Unlock instant, AI-driven research and patent intelligence for your innovation.

BMC starting method, device and equipment and computer readable storage medium

A computer program and hash computing technology, applied in computer security devices, computing, program control devices, etc., can solve the problems of attacking servers, server security threats, and security affecting the security of the entire server, so as to improve security. , the effect of ensuring safety

Inactive Publication Date: 2019-07-12
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of the BMC firmware that provides management functions for the server directly affects the security of the server as a whole. Attackers are likely to attack the server through illegal operations on the BMC firmware, posing a threat to the security of the server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • BMC starting method, device and equipment and computer readable storage medium
  • BMC starting method, device and equipment and computer readable storage medium
  • BMC starting method, device and equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] see figure 1 , figure 1 It is an implementation flowchart of a BMC starting method in an embodiment of the present invention, and the method may include the following steps:

[0049] S101: Obtain a BMC image file when a BMC startup request is received.

[0050] The BMC boot process needs to use the BMC image file. Generally, the BMC image file includes UBoot, Kernel, RootImage, and Data. Among them, UBoot, Kernel, and RootImage are immutable non-data areas, and Data is a variable data area. Immutable non-data areas , that is, the data in the non-Data area directly affects the normal startup of the BMC. When a BMC startup request is received, such as when the BMC is detected to be powered on and started, the BMC image file is obtained. Specifically, the BMC image file is pre-cached in the BMC flash. When it is detected that the BMC is powered on and started, the BMC Flash can be loaded through the BMC loader, thereby obtaining the BMC image file.

[0051] S102: Perfo...

Embodiment 2

[0058] see figure 2 , figure 2 It is another implementation flowchart of the BMC starting method in the embodiment of the present invention, and the method may include the following steps:

[0059] S201: When a BMC startup request is received, obtain a ciphertext BMC image file encrypted with a private key.

[0060] The public-private key pair can be generated through the key management module, and the private key in the public-private key pair can be used to encrypt the BMC image file to form a ciphertext BMC image file, and store it locally safely to prevent leakage and fraudulent use. When a BMC startup request is received, the ciphertext BMC image file encrypted by the private key is obtained.

[0061] S202: Obtain a public key corresponding to the private key.

[0062] After obtaining the ciphertext BMC image file, you can obtain the public key corresponding to the private key. To prevent the public key from being modified by attackers, after the public-private key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a BMC (baseboard management controller) starting method which comprises the following steps: when a BMC starting request is received, obtaining a BMC mirror image file; performing security verification on the data of the non-Data area in the BMC mirror image file; and if the security verification is successful, carrying out BMC starting operation by utilizing the data of the non-Data area. In the technical scheme provided by the embodiment of the invention, only if the verification is successful, starting operation is carried out on the BMC; the data used for BMC starting is subjected to comprehensive security verification, so that possible illegal operation on BMC firmware is comprehensively identified, the security of the data used for BMC starting is fully ensured, the security of a BMC starting process is ensured, and the security of a server is greatly improved. The invention further discloses a BMC starting device and equipment and a storage medium which have corresponding technical effects.

Description

technical field [0001] The present invention relates to the field of computer application technology, in particular to a BMC starting method, device, equipment and computer-readable storage medium. Background technique [0002] As the baseboard management controller of the server, the BMC provides remote management functions for the server. Users can remotely monitor the physical characteristics of the server through the network port of the BMC, such as the temperature, voltage, fan working status, power supply, and chassis intrusion of each component. It can also provide component firmware management functions, such as firmware image update. [0003] In recent years, attacks against servers have gradually shifted from upper-layer software to lower-level hardware. Attackers implant malicious programs such as malicious codes, viruses, and Trojan horses into server firmware. When the firmware is loaded, the malicious programs are activated. In the lightest cases, the server ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F9/4401
CPCG06F9/4401G06F21/51
Inventor 赵媛
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD