CN108959973A - A kind of guard method and system refreshed for BMC firmware - Google Patents
A kind of guard method and system refreshed for BMC firmware Download PDFInfo
- Publication number
- CN108959973A CN108959973A CN201810681480.0A CN201810681480A CN108959973A CN 108959973 A CN108959973 A CN 108959973A CN 201810681480 A CN201810681480 A CN 201810681480A CN 108959973 A CN108959973 A CN 108959973A
- Authority
- CN
- China
- Prior art keywords
- firmware
- bmc
- image file
- write
- flash chip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
- G06F8/63—Image based installation; Cloning; Build to order
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The present invention provides a kind of guard methods and system refreshed for BMC firmware, comprising the following steps: S1, verifying account password, if account password mistake, firmware refreshes authorization failure;If password is correct, perform the next step;S2, importing/downloading firmware image file, and signature verification is carried out to firmware image file, if authentication failed, refuse to execute firmware refresh operation;If be proved to be successful, perform the next step;S3, the write-protect switch that the flash chip for storing firmware image file is controlled using control circuit are closed, and firmware refreshing is carried out;After the completion of S4, firmware refresh, the write-protect switch default reset of flash chip is open state, refusal modification operation.The present invention solves the problems, such as that prior art BMC firmware refreshes protection mechanism and is unable to full protection threat attack, realizes that firmware from the comprehensive protection of operation is flushed to, has greatly taken precautions against the risk that server management software BMC firmware faces.
Description
Technical field
The present invention relates to firmware refresh protection technique field, it is especially a kind of for BMC firmware refresh guard method with
System.
Background technique
BMC (Baseboard Management Controller, baseboard management controller) is one independently of system
Management software, the IPMI specification based on professional standard, for some to server for remote management, firmware upgrade, system monitoring etc.
Operation.
As BMC technology is higher and higher in the status of server industries, go out not for the attack layer of server B MC system
Thoroughly, there are the network layer attacks for refresh control;There is the attack for the firmware storage areas BMC domain;Also have for BMC firmware update
The attack of image file will cause the collapse of server management system when BMC is attacked by above-mentioned threat, or cause to take
Business device management system is controlled by attacker, carries out malicious operation control to server.Therefore, safe BMC firmware flush mechanism
It allows for taking precautions against above-mentioned malicious attack, prevents attacker from arbitrarily carrying out BMC firmware refresh operation;Prevent attacker to BMC
The modification in firmware storage areas domain;Prevent attacker from refreshing using the BMC firmware of insertion malicious code.
There are some pairs of BMC firmwares to refresh the mechanism protected at present, as manufacturer before firmware factory to consolidating
Part image file is digitally signed, and when refreshing carries out signature verification, guarantees the integrality and legitimacy of firmware image file;Or
Firmware is stored in the flash chip for having write-protect technology by person;But these protection mechanisms cannot be in protection in all directions
Threat attack is stated, can not prevent attacker from carrying out indiscriminate brush operation to BMC.
Summary of the invention
The object of the present invention is to provide a kind of guard methods and system refreshed for BMC firmware, it is intended to solve existing skill
Art BMC firmware refreshing protection mechanism is unable to the problem of full protection threatens attack, and it is comprehensive to realize that firmware flushes to operation progress
Protection, the risk that prevention BMC firmware faces.
It is including following the present invention provides a kind of guard method refreshed for BMC firmware to reach above-mentioned technical purpose
Step:
S1, verifying account password, if account password mistake, firmware refreshes authorization failure;If password is correct, hold
Row is in next step;
S2, importing/downloading firmware image file, and signature verification is carried out to firmware image file, if authentication failed,
Refusal executes firmware refresh operation;If be proved to be successful, perform the next step;
S3, the write-protect switch that the flash chip for storing firmware image file is controlled using control circuit are closed, consolidate
Part refreshes;
After the completion of S4, firmware refresh, the write-protect switch default reset of flash chip is open state, refusal modification behaviour
Make.
It is preferably, described that signature verification concrete operations are carried out to firmware image file are as follows:
In the public key of BMC mainboard insertion BMC firmware digital signature;
Signature verification is carried out to firmware image file using public key.
