Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for BMC reliable configuration with access control function

A configuration method and access control technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as security risks, low password complexity, improper security configuration, etc., and achieve the effect of ensuring credibility

Inactive Publication Date: 2017-09-08
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a relatively independent management control unit in the server, BMC itself has security risks, such as being implanted with malicious code. In addition, when users use BMC to remotely manage the server, they may perform unsafe operations due to improper security configuration, such as low password complexity. , resulting in safety risks during operation
With the development of information technology, although BMC chips have achieved some improvements in security, there are still improvements in security and credibility in the application process, so how to improve the security and credibility of BMC chips is currently to be solved. technical problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for BMC reliable configuration with access control function
  • Method for BMC reliable configuration with access control function
  • Method for BMC reliable configuration with access control function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions protected by the present invention will be clearly and completely described below using specific embodiments and accompanying drawings. Obviously, the implementation described below Examples are only some embodiments of the present invention, but not all embodiments. Based on the embodiments in this patent, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this patent.

[0059] This embodiment provides a BMC trusted configuration method with an access control function, such as figure 1 As shown, BMC trusted configuration methods include:

[0060] S1: Turn on the BMC trusted function module;

[0061] S2: The configured BMC benchmark value;

[0062] S3: Present the trusted status of BMC firmware;

[0063] S4: Presenting a trusted state of the BIOS.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for BMC reliable configuration with an access control function. A reliable function module is added in a BMC Web management interface; the reliable function module is started; a standard value is configured; a reliable state of BMC firmware is presented; and a BIOS reliable state is presented. During electric starting of BMC, integrity measurement is conducted on the BMC firmware and BIOS key codes, so that program integrity can be ensured, and thus a reliable execution environment of a system platform can be established. In this way, the BMC can be consolidated; the integrity measurement is conducted on the BMC firmware and the BIOS during the BMC start running, so that program integrity can be ensured, and implantation of malicious codes can be avoided; a complete trust chain of the BMC start course is established; and reliability of the execution environment of the system platform is ensured.

Description

technical field [0001] The invention relates to the BMC field, in particular to a BMC trusted configuration method with an access control function. Background technique [0002] BMC is a baseboard management controller, which has been widely used in the server field. Use the virtual keyboard, interface, mouse, power supply, etc. to provide remote management functions for the server. Users use the BMC to monitor the physical characteristics of the server, such as the temperature, voltage, fan working status, power supply, and chassis intrusion of each component. As a relatively independent management control unit in the server, BMC itself has security risks, such as being implanted with malicious code. In addition, when users use BMC to remotely manage the server, they may perform unsafe operations due to improper security configuration, such as low password complexity. , resulting in safety risks during operation. With the development of information technology, although B...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/51
CPCG06F21/51G06F21/572
Inventor 苏振宇
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products