 to obtain the hard code of the authorization device 1; the authorization device 1 can also actively send the hard signal to the server 3 after the server 3 is electrically connected. In vivo code, this creation does not limit the way in which the hard body code is obtained.

在取得硬體內碼之後,驗證程式再行判斷硬體內碼是否合法,如步驟S3所示。舉例來說,驗證程式中儲存一清單,此清單包括複數個子清單。每一子清單中包括複數個合法硬體內碼及一合法時間區段。這些合法硬體內碼例如由資安單位預先寫入到清單中。所述合法時間區段代表該子清單中的硬體內碼的有效使用時間。因此,驗證程式找出當前時間落於合法時間區段的子清單,再依據所取得的硬體內碼和該子清單中的合法硬體內碼逐一比對;若找到相符者,則代表該授權裝置1為合法授權裝置;若未找到相符者,則運算單元32發送通知訊號告知使用者該授權裝置1為非法授權裝置,並回到步驟S2重新取得硬體內碼。After obtaining the hard body code, the verification program determines whether the hardware code is legal, as shown in step S3. For example, the verification program stores a list that includes a plurality of sub-lists. Each sub-list includes a plurality of legal hard-codes and a legal time segment. These legal hard body codes are, for example, pre-written into the list by the security unit. The legal time zone represents the effective use time of the hard body code in the sub-list. Therefore, the verification program finds that the current time falls on the sub-list of the legal time zone, and then compares the obtained hard body code with the legal hard body code in the sub-list; if the match is found, it represents the authorized device. 1 is a legal authorization device; if no match is found, the operation unit 32 sends a notification signal to inform the user that the authorization device 1 is an illegal authorization device, and returns to step S2 to re-acquire the hard body code.

在確認授權裝置1合法之後,驗證程式繼續取得授權裝置1的儲存電路12中存放的第一雜湊值,如步驟S4所示。驗證程式依據檢核程式及修正程式執行一雜湊演算法以產生第二雜湊值,如步驟S5所示。所述的雜湊演算法例如係第三代安全雜湊演算法(Secure Hash Algorithm 3,SHA-3),但本創作並不以此為限。請參考步驟S6,驗證程式比對第一雜湊值及第二雜湊值是否相同,藉此確認安裝於伺服器3的檢核程式及修正程式是否仍為原本安裝時的版本。若第一雜湊值與第二雜湊值相同,代表檢核程式及修正程式之內容未被變更。因此,驗證程式產生一合法訊號以指示合法。所述的合法訊號例如指示運算電路32發送另一通知訊號,藉此告知使用者可開始執行伺服器3組態之檢核或修正。After confirming that the authorizing device 1 is legal, the verification program continues to obtain the first hash value stored in the storage circuit 12 of the authorizing device 1, as shown in step S4. The verification program executes a hash algorithm according to the check program and the correction program to generate a second hash value, as shown in step S5. The hash algorithm is, for example, a third-generation Secure Hash Algorithm 3 (SHA-3), but the present invention is not limited thereto. Referring to step S6, the verification program compares whether the first hash value and the second hash value are the same, thereby confirming whether the check program and the correction program installed on the server 3 are still the original installed version. If the first hash value is the same as the second hash value, the contents of the check program and the correction program are not changed. Therefore, the verification program generates a legal signal to indicate legality. The legal signal, for example, instructs the arithmetic circuit 32 to send another notification signal, thereby informing the user that the verification or correction of the configuration of the server 3 can be started.

請參考步驟S7,在確認檢核程式及修正程式合法之後,使用者可觸發授權裝置1上的第一觸發元件16以選擇在伺服器3上執行檢核程式,或觸發授權裝置1上的第二觸發元件18以選擇在伺服器3上或修正程式。Referring to step S7, after confirming that the check program and the correction program are legal, the user can trigger the first trigger component 16 on the authorization device 1 to select to execute the check program on the server 3, or trigger the first on the authorization device 1. The trigger element 18 is selected to be on the server 3 or to modify the program.

當接收到第一觸發元件16產生的第一操作訊號時(相當於使用者按下檢核按鈕),則執行步驟S8:運算單元32執行檢核程式以產生一檢核報告。詳言之,檢核程式係偵測伺服器3之作業系統類型及執行對應於該作業系統類型之複數個檢核指令,所述的檢核指令用以取得伺服器3之複數個組態設定值。檢核程式可依據一標準設定值列表(例如由金融機構內部自行定義的規格表)比對所取得的組態設定值,並將比對結果輸出至檢核報告中,使用者可根據檢核報告得知伺服器3的各項組態設定值。When the first operation signal generated by the first triggering component 16 is received (corresponding to the user pressing the check button), step S8 is performed: the computing unit 32 executes the checking program to generate a check report. In detail, the check program detects the type of the operating system of the server 3 and executes a plurality of check instructions corresponding to the type of the operating system, and the check command is used to obtain a plurality of configuration settings of the server 3. value. The check program can compare the obtained configuration settings according to a standard set value list (for example, a specification table defined by the financial institution), and output the comparison result to the check report, and the user can check according to the check. The report knows the configuration settings of the server 3.

所述的組態值例如伺服器3的密碼長度設定值,或是開啟作業系統的保護堆疊功能以防止IP傳送或主機欺騙(Host spoofing)。實務上,可根據金融機構的內部規範而自行定義檢核程式中的檢核指令。The configuration value is, for example, the password length setting value of the server 3, or the protection stack function of the operating system is turned on to prevent IP transmission or host spoofing. In practice, the inspection instructions in the verification program can be defined by the financial institution's internal specifications.

當接收到第二觸發元件18產生的第二操作訊號時(相當於使用者按下修正按鈕),則執行步驟S9:運算單元32執行修正程式以修正伺服器3之至少一組態值。詳言之,修正程式係偵測伺服器3之作業系統類型及執行對應於該作業系統類型之複數個修正指令。所述的修正指令用以依據標準設定值列表之複數個設定值分別取代伺服器3之複數個組態設定值。When the second operation signal generated by the second triggering component 18 is received (corresponding to the user pressing the correction button), step S9 is performed: the arithmetic unit 32 executes a correction program to modify at least one configuration value of the server 3. In detail, the correction program detects the type of the operating system of the server 3 and executes a plurality of correction instructions corresponding to the type of the operating system. The correction command is used to replace the plurality of configuration settings of the server 3 according to a plurality of setting values of the standard set value list.

本創作另一實施例中,在執行步驟S8或步驟S9之前,可再包括一密碼驗證程序。使用者須在伺服器3提供的介面輸入指定密碼後方可繼續執行步驟S8的檢核程式或步驟S9的修正程式。上述方式可加強檢核或修正操作的安全性。In another embodiment of the present creation, a password verification program may be further included before step S8 or step S9 is performed. The user must input the specified password in the interface provided by the server 3 to continue the check program of step S8 or the correction program of step S9. The above method can enhance the security of the check or correction operation.

實務上,檢核程式及修正程式例如採用Java語言撰寫,並以Java Development Kit開發。因此,檢核程式及修正程式可在多種作業系統的環境運行,並呼叫對應於當前作業系統的檢核指令或修正指令。由於採用跨平台的程式語言開發檢核及修正程式,因此可降低後續程式維護的成本,同時也降低教育訓練的成本。另外,對於後續伺服器3作業系統的更新,僅需對應調整檢核程式中的檢核指令或修正程式中的修正指令便可輕易地適用於運行不同作業系統的伺服器3。In practice, the check program and the correction program are written in Java language, for example, and developed with the Java Development Kit. Therefore, the check program and the correction program can be operated in the environment of various operating systems, and call the check command or the correction command corresponding to the current operating system. The use of cross-platform programming language development check and correction programs can reduce the cost of subsequent program maintenance and reduce the cost of education and training. In addition, the update of the subsequent server 3 operating system can be easily applied to the server 3 running different operating systems only by corresponding to the check command in the check check program or the correction command in the correction program.