Preferably, the write-protect switch of the flash chip that storage firmware image file is controlled using control circuit is closed
Close concrete operations are as follows:
The pin of control circuit is connect with the flash chip write-protect pin of storage firmware image file;
It obtains and executes permission;
The write-protect switch of control flash chip is set to off.
Preferably, the account is the administrator's account for having BMC firmware and refreshing permission.
The present invention also provides it is a kind of for BMC firmware refresh protection system, the system comprises:
Account password authentication module, for verifying account password;
Firmware signature authentication module for importing/downloading firmware image file, and carries out signature to firmware image file and tests
Card;
Firmware refresh module, the write-protect for the flash chip using control circuit control storage firmware image file
Switch is closed, and firmware refreshing is carried out;
Write-protect module, after the completion of refreshing for firmware, the write-protect switch default reset of flash chip is opening state
State, refusal modification operation.
Preferably, the firmware signature authentication module includes:
Public key embedded unit, for obtaining the public key for being embedded in the BMC firmware digital signature of mainboard;
Authentication unit, for carrying out signature verification to firmware image file using public key.
Preferably, the firmware refresh module includes:
Pin connection unit, for by the pin of control circuit and storage firmware image file flash chip write-protect
Pin connection;
Authority acquiring unit executes permission for obtaining;
Write-protect closing unit, the write-protect switch for controlling flash chip are set to off;
Refresh unit, for carrying out firmware refreshing.
Preferably, the account is the administrator's account for having BMC firmware and refreshing permission.
The effect provided in summary of the invention is only the effect of embodiment, rather than invents all whole effects, above-mentioned
A technical solution in technical solution have the following advantages that or the utility model has the advantages that
Compared with prior art, the present invention by verifying account password, to firmware image file carry out signature verification and
The closing of the storage chip write-protect switch of control storage firmware image file, prevents attacker to realize in firmware refresh process
Indiscriminate brush operation and BMC firmware file are carried out in the process of running not by malicious modification by the legal account of phishing, will be used
Family least privilege technology, digital signature technology and flash chip write-protect technology combine, and apply to BMC firmware and refresh
Cheng Zhong realizes triple protection of the firmware from refreshing end to operation end.Solving prior art BMC firmware refreshing protection mechanism cannot
Full protection threatens the problem of attack, realizes that firmware from the comprehensive protection of operation is flushed to, has greatly taken precautions against server pipe
The risk that reason software BMC firmware faces.
Detailed description of the invention
Fig. 1 is a kind of guard method flow chart refreshed for BMC firmware provided in the embodiment of the present invention;
Fig. 2 is a kind of protection system structure diagram refreshed for BMC firmware provided in the embodiment of the present invention.
Specific embodiment
In order to clearly illustrate the technical characterstic of this programme, below by specific embodiment, and its attached drawing is combined, to this
Invention is described in detail.Following disclosure provides many different embodiments or example is used to realize different knots of the invention
Structure.In order to simplify disclosure of the invention, hereinafter the component of specific examples and setting are described.In addition, the present invention can be with
Repeat reference numerals and/or letter in different examples.This repetition is that for purposes of simplicity and clarity, itself is not indicated
Relationship between various embodiments and/or setting is discussed.It should be noted that illustrated component is not necessarily to scale in the accompanying drawings
It draws.Present invention omits the descriptions to known assemblies and treatment technology and process to avoid the present invention is unnecessarily limiting.
It is provided for the embodiments of the invention a kind of guard method and system refreshed for BMC firmware with reference to the accompanying drawing
It is described in detail.
As shown in Figure 1, the embodiment of the invention discloses a kind of guard method refreshed for BMC firmware, including following step
It is rapid:
S1, verifying account password, if account password mistake, firmware refreshes authorization failure;If password is correct, hold
Row is in next step;
S2, importing/downloading firmware image file, and signature verification is carried out to firmware image file, if authentication failed,
Refusal executes firmware refresh operation;If be proved to be successful, perform the next step;
S3, the write-protect switch that the flash chip for storing firmware image file is controlled using control circuit are closed, consolidate
Part refreshes;
After the completion of S4, firmware refresh, the write-protect switch default reset of flash chip is open state, refusal modification behaviour
Make.
