WO2016062146A1 - 序列号信息的更新方法、装置及终端 - Google Patents

序列号信息的更新方法、装置及终端 Download PDF

Info

Publication number
WO2016062146A1
WO2016062146A1 PCT/CN2015/085629 CN2015085629W WO2016062146A1 WO 2016062146 A1 WO2016062146 A1 WO 2016062146A1 CN 2015085629 W CN2015085629 W CN 2015085629W WO 2016062146 A1 WO2016062146 A1 WO 2016062146A1
Authority
WO
WIPO (PCT)
Prior art keywords
number information
serial number
information
smbios
stored
Prior art date
Application number
PCT/CN2015/085629
Other languages
English (en)
French (fr)
Inventor
常锐
熊玉娜
李存龙
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016062146A1 publication Critical patent/WO2016062146A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Definitions

  • the present invention relates to the field of communications, and in particular to a method, an apparatus, and a terminal for updating sequence number information.
  • SMBIOS System Management Basic Input & Output System
  • DMI Desktop Management Interface
  • DMTF industry guidance organization Desktop Management Task Force
  • MIF Management Information Format
  • FIG. 1 is an SMBIOS serial number information displayed in a Linux system using the DmiEdit tool in the related art.
  • 2 is a BIOS startup process of a server basic input/output system in the related art.
  • FIG. 3 is a flow chart showing the modification of the SMBIOS serial number in the related art.
  • the SMBIOS information has no protection in the memory, and can be updated synchronously into the non-volatile variable area, restarted without loss, and it is easy for the illegal user to use the third-party tool or self-made code to perform any Modified, not safe enough.
  • the serial number information in these SMBIOS messages may be bound to the OS, application software, and secret data. How to securely fix the serial number is an urgent problem to be solved.
  • serial number information of the terminal existing in the related art is easily modified, resulting in a problem that the security of the terminal is low, and an effective solution has not been proposed yet.
  • the embodiment of the invention provides a method, a device and a terminal for updating the serial number information, so as to solve at least the problem that the serial number information of the terminal existing in the related art is easily modified, resulting in low security of the terminal.
  • a method for updating sequence number information including: reading sequence number information of a system management basic input/output system SMBIOS information stored in a current nonvolatile variable area NV Variable; Whether the serial number information of the read SMBIOS information is the same as the pre-stored initial serial number information; when the determination result is no, the serial number information of the SMBIOS information stored in the NV Variable is updated to the initial Serial number information.
  • the method further includes: performing, by using the initial sequence number information, the SMBIOS information stored in the memory. Update.
  • the method further comprises: replacing the extended product serial number field in the IPMI command through the intelligent platform management interface from the field.
  • the initial sequence number information stored in advance is read in the unit FRU.
  • the method further includes: updating the sequence of the updated SMBIOS information stored in the NV Variable The number information is passed to the operating system OS that is subsequently started.
  • the method further includes: performing legality verification on the pre-stored initial sequence number information; When the verification is passed, a process of determining whether the read serial number information of the SMBIOS information and the pre-stored initial serial number information are the same is performed.
  • an apparatus for updating serial number information comprising: a first reading module configured to read a system management basic input and output stored in a current nonvolatile variable area NV Variable The serial number information of the system SMBIOS information; the determining module is configured to determine whether the serial number information of the read SMBIOS information is the same as the pre-stored initial serial number information; the first update module is set to be judged by the determining module If the result is no, the serial number information of the SMBIOS information stored in the NV Variable is updated to the initial sequence number information.
  • the updating device of the serial number information further comprises: a second updating module, configured to update the SMBIOS information stored in the memory by using the initial serial number information.
  • the updating device of the serial number information further comprises: a second reading module configured to read the pre-stored from the field replaceable unit FRU through the extended product serial number field in the intelligent platform management interface IPMI command The initial serial number information is described.
  • the updating device of the serial number information further comprises: a transmitting module, configured to: transmit the serial number information of the updated SMBIOS information stored in the NV Variable to the subsequently started operating system OS.
  • a transmitting module configured to: transmit the serial number information of the updated SMBIOS information stored in the NV Variable to the subsequently started operating system OS.
  • the updating device of the serial number information further comprises: a checking module, configured to perform legality verification on the pre-stored initial serial number information; and a processing module configured to perform, in the case that the verification passes And determining whether the read serial number information of the SMBIOS information is the same as the pre-stored initial serial number information.
  • a terminal comprising the apparatus of any of the above.
  • the serial number information of the system management basic input/output system SMBIOS information stored in the current non-volatile variable area NV Variable is read; the serial number information of the read SMBIOS information is determined and pre-stored. Whether the initial sequence number information is the same; when the determination result is no, the serial number information of the SMBIOS information stored in the NV Variable is updated to the initial serial number information, and the serial number of the terminal existing in the related art is solved.
  • the information is easily modified, resulting in a problem of low security of the terminal, thereby achieving the effect of ensuring that the serial number information of the terminal is the initial serial number information and improving the security of the terminal.
  • FIG. 5 is a structural block diagram of an apparatus for updating serial number information according to an embodiment of the present invention.
  • FIG. 6 is a block diagram 1 of a preferred structure of an apparatus for updating sequence number information according to an embodiment of the present invention
  • FIG. 7 is a block diagram 2 of a preferred structure of an apparatus for updating sequence number information according to an embodiment of the present invention.
  • FIG. 8 is a block diagram 3 of a preferred structure of an apparatus for updating sequence number information according to an embodiment of the present invention.
  • FIG. 9 is a block diagram 4 of a preferred structure of an apparatus for updating sequence number information according to an embodiment of the present invention.
  • FIG. 10 is a structural block diagram of a terminal according to an embodiment of the present invention.
  • FIG. 11 is a flowchart of a sequence number modification in SMBIOS information according to an embodiment of the present invention.
  • FIG. 12 is a format diagram of an SMBIOS serial number IPMI command request according to an embodiment of the present invention.
  • FIG. 13 is a corresponding format diagram of an SMBIOS serial number IPMI command according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a method for updating serial number information according to an embodiment of the present invention. As shown in FIG. 4, the flow includes the following steps:
  • Step S402 reading sequence number information of the system management basic input/output system SMBIOS information stored in the current non-volatile variable area NV Variable;
  • Step S404 determining whether the sequence number information of the read SMBIOS information is the same as the pre-stored initial sequence number information
  • Step S406 when the determination result is no, the serial number information of the SMBIOS information stored in the NV Variable is updated to the initial serial number information.
  • the serial number information of the system management basic input/output system SMBIOS information stored in the current non-volatile variable area NV Variable is read; the serial number information of the read SMBIOS information and the pre-stored initial serial number information are determined. Whether the same is the same; when the judgment result is no, the serial number information of the SMBIOS information stored in the NV Variable is updated to the initial serial number information, and the serial number information of the SMBIOS information stored in the NV Variable is guaranteed to be the initial serial number information, wherein
  • the initial sequence number information may be a serial number configured when the terminal is shipped from the factory, or may be a sequence number that the terminal user legally modifies the serial number and desires to use. Therefore, the problem that the serial number information of the terminal existing in the related art is easily modified and the security of the terminal is low is solved, thereby achieving the effect that the serial number information of the terminal is the initial serial number information and the security of the terminal is improved.
  • the method further includes: updating the SMBIOS information stored in the memory by using the initial sequence number information. Therefore, after the OS is started, the serial number information of the SMBIOS information under the OS is the initial serial number information.
  • the method before determining whether the sequence number information of the read SMBIOS information is the same as the pre-stored initial sequence number information, the method further includes: extending the product serial number field in the IPMI command through the intelligent platform management interface.
  • the pre-stored initial serial number information is read from the field replaceable unit FRU. among them,
  • the IPMI command is an extended IPMI command. A new product serial number field is added to the IPMI command.
  • the extended IPMI command can be used to easily read the pre-stored initial sequence number information from the FRU.
  • the method further includes: transmitting the sequence number information of the updated SMBIOS information stored in the NV Variable to the subsequent The operating system OS that is started. Therefore, the serial number information of the SMBIOS information under the OS is the initial sequence number information.
  • the method before determining whether the sequence number information of the read SMBIOS information is the same as the pre-stored initial sequence number information, the method further includes: performing legality verification on the pre-stored initial sequence number information; In the case of passing the test, it is determined whether or not the serial number information of the read SMBIOS information is the same as the initial serial number information stored in advance. That is, the update process is performed only when the initial sequence number information is legal, thereby ensuring the accuracy of the sequence number update.
  • An apparatus for updating serial number information is also provided in the embodiment, and the apparatus is used to implement the above-mentioned embodiments and preferred embodiments, and the description thereof has been omitted.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 5 is a structural block diagram of an apparatus for updating sequence number information according to an embodiment of the present invention. As shown in FIG. 5, the apparatus includes a first reading module 52, a determining module 54 and a first updating module 56, and the device is as follows. Be explained.
  • the first reading module 52 is configured to read serial number information of the system management basic input/output system SMBIOS information stored in the current non-volatile variable area NV Variable; the determining module 54 is connected to the first reading module 52, It is configured to determine whether the serial number information of the read SMBIOS information is the same as the pre-stored initial serial number information; the first update module 56 is connected to the determining module 54 and is configured to set the NV when the determining result of the determining module is negative.
  • the serial number information of the SMBIOS information stored in the Variable is updated to the initial serial number information.
  • FIG. 6 is a block diagram of a preferred structure of an apparatus for updating serial number information according to an embodiment of the present invention. As shown in FIG. 6, the apparatus includes a second update module 62, in addition to all the modules shown in FIG. The device will be described.
  • the second update module 62 is connected to the first update module 56, and is configured to update the SMBIOS information stored in the memory by using the initial sequence number information.
  • FIG. 7 is a block diagram of a preferred structure of an apparatus for updating serial number information according to an embodiment of the present invention. As shown in FIG. 7, the apparatus includes a second reading module 72, in addition to all the modules shown in FIG. The device will be described.
  • the second reading module 72 is connected to the first reading module 52 and the determining module 54 to be set to pass the smart
  • the extended product serial number field in the platform management interface IPMI command reads the pre-stored initial sequence number information from the field replaceable unit FRU.
  • FIG. 8 is a block diagram 3 of a preferred structure of an apparatus for updating serial number information according to an embodiment of the present invention. As shown in FIG. 8, the apparatus includes a transmitting module 82 in addition to all the modules shown in FIG. The device is described.
