Unlock instant, AI-driven research and patent intelligence for your innovation.

BMC security management method and system in a trusted computing server

A security management and trusted computing technology, applied in the field of computer security, to achieve the effect of improving security management performance and promoting the use value

Active Publication Date: 2017-05-03
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that server security becomes more and more important, the present invention proposes a BMC security management method and system in a trusted computing server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • BMC security management method and system in a trusted computing server
  • BMC security management method and system in a trusted computing server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0014] The advantages and design content of the BMC security management method and system in the trusted computing server of the present invention will be described in detail below through an embodiment.

[0015] This embodiment is based on the domestic Loongson server as an example to illustrate the implementation process of realizing BMC security management, as attached figure 2 As shown, the secure trusted module detects and measures the BIOS and operating system, and formulates system security policies based on the BIOS and operating system. The secure trusted module communicates with the BMC (AST2400BMC chip) through the I2C bus, and sends management commands to the AST2400BMC chip. After the BMC receives the management command sent by the secure trusted module, it adjusts its own management functions and implements different management functions for different levels of security.

[0016] In this embodiment, the secure trusted module first formulates system security policies ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing BMC safety management in a server with the trusted computing function. The method includes the steps that a safety trusted module detects and measures firmware of a server mainboard and an operating system, and therefore a system safety strategy is made; the safety trusted module makes a safety management strategy for a BMC according to the made system safety strategy, and sends a management command to the BMC through an I2C bus; after receiving the management command sent by the safety trusted module, the BMC adjusts the own management function and implements different management methods according to safety at different levels. Through communication between the safety trusted module in the server with the trusted computing function and the BMC, safety management of the BMC is adjusted according to the safety management strategy made by the safety trusted module, safety problems of management in the safety server are solved, and a solution scheme is provided for the safety server to solve the problem of safety management of the BMC.

Description

Technical field [0001] The invention relates to computer security technology, in particular to a BMC security management method and system in a trusted computing server. Background technique [0002] With the development of information security technology and the improvement of the country’s requirements for information security, server security has become more and more important. More and more computers and servers have begun to adopt secure and trusted computing functions to improve the security of computers and servers. In addition to trusted computing to ensure local security through measures such as firmware and operating system measurements, remote server management functions also need to be securely controlled so that the server management functions do not have security vulnerabilities. Summary of the invention [0003] In view of the increasingly important problem of server security, the present invention proposes a BMC security management method and system in a trusted co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/71
CPCG06F21/57
Inventor 刘强金长新于治楼
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More