The administrator's account for refreshing permission due in firmware refresh operation, only having BMC firmware could initiate firmware brush
New request, ordinary user can not carry out the operation, before confirmation carries out the refreshing of BMC firmware, need to test account password
Card, only after account password is verified, BMC firmware, which refreshes, just can get legal authorization.If account password mistake,
BMC firmware refreshes authorization failure, and system will be refused to execute firmware refreshing;If password is correct, perform the next step.
Aforesaid operations are the first heavy protection mechanisms refreshed for BMC firmware.By above-mentioned protection mechanism, can effectively prevent
Only attacker carries out indiscriminate brush operation by the legal account of phishing.
Importing/downloading image file.BMC mainboard is just embedded in the public key of BMC firmware digital signature, firmware mirror before factory
As after file importing/downloading, system will carry out signature verification operations to firmware image file with the public key of insertion, judge firmware mirror
As the integrality and legitimacy of file.If signature verification fails, system will be refused to execute firmware refresh operation, if signature
It is proved to be successful, then will execute operation and transfer control circuit to.
Aforesaid operations are the second heavy protection mechanisms refreshed for BMC firmware.By above-mentioned protection mechanism, firmware ensure that
The integrality and legitimacy of image file.
BMC firmware image file is stored in flash chip, by the pin of the control circuit and storage BMC firmware
The flash chip write-protect pin of file is connected, and after control circuit obtains execution permission, just controls the write-protect of flash chip
Switch is set to off, to modify BMC firmware file.When the flash chip write-protect switch of storage BMC firmware file is closed
Afterwards, BMC firmware starts to carry out refresh operation, after successfully completing firmware refreshing, the write-protect switch default reset of flash chip
For open state, and refuse all modification operation.
The third weight protection mechanism refreshed when aforesaid operations for BMC firmware.Pass through above-mentioned protection mechanism, it is ensured that
BMC firmware file is not in the process of running by malicious modification.
The embodiment of the present invention is solid by verifying account password, signature verification is carried out to firmware image file and controlling storage
The closing of the storage chip write-protect switch of part image file prevents attacker imitative by network to realize in firmware refresh process
It emits legal account and carries out indiscriminate brush operation and BMC firmware file in the process of running not by malicious modification, by user's least privilege
Technology, digital signature technology and flash chip write-protect technology combine, and apply in BMC firmware refresh process, realize solid
Triple protection of the part from refreshing end to operation end.It solves prior art BMC firmware refreshing protection mechanism and is unable to full protection prestige
The problem of side of body attack, realizes that from the comprehensive protection of operation is flushed to, it is solid greatly to have taken precautions against server management software BMC for firmware
The risk that part faces.
As shown in Fig. 2, the embodiment of the invention also discloses a kind of protection system refreshed for BMC firmware, the system
Include:
Account password authentication module, for verifying account password;
Firmware signature authentication module for importing/downloading firmware image file, and carries out signature to firmware image file and tests
Card;
Firmware refresh module, the write-protect for the flash chip using control circuit control storage firmware image file
Switch is closed, and firmware refreshing is carried out;
Write-protect module, after the completion of refreshing for firmware, the write-protect switch default reset of flash chip is opening state
State, refusal modification operation.
The account is the administrator's account for having BMC firmware and refreshing permission, and ordinary user can not carry out the operation, true
Recognize before carrying out the refreshing of BMC firmware, needs to verify account password, only after account password is verified, BMC firmware
Refresh and just can get legal authorization.
The firmware signature authentication module includes:
Public key embedded unit, for obtaining the public key for being embedded in the BMC firmware digital signature of mainboard;
Authentication unit, for carrying out signature verification to firmware image file using public key.
BMC mainboard is just embedded in the public key of BMC firmware digital signature before factory, after firmware image file importing/downloading,
System will carry out signature verification operations to firmware image file with the public key of insertion, judge the integrality and conjunction of firmware image file
Method.
The firmware refresh module includes:
Pin connection unit, for by the pin of control circuit and storage firmware image file flash chip write-protect
Pin connection;
Authority acquiring unit executes permission for obtaining;
Write-protect closing unit, the write-protect switch for controlling flash chip are set to off;
Refresh unit, for carrying out firmware refreshing.