綜合以上所述,本創作所揭露的伺服器組態檢核及修正系統與檢核及修正伺服器組態的方法,只需連接授權裝置至伺服器再按壓授權裝置上的檢核或修正按鈕,伺服器本身便可採取批次作業的方式檢核或修正本身的組態設定,因此可大幅縮短作業時程並增加作業效率。其次,本創作所提出的授權裝置係使用USB Human Interface Device協定,而非傳統USB隨身碟所採用之USB Mass Storage Device協定。因此,可避免隨身碟造成伺服器系統中毒之風險,採用HID協定亦可在限制USB裝置使用的伺服器上進行伺服器檢核修正作業。再者,在修正及檢核程式執行之前,必需先確認授權裝置的硬體內碼是否合法,藉此避免未經授權的操作。因此,本創作可實現資訊安全原則中的驗證性(Authenticity)及可歸責性(Accountability)。另外,本創作所揭露的檢核及修正程式係採用SHA-3演算法提前進行安全雜湊計算,並將雜湊值置入授權裝置中。在執行檢核及修正程式之前,必需與授權裝置互相進行雜湊值驗證,在驗證程式通過後才可繼續執行。因此,可避免檢核程式及修正程式遭病毒竄改,故可達成資訊安全原則中的完整性(Integrity)。當雜湊值驗證失敗時,亦可提醒使用者伺服器可能已遭病毒感染。此外,本創作所述的檢核及修正程式係以JDK進行程式開發,故可於不同平台執行相同程式。因此,可降低檢核及修正作業操作人員的教育訓練及使用成本,並且提升檢核及修正程式的可攜性。本創作更可藉由檢核及修正程式的更新,一併更新作業系統的指令,藉此解決各作業系統間因指令不同而造成檢核或修正作業中斷的問題。In summary, the server configuration check and correction system and the method for checking and correcting the server configuration disclosed in the present invention only need to connect the authorized device to the server and then press the check or correction button on the authorized device. The server itself can check or correct its own configuration settings by batch operation, thus greatly shortening the working time and increasing the working efficiency. Secondly, the authoring device proposed by this creation uses the USB Human Interface Device protocol instead of the USB Mass Storage Device protocol adopted by the traditional USB flash drive. Therefore, the risk of poisoning the server system caused by the flash drive can be avoided, and the server verification check operation can be performed on the server that limits the use of the USB device by using the HID protocol. Furthermore, before the correction and verification program is executed, it is necessary to confirm whether the firmware code of the authorized device is legal, thereby avoiding unauthorized operations. Therefore, this creation can achieve Authenticity and Accountability in the information security principles. In addition, the verification and correction program disclosed in this work uses the SHA-3 algorithm to perform the safety hash calculation in advance and put the hash value into the authorization device. Before performing the check and correction program, it is necessary to perform the hash value verification with the authorized device, and the execution can be continued after the verification program is passed. Therefore, it is possible to avoid the tampering of the check program and the correction program, so that the integrity of the information security principle (Integrity) can be achieved. When the hash value verification fails, the user may also be reminded that the server may have been infected with a virus. In addition, the check and correction program described in this creation is developed by JDK, so the same program can be executed on different platforms. Therefore, it is possible to reduce the educational training and use costs of the check and correction operators, and to improve the portability of the check and correction program. This creation can also update the instructions of the operating system by checking and updating the program, thereby solving the problem of checking or correcting the interruption of operations due to different instructions between the operating systems.

雖然本創作以前述之實施例揭露如上,然其並非用以限定本創作。在不脫離本創作之精神和範圍內,所為之更動與潤飾,均屬本創作之專利保護範圍。關於本創作所界定之保護範圍請參考所附之申請專利範圍。Although the present invention has been disclosed above in the foregoing embodiments, it is not intended to limit the present invention. The changes and refinements that are made without departing from the spirit and scope of this creation are within the scope of patent protection of this creation. Please refer to the attached patent application scope for the scope of protection defined by this creation.

10‧‧‧伺服器組態檢核及修正系統 1‧‧‧授權裝置 11‧‧‧連接頭 12‧‧‧儲存電路 14‧‧‧控制電路 16‧‧‧第一觸發元件 18‧‧‧第二觸發元件 19‧‧‧保護蓋 3‧‧‧伺服器 32‧‧‧運算電路 34‧‧‧儲存電路 10‧‧‧Server configuration check and correction system  1‧‧‧Authorized device  11‧‧‧Connecting head  12‧‧‧Storage circuit  14‧‧‧Control circuit  16‧‧‧First trigger element  18‧‧‧second trigger element  19‧‧‧ protective cover  3‧‧‧Server  32‧‧‧Operating circuit  34‧‧‧Storage circuit  

圖1係依據本創作一實施例的伺服器組態檢核及修正系統所繪示的方塊架構圖。 圖2係依據本創作一實施例的伺服器組態檢核及修正系統所繪示的授權裝置與伺服器的連接示意圖。 圖3係依據本創作一實施例的檢核及修正伺服器組態的方法所繪示的流程圖。 1 is a block diagram of a server configuration check and correction system according to an embodiment of the present invention.  2 is a schematic diagram showing the connection between an authorization device and a server according to the server configuration check and correction system according to an embodiment of the present invention.  3 is a flow chart showing a method of checking and correcting a server configuration according to an embodiment of the present invention.  

Claims (5)

一種伺服器組態檢核及修正系統,包括:一授權裝置,包括一儲存電路及一控制電路,該儲存電路電性連接該控制電路並用以存放一硬體內碼及一第一雜湊值;該控制電路包括一第一觸發元件及一第二觸發元件,該控制電路用以於該第一觸發元件接收一觸發操作時產生一第一操作訊號,且於該第二觸發元件接收另一觸發操作時產生一第二操作訊號;以及一伺服器,電性連接該授權裝置,該伺服器用以安裝一驗證程式、一檢核程式及一修正程式,其中該驗證程式用以判斷該授權裝置、該檢核程式及該修正程式是否合法;該檢核程式用以於該驗證程式判斷為合法之後且接收到該第一操作訊號時執行以產生一檢核報告;該修正程式用以於該驗證程式判斷為合法之後且接收到該第二操作訊號時執行以修正該伺服器之至少一組態值。A server configuration check and correction system includes: an authorization device, including a storage circuit and a control circuit, the storage circuit is electrically connected to the control circuit and configured to store a hard body code and a first hash value; The control circuit includes a first trigger component and a second trigger component. The control circuit is configured to generate a first operation signal when the first trigger component receives a trigger operation, and receive another trigger operation when the second trigger component receives a trigger operation. And generating a second operation signal; and a server electrically connected to the authorization device, wherein the server is configured to install a verification program, a verification program and a correction program, wherein the verification program is used to determine the authorization device, Whether the check program and the correction program are legal; the check program is executed after the verification program determines that it is legal and receives the first operation signal to generate a check report; the correction program is used for the verification After the program determines that it is legal and receives the second operation signal, it is executed to correct at least one configuration value of the server. 如請求項1所述的伺服器組態檢核及修正系統,其中該驗證程式更用以取得該授權裝置之該硬體內碼、判斷該硬體內碼是否合法以決定該授權裝置是否合法;該驗證程式更用以取得該授權裝置之該第一雜湊值、依據該檢核程式及該修正程式執行一雜湊演算法以產生一第二雜湊值、以及比對該第一雜湊值及該第二雜湊值並選擇性地產生一合法訊號以指示該檢核程式及該修正程式是否合法;其中,該雜湊演算法係一第三代安全雜湊演算法(Secure Hash Algorithm 3,SHA-3)。The server configuration check and correction system of claim 1, wherein the verification program is further configured to obtain the hardware code of the authorized device, determine whether the hardware code is legal to determine whether the authorized device is legal; The verification program is further configured to obtain the first hash value of the authorized device, execute a hash algorithm according to the check program and the correction program to generate a second hash value, and compare the first hash value with the second The hash value selectively generates a legal signal to indicate whether the check program and the correction program are legal; wherein the hash algorithm is a third generation Secure Hash Algorithm 3 (SHA-3). 如請求項2所述的伺服器組態檢核及修正系統,其中該驗證程式更用以儲存一清單,該清單包括複數個子清單,每一該子清單包括複數個合法硬體內碼,該些子清單各自具有一合法時間區段;該驗證程序更用以依據一當前時間及該授權裝置之該硬體內碼比對該些子清單的該合法時間區段及該些子清單其中一者之該些合法硬體內碼,其中該當前時間落於該些子清單其中一者之該合法時間區段。The server configuration check and correction system of claim 2, wherein the verification program is further configured to store a list, the list includes a plurality of sub-lists, each of the sub-lists including a plurality of legal hard-body codes, Each of the sub-lists has a legal time segment; the verification program is further configured to: according to a current time and the hardware code ratio of the authorized device, the legal time segment of the sub-list and one of the sub-lists The legal hard body code, wherein the current time falls within the legal time zone of one of the sub-lists. 如請求項1所述的伺服器組態檢核及修正系統,其中該授權裝置基於人性化界面裝置(Human Interface Device)協定電性連接該伺服器。The server configuration check and correction system of claim 1, wherein the authorization device is electrically connected to the server based on a Human Interface Device protocol. 如請求項1所述的伺服器組態檢核及修正系統,其中該檢核程式及該修正程式係以Java Development Kit開發;該檢核程式更用以偵測該伺服器之一作業系統及執行對應於該作業系統之複數個檢核指令,該些檢核指令用以取得該伺服器之複數個組態設定值,依據一標準設定值列表比對該些組態設定值,及輸出一檢核報表,以及該修正程式更用以偵測該伺服器之該作業系統及執行對應於該作業系統之複數個修正指令,該些修正指令用以依據該標準設定值列表之複數個設定值分別取代該伺服器之該些組態設定值。The server configuration check and correction system of claim 1, wherein the check program and the correction program are developed by the Java Development Kit; the check program is further configured to detect an operating system of the server and Executing a plurality of check instructions corresponding to the operating system, the check commands are used to obtain a plurality of configuration settings of the server, according to a standard set value list, and a set value of the configuration, and output one Checking the report, and the correction program is further configured to detect the operating system of the server and execute a plurality of correction commands corresponding to the operating system, the correction commands being used to determine a plurality of settings according to the standard set value list Replace the configuration settings of the server separately.
TW108206445U 2019-05-22 2019-05-22 Inspection and correction system of server's configuration TWM583959U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW108206445U TWM583959U (en) 2019-05-22 2019-05-22 Inspection and correction system of server's configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW108206445U TWM583959U (en) 2019-05-22 2019-05-22 Inspection and correction system of server's configuration

