Security verification method and system of BMC firmware

A security verification and firmware technology, applied in computer security devices, software deployment, instruments, etc., can solve problems such as the inability to accurately verify the security of BMC firmware, and achieve the effect of overcoming poor security, improving verification efficiency, and ensuring accuracy

Inactive Publication Date: 2018-12-21
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem of being unable to accurately verify the security of BMC firmware in the prior art solutions, the present invention proposes a security verification method for BMC firmware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification method and system of BMC firmware
  • Security verification method and system of BMC firmware
  • Security verification method and system of BMC firmware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to clearly illustrate the technical features of this solution, the present invention will be described in detail below through specific implementation modes and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate a relationship between the various embodiments and / or arrangements discussed. It should be noted that components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted herein to avoid unnecessarily limiting the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a BMC firmware security verification method and system. The method comprises the following steps: preprocessing a mirror image file of the BMC firmware to obtain a first digestvalue and a signature value; The image file and the signature value are calculated respectively, and the operation results are compared with the first digest value to verify the integrity and legitimacy of the BMC firmware. The system comprises a BMC firmware and a BMC firmware signature unit, which is used for preprocessing the mirror file of the BMC firmware to obtain a first digest value and asignature value; The BMC firmware verification unit calculates the image file and the signature value respectively, compares the operation result with the first digest value respectively, and verifiesthe integrity and legitimacy of the BMC firmware. At the same time, the invention verifies the integrity and legitimacy of the BMC firmware, and ensures the security of the BMC firmware to be updated.

Description

technical field [0001] The invention relates to the field of server firmware, in particular to a security verification method and system for BMC firmware. Background technique [0002] BMC (Baseboard Management Controller) is the baseboard management controller of the server. It has been widely used in the field of servers. It uses virtual keyboards, interfaces, mice, and power supplies to provide remote management functions for servers. Users can remotely monitor the physical characteristics of the server through the network port of the BMC, such as the temperature, voltage, fan working status, power supply, and chassis intrusion of each component. [0003] In recent years, attacks against servers have gradually shifted from upper-layer software to lower-layer firmware, such as BMC. It makes it possible for third-party malicious actors to implant malicious codes, viruses, and Trojan horses into the server firmware. If the BMC is attacked by a threat, it will cause the serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/57G06F8/65
CPCG06F8/65G06F21/51G06F21/57G06F2221/033
Inventor 苏振宇
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products