BMC firmware image file is stored in flash chip, by the pin of the control circuit and storage BMC firmware
The flash chip write-protect pin of file is connected, and after control circuit obtains execution permission, just controls the write-protect of flash chip
Switch is set to off, to modify BMC firmware file.When the flash chip write-protect switch of storage BMC firmware file is closed
Afterwards, BMC firmware starts to carry out refresh operation, after successfully completing firmware refreshing, the write-protect switch default reset of flash chip
For open state, and refuse all modification operation.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (8)
1. a kind of guard method refreshed for BMC firmware, which comprises the following steps:
S1, verifying account password, if account password mistake, firmware refreshes authorization failure;If password is correct, under executing
One step;
S2, importing/downloading firmware image file, and signature verification is carried out to firmware image file and is refused if authentication failed
Execute firmware refresh operation;If be proved to be successful, perform the next step;
S3, the write-protect switch that the flash chip for storing firmware image file is controlled using control circuit are closed, and firmware brush is carried out
Newly;
After the completion of S4, firmware refresh, the write-protect switch default reset of flash chip is open state, refusal modification operation.
2. a kind of guard method refreshed for BMC firmware according to claim 1, which is characterized in that described to firmware
Image file carries out signature verification concrete operations are as follows:
In the public key of BMC mainboard insertion BMC firmware digital signature;
Signature verification is carried out to firmware image file using public key.
3. a kind of guard method refreshed for BMC firmware according to claim 1, which is characterized in that described to utilize control
The write-protect switch of the flash chip of circuit control storage firmware image file processed closes concrete operations are as follows:
The pin of control circuit is connect with the flash chip write-protect pin of storage firmware image file;
It obtains and executes permission;
The write-protect switch of control flash chip is set to off.
4. a kind of guard method refreshed for BMC firmware according to claim 1 to 3, which is characterized in that
The account is the administrator's account for having BMC firmware and refreshing permission.
5. a kind of protection system refreshed for BMC firmware, which is characterized in that the system comprises:
Account password authentication module, for verifying account password;
Firmware signature authentication module carries out signature verification for importing/downloading firmware image file, and to firmware image file;
Firmware refresh module, the write-protect switch for the flash chip using control circuit control storage firmware image file
It closes, carries out firmware refreshing;
Write-protect module, after the completion of refreshing for firmware, the write-protect switch default reset of flash chip is open state, is refused
Modification operation absolutely.
6. a kind of protection system refreshed for BMC firmware according to claim 5, which is characterized in that the firmware label
Name authentication module include:
Public key embedded unit, for obtaining the public key for being embedded in the BMC firmware digital signature of mainboard;
Authentication unit, for carrying out signature verification to firmware image file using public key.
7. a kind of protection system refreshed for BMC firmware according to claim 5, which is characterized in that the firmware brush
New module includes:
Pin connection unit, for by the pin of control circuit and storage firmware image file flash chip write-protect pin
Connection;
Authority acquiring unit executes permission for obtaining;
Write-protect closing unit, the write-protect switch for controlling flash chip are set to off;
Refresh unit, for carrying out firmware refreshing.
