BMC starting method, device and equipment and computer readable storage medium
A computer program and hash computing technology, applied in computer security devices, computing, program control devices, etc., can solve the problems of attacking servers, server security threats, and security affecting the security of the entire server, so as to improve security. , the effect of ensuring safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] see figure 1 , figure 1 It is an implementation flowchart of a BMC starting method in an embodiment of the present invention, and the method may include the following steps:
[0049] S101: Obtain a BMC image file when a BMC startup request is received.
[0050] The BMC boot process needs to use the BMC image file. Generally, the BMC image file includes UBoot, Kernel, RootImage, and Data. Among them, UBoot, Kernel, and RootImage are immutable non-data areas, and Data is a variable data area. Immutable non-data areas , that is, the data in the non-Data area directly affects the normal startup of the BMC. When a BMC startup request is received, such as when the BMC is detected to be powered on and started, the BMC image file is obtained. Specifically, the BMC image file is pre-cached in the BMC flash. When it is detected that the BMC is powered on and started, the BMC Flash can be loaded through the BMC loader, thereby obtaining the BMC image file.
[0051] S102: Perfo...
Embodiment 2
[0058] see figure 2 , figure 2 It is another implementation flowchart of the BMC starting method in the embodiment of the present invention, and the method may include the following steps:
[0059] S201: When a BMC startup request is received, obtain a ciphertext BMC image file encrypted with a private key.
[0060] The public-private key pair can be generated through the key management module, and the private key in the public-private key pair can be used to encrypt the BMC image file to form a ciphertext BMC image file, and store it locally safely to prevent leakage and fraudulent use. When a BMC startup request is received, the ciphertext BMC image file encrypted by the private key is obtained.
[0061] S202: Obtain a public key corresponding to the private key.
[0062] After obtaining the ciphertext BMC image file, you can obtain the public key corresponding to the private key. To prevent the public key from being modified by attackers, after the public-private key ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


