Server-based trust detection method and device

A detection method and server technology, applied in the server field, can solve problems such as damage, high cost, server damage, etc.

Inactive Publication Date: 2018-03-13
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the field of servers, when the system is in an untrusted state, any form of power-on operation of the server system will cause large or small damage to the server, and sometimes even cause major irreversible damage
As the server has higher and higher requirements for system reliability, this problem needs to be solved urgently. In the current existing technology, the server uses hardware to encrypt the system, and the cost is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server-based trust detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the following will briefly introduce the accompanying drawings that need to be used in the embodiments. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention. For Those of ordinary skill in the art can also obtain other drawings based on these drawings without making creative efforts.

[0015] On the one hand, the embodiment of the present invention provides a server-based authenticity detection method, with figure 1 It is a device structure diagram of the present invention, and the method includes:

[0016] Send a boot request to the server, and the server MB CPLD receives the boot signal, and simultaneously judges whether the system is in a trusted state through the BMC trusted input and output interface signal. If it is in an untrusted state, the MB CPLD rejects the boot request; state, the server sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a server-based trusted detection method and device, which sends a boot request to the server, the server MB CPLD receives the boot signal, and at the same time judges whether the system is in a trusted state through the BMC trusted input and output interface signal, and if it is in an untrusted state , the MB CPLD rejects the power-on request; if it is in a trusted state, the server system performs a power-on operation. The present invention can start the server system only when the BMC detects that the server system is credible, thereby preventing the server from starting in an unsafe environment, enhancing the reliability of the server system, and saving costs by using software to encrypt the system.

Description

technical field [0001] The present invention relates to the technical field of servers, in particular to a server-based authenticity detection method and device. Background technique [0002] In the field of servers, when the system is in an untrusted state, any form of power-on operation of the server system will cause large or small damage to the server, and sometimes even cause major irreversible damage. As the server has higher and higher requirements for system reliability, this problem needs to be solved urgently. In the current prior art, the server uses hardware to encrypt the system, and the cost is relatively high. Contents of the invention [0003] Based on the above problems, the present invention proposes a server-based credible detection method and device. During the credible BMC detection process or when the BMC detection system is in an untrusted state, the server system will not be able to perform any form of power-on operation, thus extremely Greatly imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/575G06F21/572
Inventor 黄冰冰
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products