8. a kind of protection system refreshed for BMC firmware according to claim 5-7 any one, which is characterized in that
The account is the administrator's account for having BMC firmware and refreshing permission.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810681480.0A CN108959973A (en) | 2018-06-27 | 2018-06-27 | A kind of guard method and system refreshed for BMC firmware |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810681480.0A CN108959973A (en) | 2018-06-27 | 2018-06-27 | A kind of guard method and system refreshed for BMC firmware |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108959973A true CN108959973A (en) | 2018-12-07 |
Family
ID=64487438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810681480.0A Pending CN108959973A (en) | 2018-06-27 | 2018-06-27 | A kind of guard method and system refreshed for BMC firmware |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108959973A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109977664A (en) * | 2019-03-26 | 2019-07-05 | 联想(北京)有限公司 | System refresh method and electronic equipment |
CN111142912A (en) * | 2019-12-29 | 2020-05-12 | 山东英信计算机技术有限公司 | BIOS refreshing method, device and equipment |
CN111832084A (en) * | 2019-04-22 | 2020-10-27 | 鸿富锦精密电子(天津)有限公司 | Firmware protection system and method for baseboard management controller |
CN113239363A (en) * | 2021-06-01 | 2021-08-10 | 长江存储科技有限责任公司 | Firmware updating method, device, equipment, readable storage medium and memory system |
CN114444083A (en) * | 2022-01-07 | 2022-05-06 | 苏州浪潮智能科技有限公司 | BMC-based server BIOS full life cycle safety protection system |
CN117574352A (en) * | 2024-01-16 | 2024-02-20 | 苏州元脑智能科技有限公司 | Software and hardware combined anti-counterfeiting method, system, equipment and storage medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101071392A (en) * | 2006-05-12 | 2007-11-14 | 国际商业机器公司 | Method and system for maintaining backup copies of firmware |
CN102331959A (en) * | 2010-07-12 | 2012-01-25 | 鸿富锦精密工业(深圳)有限公司 | Server system |
CN103593211A (en) * | 2013-11-01 | 2014-02-19 | 浪潮电子信息产业股份有限公司 | Method for refreshing and writing firmware programs through out-of-band isolation |
CN104899055A (en) * | 2015-05-06 | 2015-09-09 | 深圳市国鑫恒宇科技有限公司 | BIOS control based ME updating system and updating method thereof |
CN104915591A (en) * | 2014-03-10 | 2015-09-16 | 联想(北京)有限公司 | Data processing method and electronic equipment |
CN105653299A (en) * | 2014-11-12 | 2016-06-08 | 杭州华三通信技术有限公司 | Firmware upgrade method device |
CN105867976A (en) * | 2016-04-01 | 2016-08-17 | 浪潮电子信息产业股份有限公司 | Easy-to-apply server firmware online refreshing method |
CN106599694A (en) * | 2015-10-14 | 2017-04-26 | 广达电脑股份有限公司 | Security protection management methods, computer systems and computer-readable storage media |
CN106681751A (en) * | 2015-11-05 | 2017-05-17 | 广达电脑股份有限公司 | Unified firmware management system, management method, and computer readable medium |
CN106897070A (en) * | 2017-02-28 | 2017-06-27 | 郑州云海信息技术有限公司 | A kind of bios version upgrade method realized based on BMC and device |
CN106990958A (en) * | 2017-03-17 | 2017-07-28 | 联想(北京)有限公司 | A kind of extension element, electronic equipment and startup method |
CN107220084A (en) * | 2017-05-26 | 2017-09-29 | 郑州云海信息技术有限公司 | A kind of computer firmware method for refreshing |
CN107567615A (en) * | 2016-04-29 | 2018-01-09 | 慧与发展有限责任合伙企业 | Use the management processor of the code from ancillary equipment |
-
2018
- 2018-06-27 CN CN201810681480.0A patent/CN108959973A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101071392A (en) * | 2006-05-12 | 2007-11-14 | 国际商业机器公司 | Method and system for maintaining backup copies of firmware |
CN102331959A (en) * | 2010-07-12 | 2012-01-25 | 鸿富锦精密工业(深圳)有限公司 | Server system |
CN103593211A (en) * | 2013-11-01 | 2014-02-19 | 浪潮电子信息产业股份有限公司 | Method for refreshing and writing firmware programs through out-of-band isolation |
CN104915591A (en) * | 2014-03-10 | 2015-09-16 | 联想(北京)有限公司 | Data processing method and electronic equipment |
CN105653299A (en) * | 2014-11-12 | 2016-06-08 | 杭州华三通信技术有限公司 | Firmware upgrade method device |
CN104899055A (en) * | 2015-05-06 | 2015-09-09 | 深圳市国鑫恒宇科技有限公司 | BIOS control based ME updating system and updating method thereof |
CN106599694A (en) * | 2015-10-14 | 2017-04-26 | 广达电脑股份有限公司 | Security protection management methods, computer systems and computer-readable storage media |
CN106681751A (en) * | 2015-11-05 | 2017-05-17 | 广达电脑股份有限公司 | Unified firmware management system, management method, and computer readable medium |
CN105867976A (en) * | 2016-04-01 | 2016-08-17 | 浪潮电子信息产业股份有限公司 | Easy-to-apply server firmware online refreshing method |
CN107567615A (en) * | 2016-04-29 | 2018-01-09 | 慧与发展有限责任合伙企业 | Use the management processor of the code from ancillary equipment |
CN106897070A (en) * | 2017-02-28 | 2017-06-27 | 郑州云海信息技术有限公司 | A kind of bios version upgrade method realized based on BMC and device |
CN106990958A (en) * | 2017-03-17 | 2017-07-28 | 联想(北京)有限公司 | A kind of extension element, electronic equipment and startup method |
CN107220084A (en) * | 2017-05-26 | 2017-09-29 | 郑州云海信息技术有限公司 | A kind of computer firmware method for refreshing |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109977664A (en) * | 2019-03-26 | 2019-07-05 | 联想(北京)有限公司 | System refresh method and electronic equipment |
CN111832084A (en) * | 2019-04-22 | 2020-10-27 | 鸿富锦精密电子(天津)有限公司 | Firmware protection system and method for baseboard management controller |
CN111142912A (en) * | 2019-12-29 | 2020-05-12 | 山东英信计算机技术有限公司 | BIOS refreshing method, device and equipment |
CN113239363A (en) * | 2021-06-01 | 2021-08-10 | 长江存储科技有限责任公司 | Firmware updating method, device, equipment, readable storage medium and memory system |
CN114444083A (en) * | 2022-01-07 | 2022-05-06 | 苏州浪潮智能科技有限公司 | BMC-based server BIOS full life cycle safety protection system |
CN114444083B (en) * | 2022-01-07 | 2023-12-22 | 苏州浪潮智能科技有限公司 | BMC-based server BIOS full life cycle safety protection system |
CN117574352A (en) * | 2024-01-16 | 2024-02-20 | 苏州元脑智能科技有限公司 | Software and hardware combined anti-counterfeiting method, system, equipment and storage medium |
CN117574352B (en) * | 2024-01-16 | 2024-04-05 | 苏州元脑智能科技有限公司 | Software and hardware combined anti-counterfeiting method, system, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108959973A (en) | A kind of guard method and system refreshed for BMC firmware | |
KR101216306B1 (en) | Updating configuration parameters in a mobile terminal | |
US9652755B2 (en) | Method and system for securely updating field upgradeable units | |
US9742770B2 (en) | Dynamic authentication in alternate operating environment | |
US9143328B2 (en) | System and method for providing a system management command | |
US9154299B2 (en) | Remote management of endpoint computing device with full disk encryption | |
US9578019B2 (en) | Method and system for managing an embedded secure element eSE | |
US10430593B2 (en) | Boot images for units under test | |
US10838736B2 (en) | Bare metal device management | |
WO2019134234A1 (en) | Rooting-prevention log-in method, device, terminal apparatus, and storage medium | |
US20100313011A1 (en) | Identity Data Management in a High Availability Network | |
US10936722B2 (en) | Binding of TPM and root device | |
CN102833745B (en) | Method, communication equipment and communication system that a kind of software security is upgraded | |
US10855451B1 (en) | Removable circuit for unlocking self-encrypting data storage devices | |
CN106372487A (en) | Method and system for enhancing trust of server operating system | |
WO2020001455A1 (en) | Cpk-based linux operating system login authentication method, device, terminal and server | |
EP3918768A1 (en) | Method for handling data in a secure container | |
WO2019177563A1 (en) | Hardware security | |
US20170046513A1 (en) | Firmware authentication | |
US20190205560A1 (en) | Remote provisioning and authenticated writes to secure storage devices | |
KR20180027323A (en) | System and method for authenticating critical operations on solid-state drives | |
CN109508534A (en) | Prevent method, the embedded system attacked that degrade by software | |
US11693994B2 (en) | System and method for securing cache boards of an enterprise network data storage system | |
WO2017219886A1 (en) | Simple network protocol authentication method and device | |
CN113505376A (en) | Control method and device for application program running environment and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181207 |