Server credibility measuring method

A server and reliability technology, applied in the field of trusted computing, can solve problems such as high hardware cost, reduced motherboard compatibility, and equipment stability, and achieve the effect of reducing costs and facilitating promotion

Pending Publication Date: 2019-08-06
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, Trusted Computing 3.0 is realized by means of a TPCM card with a dedicated PCIE interface supplemented by a separate mainboard cable. Supported by slots, there are certain requirements for the space and interface of the device; in addition, this connection method also requires a separate connection line, so it will reduce the compatibility of the motherboard, and the existence of the connection line may have a certain impact on the stability of the device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server credibility measuring method
  • Server credibility measuring method
  • Server credibility measuring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] The device diagram of the TPCM storage system used to realize the trusted computing in the present invention is as follows figure 1 As shown, it mainly includes the following functional modules: main control chip, TPCM firmware is stored in the main control chip, which is used to complete the security measurement function; the trusted password module TCM is used to realize the trusted password verification function; The cache chip is used to cache data; the FLASH / DRAM module is used to store data; the power supply interface is used to directly supply power to the TPCM storage system through the motherboard battery after the device is turned on, so that the main control chip in the system Priority power-on; data interface, the data interface can support data communication protocols commonly used in the field such as SATA / SAS / PCIE.

[0029] Compared with the common storage system in the prior art, the above-mentioned TPCM storage system proposed by the present invention a...

Embodiment 2

[0045] The device in this embodiment is a server, and the server also includes a baseboard management controller (BMC) for managing and controlling the server.

[0046] After judging that the flag bit in the storage system is 1, measure the integrity of the BIOS firmware and BMC firmware of the server at the same time. Do not turn on.

Embodiment 3

[0048] In this embodiment, UEFI is used to replace the traditional BIOS to boot the device, and the integrity of the BIOS firmware needs to be measured when measuring the integrity of the device.

[0049] Preferably, when the device is a server, it is also necessary to measure the integrity of the BIOS firmware of the server and the BMC at the same time, and only when the measurement results of the two are normal, the normal boot process of the server is continued, otherwise it will not start.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a server credibility measuring method. The method comprises the following steps of when the equipment is in a pre-starting state, and if it is detected that a TPCM module exists in a storage system, powering on a main control chip in a solid-state system firstly; then, carrying out the active security measurement on the firmware of the BIOS and the BMC; if the measurement results are all normal, starting the equipment normally, and if one measurement result is abnormal, not starting the equipment. According to the technical scheme provided by the invention, the multiplexing of the main control chip of the memory can be realized, and the TPCM security measurement function is realized by utilizing the main control chip, so that the cost of the trusted computing hardware is reduced, and the later product popularization is facilitated.

Description

technical field [0001] The invention relates to the field of trusted computing, in particular to a server trusted measurement method. Background technique [0002] As a new development direction in the field of information security, trusted computing has attracted more and more attention from companies and research institutions. The main goal of a trusted computing system is to build a computing environment that users can expect, so as to ensure that computing resources will not be maliciously tampered with or stolen. [0003] The concept of domestic trusted computing has also been widely recognized and promoted by the government, military, and enterprises. After years of development, domestic trusted computing theory and technology research has been ahead of other countries, and has developed into the trusted computing 3.0 era with active control and active measurement. One of the main innovations of Trusted Computing 3.0 is the realization of the active measurement funct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/22G06F11/32
CPCG06F11/2273G06F11/2236G06F11/325G06F11/327G06F11/2284
Inventor 孙瑜杨秩王强
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products