  • the delivery module 82 is coupled to the first update module 56 and configured to pass the serial number information of the updated SMBIOS information stored in the NV Variable to the subsequently started operating system OS.
  • FIG. 9 is a block diagram showing a preferred structure of an apparatus for updating serial number information according to an embodiment of the present invention. As shown in FIG. 9, the apparatus includes a verification module 92 and a processing module 94 in addition to all the modules shown in FIG. The device will be described below.
  • the verification module 92 is connected to the first reading module 52, and is configured to perform legality verification on the pre-stored initial sequence number information; the processing module 94 is connected to the verification module 92 and the determination module 54 to be set at When the verification is passed, a process of determining whether the serial number information of the read SMBIOS information is the same as the initial serial number information stored in advance is performed.
  • FIG. 10 is a structural block diagram of a terminal according to an embodiment of the present invention. As shown in FIG. 10, the terminal 100 includes the updating device 102 of the serial number information of any of the above.
  • the method and device for securely curing the serial number are also provided in the embodiment of the present invention.
  • a basic input/output system (BIOS) is used in a power on self test (POST) power-on stage, and a base management controller is used.
  • BMC Base management controller
  • IPMI Intelligent Platform Management Interface
  • FRU Field Replacement Unit
  • BIOS Basic Input & Output System
  • BIOS The BIOS is the most basic and important program in a computer. It provides the lowest level, most direct hardware control for the computer. It is a "converter" between hardware and software programs.
  • BIOS startup process is mainly divided into the following main stages.
  • Pre_EFI This phase mainly initializes the central processing unit (CPU), some critical controllers and chipsets on the board. Another main task is to quickly provide the stack required for code execution and establish C code. Execution environment.
  • DXE Driver Execution Environment
  • This stage mainly uses the C language execution environment provided by the PEI stage, and calls various hardware drivers to complete various hardware of the board (graphics card, network card, universal serial bus (Universal Serial Bus, Initialization of USB), logical hard disk Raid card, etc.
  • BDS Bit Device Select: According to the device after the DXE phase is initialized, select different devices to boot the operating system or execute the Extensible Firmware Interface (EFI) application.
  • EFI Extensible Firmware Interface
  • RT (Run Time): This phase is the phase in which the operating system is running.
  • the implementation of the SMBIOS serial number (Serial Num) commonly used in the related art mainly includes the following steps:
  • step S302 the board writes a default value to the corresponding field of the SMBIOS memory area system serial number system serial number through the third-party software tool such as DmiEdit at the factory, and stores the BIOS in the non-volatile variable area BIOS NV Variable. Restart (the above Host is powered on);
  • Step S304 the BIOS DXE stage reads the SMBIOS information from the NV Variable area, and after obtaining the serial number information, the update enters the memory area.
  • Step S306 entering the OS, the information of the SMBIOS memory area under the OS is the information that was last updated by the third party software under the OS.
  • FIG. 11 is a flowchart of a sequence number modification in SMBIOS information according to an embodiment of the present invention. As shown in FIG. 11, the process includes the following steps:
  • Step S1102 The Host is powered on.
  • Step S1104 the BIOS DXE stage reads the NV Variable area to obtain the SMBIOS information, and synchronously updates the SMBIOS information into the memory area;
  • step S1106 the BIOS enters the BDS stage, and before the OS is started, the serial number is read from the FRU of the BMC through a customized IPMI command and placed in the pre-applied cache. At this time, the BIOS code is added and the SMBIOS information is read from the memory, and the serial number previously placed in the cache is filled in the corresponding field of the SMBIOS serial number, and is updated twice into the memory SMBIOS area;
  • step S1108 the user enters the OS, and the user can modify the serial number information of the memory SMBIOS through the tool to be valid only once.
  • the BIOS stage will still perform the coverage correction by using the serial number information stored in the FRU.
  • This process can ensure that the SMBIOS serial number information is the original information of our factory, preventing malicious modification of illegal users.
  • the embodiment of the present invention is innovatively designed in two aspects, one is to modify the BIOS process code, and to add a secondary overwrite operation to the SMBIOS serial number of the SMBIOS memory area in the BDS stage.
  • the second is to customize the IPMI command for the BIOS to communicate with the BMC to obtain serial number information.
  • the BIOS sends a custom IPMI command to the BMC through the KCS channel to obtain the serial number from the FRU.
  • FIG. 12 is a format diagram of an SMBIOS serial number IPMI command request according to an embodiment of the present invention.
  • FIG. 13 is a corresponding format diagram of an SMBIOS serial number IPMI command according to an embodiment of the present invention. It can be seen from FIG. 12 and FIG. 13 that a product serial number field is extended in the IPMI command in the embodiment of the present invention, and the initial serial number in the FRU can be read more conveniently according to the extended IPMI command. information.
  • the server has a BMC out-of-band management function and a FRU design.
  • the serial number (Serial Num) is accessed in the FRU, and the serial number (Serial Num) of the SMBIOS is obtained from the device.
  • the FRU may be sintered using a manufacturer's sintering tool.
  • the serial number (Serial Num) can be obtained through interaction with the BMC, and the SMIBOS related field is updated.
  • the general server HOST user cannot imitate the FRU and play a natural isolation role. Ordinary users cannot maliciously destroy or crack. Thereby ensuring the security of the initial serial number information in the FRU.
  • modules or steps of the embodiments of the present invention can be implemented by a general computing device, which can be concentrated on a single computing device or distributed in multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from The steps shown or described are performed sequentially, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
  • the above embodiment and the preferred embodiment solve the problem that the serial number information of the terminal existing in the related art is easily modified, resulting in low security of the terminal, and thus the serial number information of the terminal is guaranteed to be initial. Serial number information to improve the security of the terminal.

Abstract

本发明提供了一种序列号信息的更新方法、装置及终端,其中,该方法包括读取当前非易失性变量区NV Variable中存储的系统管理基本输入输出系统SMBIOS信息的序列号信息;判断读取的SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同;在判断结果为否时,将NV Variable中存储的SMBIOS信息的序列号信息更新为初始序列号信息。通过本发明,解决了相关技术中存在的终端的序列号信息易被修改,造成终端的安全性较低的问题,进而达到了保证终端的序列号信息为初始序列号信息,提高终端的安全性的效果。

Description

序列号信息的更新方法、装置及终端 技术领域
本发明涉及通信领域,具体而言,涉及一种序列号信息的更新方法、装置及终端。
背景技术
系统管理基本输入输出系统(System Management Basic Input&Output System,简称为SMBIOS)是主板或系统制造者以标准格式显示产品管理信息所需遵循的统一规范。桌面管理接口(Desktop Management Interface,简称为DMI)帮助收集电脑系统信息的管理系统,DMI信息的收集必须在严格遵照SMBIOS规范的前提下进行。SMBIOS和DMI是由行业指导机构台式系统管理任务组(Desktop Management Task Force,简称为DMTF)起草的开放性的技术标准,其中DMI设计适设置为任何的平台和操作系统。DMI充当了管理工具和系统层之间接口的角色。它建立标准的可管理系统更加方便了电脑厂商和用户对系统的了解。DMI的主要组成部分是管理信息格式(Management Information Format,简称为MIF)数据库。这个数据库包括了所有有关电脑系统和配件的信息。通过DMI,用户可以获取序列号、电脑厂商、串口信息以及其它系统配件信息。
其中关于产品序列号的填充实现没有给出具体方法,现在比较普通的做法是出厂的时候由厂商设置初始值,在实际的使用过程中用户可以通过类似DmiEdit等第三方软件工具进行修改,或者自己编写读写SMBIOS内存区域的代码进行修改,存在比较大的安全隐患。SMBIOS中的序列号字段也无法做到唯一性ID标识作用,对于对安全性要求比较高的X86服务器来说,这一点用户可能难以接受。图1是相关技术中的利用DmiEdit工具在Linux系统下显示的SMBIOS序列号信息。图2是相关技术中服务器基本输入/输出系统BIOS启动流程。图3是相关技术中SMBIOS序列号的修改流程图。如图1、2、3可知,SMBIOS信息在内存中没有任何保护,并可同步更新进入非易失的变量区,重启而不丢失,很容易使得非法用户通过第三方工具或者自编代码进行任意修改,不够安全。引申出来,这些SMBIOS信息中的序列号信息可能会与OS、应用软件、加秘数据等绑定,如何安全固化序列号是亟待解决的问题。
针对相关技术中存在的终端的序列号信息易被修改,造成终端的安全性较低的问题,目前尚未提出有效的解决方案。
发明内容
本发明实施例提供了一种序列号信息的更新方法、装置及终端,以至少解决相关技术中存在的终端的序列号信息易被修改,造成终端的安全性较低的问题。
根据本发明实施例的一个方面,提供了一种序列号信息的更新方法,包括:读取当前非易失性变量区NV Variable中存储的系统管理基本输入输出系统SMBIOS信息的序列号信息;判断读取的所述SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同;在判断结果为否时,将所述NV Variable中存储的所述SMBIOS信息的序列号信息更新为所述初始序列号信息。
优选地,在将所述NV Variable中存储的所述SMBIOS信息的序列号信息更新为所述初始序列号信息之后,还包括:采用所述初始序列号信息对内存中存储的所述SMBIOS信息进行更新。
优选地,在判断读取的所述SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同之前,还包括:通过智能型平台管理接口IPMI命令中扩展的产品序列号字段从现场可更换单元FRU中读取预先存储的所述初始序列号信息。
优选地,在将所述NV Variable中存储的所述SMBIOS信息的序列号信息更新为所述初始序列号信息之后,还包括:将所述NV Variable中存储的更新后的所述SMBIOS信息的序列号信息传递给后续启动的操作系统OS。
优选地,在判断读取的所述SMBIOS信息的序列号信息与所述预先存储的初始序列号信息是否相同之前,还包括:对所述预先存储的初始序列号信息进行合法性校验;在校验通过的情况下,进行判断读取的所述SMBIOS信息的序列号信息与所述预先存储的初始序列号信息是否相同的处理。
根据本发明实施例的另一方面,提供了一种序列号信息的更新装置,包括:第一读取模块,设置为读取当前非易失性变量区NV Variable中存储的系统管理基本输入输出系统SMBIOS信息的序列号信息;判断模块,设置为判断读取的所述SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同;第一更新模块,设置为在所述判断模块的判断结果为否时,将所述NV Variable中存储的所述SMBIOS信息的序列号信息更新为所述初始序列号信息。
优选地,所述序列号信息的更新装置还包括:第二更新模块,设置为采用所述初始序列号信息对内存中存储的所述SMBIOS信息进行更新。
优选地,所述序列号信息的更新装置还包括:第二读取模块,设置为通过智能型平台管理接口IPMI命令中扩展的产品序列号字段从现场可更换单元FRU中读取预先存储的所述初始序列号信息。
优选地,所述序列号信息的更新装置还包括:传递模块,设置为将所述NV Variable中存储的更新后的所述SMBIOS信息的序列号信息传递给后续启动的操作系统OS。
优选地,所述序列号信息的更新装置还包括:校验模块,设置为对所述预先存储的初始序列号信息进行合法性校验;处理模块,设置为在校验通过的情况下,进行判断读取的所述SMBIOS信息的序列号信息与所述预先存储的初始序列号信息是否相同的处理。
根据本发明实施例的再一方面,提供了一种终端,包括上述任一项所述的装置。
通过本发明实施例,采用读取当前非易失性变量区NV Variable中存储的系统管理基本输入输出系统SMBIOS信息的序列号信息;判断读取的所述SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同;在判断结果为否时,将所述NV Variable中存储的所述SMBIOS信息的序列号信息更新为所述初始序列号信息,解决了相关技术中存在的终端的序列号信息易被修改,造成终端的安全性较低的问题,进而达到了保证终端的序列号信息为初始序列号信息,提高终端的安全性的效果。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是相关技术中的利用DmiEdit工具在Linux系统下显示的SMBIOS序列号信息;
图2是相关技术中服务器基本输入/输出系统BIOS启动流程;
图3是相关技术中SMBIOS序列号的修改流程图;
图4是根据本发明实施例的序列号信息的更新方法的流程图;
图5是根据本发明实施例的序列号信息的更新装置的结构框图;
图6是根据本发明实施例的序列号信息的更新装置的优选结构框图一;
图7是根据本发明实施例的序列号信息的更新装置的优选结构框图二;
图8是根据本发明实施例的序列号信息的更新装置的优选结构框图三;
图9是根据本发明实施例的序列号信息的更新装置的优选结构框图四;
图10是根据本发明实施例的终端的结构框图;
图11是根据本发明实施例的SMBIOS信息中序列号修改流程;
图12是根据本发明实施例的SMBIOS序列号IPMI命令请求格式图;
图13是根据本发明实施例的SMBIOS序列号IPMI命令相应格式图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
在本实施例中提供了一种序列号信息的更新方法,图4是根据本发明实施例的序列号信息的更新方法的流程图,如图4所示,该流程包括如下步骤:
步骤S402,读取当前非易失性变量区NV Variable中存储的系统管理基本输入输出系统SMBIOS信息的序列号信息;
步骤S404,判断读取的SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同;
步骤S406,在判断结果为否时,将NV Variable中存储的SMBIOS信息的序列号信息更新为初始序列号信息。
通过上述步骤,采用读取当前非易失性变量区NV Variable中存储的系统管理基本输入输出系统SMBIOS信息的序列号信息;判断读取的SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同;在判断结果为否时,将NV Variable中存储的SMBIOS信息的序列号信息更新为初始序列号信息,实现了保证NV Variable中存储的SMBIOS信息的序列号信息为初始序列号信息,其中,该初始序列号信息可以为终端出厂时配置的序列号,也可以是该终端使用者对序列号进行合法修改的并且期望使用的序列号。从而解决了相关技术中存在的终端的序列号信息易被修改,造成终端的安全性较低的问题,进而达到了保证终端的序列号信息为初始序列号信息,提高终端的安全性的效果。
在一个优选的实施例中,在将NV Variable中存储的SMBIOS信息的序列号信息更新为初始序列号信息之后,还包括:采用初始序列号信息对内存中存储的SMBIOS信息进行更新。从而保证在启动OS后,OS下的SMBIOS信息的序列号信息为初始序列号信息。
在一个可选的实施例中,在判断读取的SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同之前,还包括:通过智能型平台管理接口IPMI命令中扩展的产品序列号字段从现场可更换单元FRU中读取预先存储的初始序列号信息。其中, 该IPMI命令为进行过扩展后的IPMI命令,在IPMI命令中新增加了一个产品序列号字段,利用扩展后的IPMI命令可以方便地从FRU中读取预先存储的初始序列号信息。
在一个优选地实施例中,在将NV Variable中存储的SMBIOS信息的序列号信息更新为初始序列号信息之后,还包括:将NV Variable中存储的更新后的SMBIOS信息的序列号信息传递给后续启动的操作系统OS。从而保证OS下的SMBIOS信息的序列号信息为初始序列号信息。
在一个优选地实施例中,在判断读取的SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同之前,还包括:对预先存储的初始序列号信息进行合法性校验;在校验通过的情况下,进行判断读取的SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同的处理。即,只有当初始序列号信息合法的情况下,才进行更新处理,从而保证了序列号更新的准确性。
在本实施例中还提供了一种序列号信息的更新装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图5是根据本发明实施例的序列号信息的更新装置的结构框图,如图5所示,该装置包括第一读取模块52,判断模块54和第一更新模块56,下面对该装置进行说明。
第一读取模块52,设置为读取当前非易失性变量区NV Variable中存储的系统管理基本输入输出系统SMBIOS信息的序列号信息;判断模块54,连接至上述第一读取模块52,设置为判断读取的SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同;第一更新模块56,连接至上述判断模块54,设置为在判断模块的判断结果为否时,将NV Variable中存储的SMBIOS信息的序列号信息更新为初始序列号信息。
图6是根据本发明实施例的序列号信息的更新装置的优选结构框图一,如图6所示,该装置除包括图5所示的所有模块外,还包括第二更新模块62,下面对该装置进行说明。
第二更新模块62,连接至上述第一更新模块56,设置为采用初始序列号信息对内存中存储的SMBIOS信息进行更新。
图7是根据本发明实施例的序列号信息的更新装置的优选结构框图二,如图7所示,该装置除包括图5所示的所有模块外,还包括第二读取模块72,下面对该装置进行说明。
第二读取模块72,连接至上述第一读取模块52和判断模块54,设置为通过智能 型平台管理接口IPMI命令中扩展的产品序列号字段从现场可更换单元FRU中读取预先存储的初始序列号信息。
图8是根据本发明实施例的序列号信息的更新装置的优选结构框图三,如图8所示,该装置除包括图5所示的所有模块外,还包括传递模块82,下面对该装置进行说明。
传递模块82,连接至上述第一更新模块56,设置为将NV Variable中存储的更新后的SMBIOS信息的序列号信息传递给后续启动的操作系统OS。
图9是根据本发明实施例的序列号信息的更新装置的优选结构框图四,如图9所示,该装置除包括图5所示的所有模块外,还包括校验模块92和处理模块94,下面对该装置进行说明。
校验模块92,连接至上述第一读取模块52,设置为对预先存储的初始序列号信息进行合法性校验;处理模块94,连接至上述校验模块92和判断模块54,设置为在校验通过的情况下,进行判断读取的SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同的处理。
图10是根据本发明实施例的终端的结构框图,如图10所示,该终端100包括上述任一项的序列号信息的更新装置102。
为了解决相关技术中存在的终端的序列号信息易被修改,造成终端的安全性较低的问题,本发明实施例中还提供了一种安全固化序列号的方法和装置。
在该实施例中采用以下技术方案,利用服务器基本输入/输出系统(Basic Input&Output System,简称为BIOS)在开机自检(power on self test,简称为POST)上电阶段,通过与基板管理控制器(basic management controller,简称为BMC)交换智能型平台管理接口(Intelligent Platform Management Interface,简称为IPMI)命令方式,获取现场可更换单元中(Field Replace Unit,简称为FRU)序列号Serial Num信息,校验后同步到SMBIOS中。这样每次开机操作系统OS启动时序列号信息都是安全正确的,以使其他非法用户或第三方软件无法恶意篡改。
下面结合相关技术对本发明实施例进行说明。
服务器基本输入/输出系统(Basic Input&Output System,简称为BIOS)启动过程介绍:
BIOS是电脑中最基础的而又最重要的程序。它为计算机提供最低级的、最直接的硬件控制。是硬件与软件程序之间的一个“转换器”。
它主要完成以下任务。
POST开机自检。
初始化硬件,设置其基本状态,使得整个计算机达到可用状态。
加载Boot Loader以引导操作系统。
向操作系统及其它软件提供基本的系统级服务例程。
修复硬件缺陷。
最新BIOS基于UEFI2.0规范,如图2所示,BIOS启动流程主要分为以下几个主要阶段。
Pre_EFI:该阶段主要对中央处理器(Central Processing Unit,简称为CPU)、单板上一些紧要的控制器及芯片组的初始化,另外一个主要任务是快速提供代码执行所需要的堆栈,建立C代码执行环境。
DXE(Driver Execution Environment,驱动执行环境):该阶段主要是使用PEI阶段提供的C语言执行环境,调用各种硬件驱动完成单板各种硬件(显卡、网卡、通用串行总线(Universal Serial Bus,简称为USB)、逻辑硬盘Raid卡等等)的初始化。
BDS(Boot Device Select,导入设备选择):根据DXE阶段初始化后的设备,选择不同的设备进行操作系统引导或者执行可扩展固件接口(Extensible Firmware Interface,简称为EFI)应用程序。
RT(Run Time,运行时间):该阶段就是操作系统运行的阶段。
如图3所示,相关技术中通用的SMBIOS序列号(Serial Num)实现方式主要包括如下步骤:
步骤S302,单板在出厂时在OS下通过DmiEdit等第三方软件工具向SMBIOS内存区系统序列号system serial number对应字段写入默认值,并存入非易失性变量区BIOS NV Variable,主机Host重新启动(以上Host上电开始);
步骤S304,BIOS DXE阶段从NV Variable区读取SMBIOS信息,获取到序列号信息后,更新进入内存区域。
步骤S306,进入OS,OS下SMBIOS内存区域的信息即为上次在OS下通过第三方软件更新的信息。
由上述过程可以看到信息在内存中没有任何保护,并可同步更新进入非易失的变量区,重启而不丢失,很容易使得非法用户通过第三方工具或者自编代码进行任意修 改,不够安全。
为解决相关技术中存在的上述问题,本发明实施例中提出了一种SMBIOS信息中序列号修改流程。图11是根据本发明实施例的SMBIOS信息中序列号修改流程。如图11所示,该流程包括如下步骤:
步骤S1102,Host上电;
步骤S1104,BIOS DXE阶段读取NV Variable区获取SMBIOS信息,并同步更新进内存区的SMBIOS信息;
步骤S1106,BIOS进入BDS阶段,在启动OS之前,通过自定义的IPMI命令从BMC的FRU中读取序列号放入预先申请好的缓存中。这时新增BIOS代码再从内存中读取SMBIOS信息,将之前放入缓存中的序列号填入SMBIOS序列号对应字段,并二次更新进入内存SMBIOS区;
步骤S1108,进入OS,用户通过工具修改内存SMBIOS的序列号信息只能当次有效。单板再复位过程,BIOS阶段还是会以FRU中存入的序列号信息进行覆盖修正。
如此过程可以保证SMBIOS的序列号信息为我司出厂时的原有信息,预防了非法用户的恶意修改。
从上述流程可知,相对于相关技术,本发明实施例在两个方面进行了创新设计,一是修改BIOS流程代码,在BDS阶段增加对SMBIOS内存区SMBIOS序列号的二次覆写操作。二是自定义IPMI命令以用于BIOS与BMC通讯获取序列号信息。BIOS通过KCS通道向BMC发送自定义的IPMI命令从FRU中获取序列号。
下面对IPMI命令进行说明:
图12是根据本发明实施例的SMBIOS序列号IPMI命令请求格式图。图13是根据本发明实施例的SMBIOS序列号IPMI命令相应格式图。由图12、13可知,相对于相关技术中的IPMI命令,本发明实施例的IPMI命令中扩展了一个产品序列号字段,依据扩展后的IPMI命令可以更方便的读取FRU中的初始序列号信息。
在本发明实施例中,服务器有BMC带外管理功能,FRU设计。序列号(Serial Num)存取在FRU中,SMBIOS的序列号(Serial Num)从该装置中获取。
在本发明实施例中,可以使用厂商的烧结工具对FRU进行烧结。
在本发明实施例中,在BIOS POST阶段,可以通过与BMC的交互获取序列号(Serial Num),并进行SMIBOS相关字段的更新。
并且,基于BMC的带外设计思想,一般的服务器HOST端用户无法仿问到FRU,起到天然的隔离作用。普通用户无法恶意破坏或破解。从而保证了FRU中的初始序列号信息的安全性。
显然,本领域的技术人员应该明白,上述的本发明实施例的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
如上所述,通过上述实施例及优选实施方式,解决了相关技术中存在的终端的序列号信息易被修改,造成终端的安全性较低的问题,进而达到了保证终端的序列号信息为初始序列号信息,提高终端的安全性的效果。

Claims (11)

  1. 一种序列号信息的更新方法,包括:
    读取当前非易失性变量区NV Variable中存储的系统管理基本输入输出系统SMBIOS信息的序列号信息;
    判断读取的所述SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同;
    在判断结果为否时,将所述NV Variable中存储的所述SMBIOS信息的序列号信息更新为所述初始序列号信息。
  2. 根据权利要求1所述的方法,其中,在将所述NV Variable中存储的所述SMBIOS信息的序列号信息更新为所述初始序列号信息之后,还包括:
    采用所述初始序列号信息对内存中存储的所述SMBIOS信息进行更新。
  3. 根据权利要求1所述的方法,其中,在判断读取的所述SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同之前,还包括:
    通过智能型平台管理接口IPMI命令中扩展的产品序列号字段从现场可更换单元FRU中读取预先存储的所述初始序列号信息。
  4. 根据权利要求1所述的方法,其中,在将所述NV Variable中存储的所述SMBIOS信息的序列号信息更新为所述初始序列号信息之后,还包括:
    将所述NV Variable中存储的更新后的所述SMBIOS信息的序列号信息传递给后续启动的操作系统OS。
  5. 根据权利要求1所述的方法,其中,在判断读取的所述SMBIOS信息的序列号信息与所述预先存储的初始序列号信息是否相同之前,还包括:
    对所述预先存储的初始序列号信息进行合法性校验;
    在校验通过的情况下,进行判断读取的所述SMBIOS信息的序列号信息与所述预先存储的初始序列号信息是否相同的处理。
  6. 一种序列号信息的更新装置,包括:
    第一读取模块,设置为读取当前非易失性变量区NV Variable中存储的系统管理基本输入输出系统SMBIOS信息的序列号信息;
    判断模块,设置为判断读取的所述SMBIOS信息的序列号信息与预先存储的初始序列号信息是否相同;
    第一更新模块,设置为在所述判断模块的判断结果为否时,将所述NV Variable中存储的所述SMBIOS信息的序列号信息更新为所述初始序列号信息。
  7. 根据权利要求6所述的装置,其中,还包括:
    第二更新模块,设置为采用所述初始序列号信息对内存中存储的所述SMBIOS信息进行更新。
  8. 根据权利要求6所述的装置,其中,还包括:
    第二读取模块,设置为通过智能型平台管理接口IPMI命令中扩展的产品序列号字段从现场可更换单元FRU中读取预先存储的所述初始序列号信息。
  9. 根据权利要求6所述的装置,其中,还包括:
    传递模块,设置为将所述NV Variable中存储的更新后的所述SMBIOS信息的序列号信息传递给后续启动的操作系统OS。
  10. 根据权利要求6所述的装置,其中,还包括:
    校验模块,设置为对所述预先存储的初始序列号信息进行合法性校验;
    处理模块,设置为在校验通过的情况下,进行判断读取的所述SMBIOS信息的序列号信息与所述预先存储的初始序列号信息是否相同的处理。
  11. 一种终端,包括权利要求6至10中任一项所述的装置。
PCT/CN2015/085629 2014-10-20 2015-07-30 序列号信息的更新方法、装置及终端 WO2016062146A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410559788.X 2014-10-20
CN201410559788.XA CN105589699A (zh) 2014-10-20 2014-10-20 序列号信息的更新方法、装置及终端

Publications (1)

Publication Number Publication Date
WO2016062146A1 true WO2016062146A1 (zh) 2016-04-28

Family

ID=55760256

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/085629 WO2016062146A1 (zh) 2014-10-20 2015-07-30 序列号信息的更新方法、装置及终端

Country Status (2)

Country Link
CN (1) CN105589699A (zh)
WO (1) WO2016062146A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143256A (zh) * 2019-11-29 2020-05-12 苏州浪潮智能科技有限公司 一种读取现场可更换单元信息的方法和装置
CN113641409A (zh) * 2020-04-27 2021-11-12 佛山市顺德区顺达电脑厂有限公司 串口序列号可固定的usb集线器
CN113821255A (zh) * 2021-08-19 2021-12-21 惠州Tcl移动通信有限公司 一种基于高通平台的nv参数设置方法、终端及存储介质

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480510A (zh) * 2016-11-02 2017-12-15 深圳市波普安创技术有限公司 信息安全设备的序列号变更系统及其方法
CN107943699A (zh) * 2017-11-24 2018-04-20 郑州云海信息技术有限公司 一种测试服务器fru和dmi信息同步功能的方法及系统
CN108664260B (zh) * 2018-04-09 2021-08-17 南京百敖软件有限公司 一种工厂模式下bios开机自动从网络更新本机序列号的方法
CN111258664B (zh) * 2020-01-19 2023-01-10 苏州浪潮智能科技有限公司 一种内存序列号完整获取方法、系统、终端及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101140535A (zh) * 2006-09-08 2008-03-12 鸿富锦精密工业(深圳)有限公司 防止bios芯片数据丢失的方法
US20080072029A1 (en) * 2005-03-30 2008-03-20 Ling-Hung Yu Method for executing power on self test on a computer system and updating SMBIOS information partially
CN101840365A (zh) * 2010-04-30 2010-09-22 广州广电运通金融电子股份有限公司 Bios安全保护方法及系统
CN102087604A (zh) * 2009-12-07 2011-06-08 鸿富锦精密工业(深圳)有限公司 可获取硬件配置信息的计算机及其方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1584822B (zh) * 2003-08-19 2010-04-21 联想(北京)有限公司 一种升级计算机固件程序的方法
CN101149684A (zh) * 2006-09-22 2008-03-26 英业达股份有限公司 建立计算机系统唯一辨识信息的方法
CN103164418B (zh) * 2011-12-12 2016-05-04 阿里巴巴集团控股有限公司 一种序列号的处理方法及设备
CN103279406B (zh) * 2013-05-31 2015-12-23 华为技术有限公司 一种内存的隔离方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080072029A1 (en) * 2005-03-30 2008-03-20 Ling-Hung Yu Method for executing power on self test on a computer system and updating SMBIOS information partially
CN101140535A (zh) * 2006-09-08 2008-03-12 鸿富锦精密工业(深圳)有限公司 防止bios芯片数据丢失的方法
CN102087604A (zh) * 2009-12-07 2011-06-08 鸿富锦精密工业(深圳)有限公司 可获取硬件配置信息的计算机及其方法
CN101840365A (zh) * 2010-04-30 2010-09-22 广州广电运通金融电子股份有限公司 Bios安全保护方法及系统

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143256A (zh) * 2019-11-29 2020-05-12 苏州浪潮智能科技有限公司 一种读取现场可更换单元信息的方法和装置
CN111143256B (zh) * 2019-11-29 2023-01-10 苏州浪潮智能科技有限公司 一种读取现场可更换单元信息的方法和装置
CN113641409A (zh) * 2020-04-27 2021-11-12 佛山市顺德区顺达电脑厂有限公司 串口序列号可固定的usb集线器
CN113641409B (zh) * 2020-04-27 2023-07-18 佛山市顺德区顺达电脑厂有限公司 串口序列号可固定的usb集线器
CN113821255A (zh) * 2021-08-19 2021-12-21 惠州Tcl移动通信有限公司 一种基于高通平台的nv参数设置方法、终端及存储介质
CN113821255B (zh) * 2021-08-19 2023-09-19 惠州Tcl移动通信有限公司 一种基于高通平台的nv参数设置方法、终端及存储介质

Also Published As

Publication number Publication date
CN105589699A (zh) 2016-05-18

Similar Documents

Publication Publication Date Title
WO2016062146A1 (zh) 序列号信息的更新方法、装置及终端
US9507604B2 (en) Boot method and boot system
US10395039B2 (en) Customer-owned trust of device firmware
US8874892B1 (en) Assessing BIOS information prior to reversion
US10185828B2 (en) Systems and methods using virtual UEFI path for secure firmware handling in multi-tenant or server information handling system environments
JP4433401B2 (ja) 情報処理システム、プログラム、及び情報処理方法
US10754955B2 (en) Authenticating a boot path update
US9626181B2 (en) Systems and methods to securely inject binary images and code into firmware
EP3522059B1 (en) Perform security action based on inventory comparison
KR102358470B1 (ko) 부트 로더 업데이트 펌웨어, 및 부트 로더 업데이트 방법
US9430208B2 (en) System and method of remote management and configuration of an information handling system by implementing a customized configuration of a personality module
JP2005327275A (ja) 効率的なパッチ当て
US9721102B2 (en) Boot mechanisms for bring your own management
CN107567629B (zh) 在可信执行环境容器中的动态固件模块加载器
US11886886B2 (en) System and method for runtime synchronization and authentication of pre-boot device drivers for a rescue operating system
US10831897B2 (en) Selective enforcement of secure boot database entries in an information handling system
US10025587B2 (en) Method of bootup and installation, and computer system thereof
US20180253555A1 (en) Selecting and loading firmware volumes
CN113946854B (zh) 一种文件访问控制方法、装置及计算机可读存储介质
US20130080751A1 (en) Method and device for updating bios program for computer system
CN107077342B (zh) 固件模块运行权限
US20150212866A1 (en) Management system for service of multiple operating environments, and methods thereof
WO2023098569A1 (zh) 补丁处理方法、装置及计算机设备
US20230297724A1 (en) Hardware identity restoration post-device repair
US11068276B2 (en) Controlled customization of silicon initialization

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15852588

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15852588

Country of ref document: EP

Kind code of ref document: A1