Publications (1)

Publication Number Publication Date
TWM583959U true TWM583959U (en) 2019-09-21

Family

ID=68620617

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108206445U TWM583959U (en) 2019-05-22 2019-05-22 Inspection and correction system of server's configuration

Country Status (1)

Country Link
TW (1) TWM583959U (en)

Similar Documents

Publication Publication Date Title
US9660807B2 (en) System and method for verifying changes to UEFI authenticated variables
JP5265662B2 (en) Trusted component update system and trusted component update method
JP5735509B2 (en) Method and apparatus for obtaining a reliable path that can be verified by a user in the presence of malware
JP4769608B2 (en) Information processing apparatus having start verification function
US8806220B2 (en) Device side host integrity validation
CN111008379A (en) Firmware safety detection method of electronic equipment and related equipment
US8341393B2 (en) Security to extend trust
WO2018090818A1 (en) Version check method, apparatus and terminal device
US8266691B2 (en) Renewable integrity rooted system
US11163886B2 (en) Information handling system firmware bit error detection and correction
CA2598616A1 (en) Secure boot
JP2006172376A (en) Information processing system, program, information processing method
US9519786B1 (en) Firmware integrity ensurance and update
MX2007013590A (en) System and method for secure operating system boot.
CN111125675B (en) Method and system for controlling debug port and test method
US11422901B2 (en) Operating system repairs via recovery agents
JP2001524229A (en) Security-type coprocessor for improving the security performance of computer systems
CN109804378A (en) BIOS safety
US20230315432A1 (en) Method for designing a firmware, firmware obtained by such a method and method for modifying such a firmware
CN111291381A (en) Method, equipment and medium for building trust chain based on TCM
CN106919845B (en) System security trust chain construction device and method
CN106951785B (en) JAVA virtual machine and trust chain extension method thereof
TWI746361B (en) Inspection and correction system of server's configuration based on hash algorithm and method thereof
TWI752813B (en) Inspection and correction system of server's configuration based on touch operation and method thereof
TWI715047B (en) Inspection and correction system of server's configuration and method of inspecting and correcting server's configuration