CN111694782A - Framework and method for realizing automatic switching of trusted platform module - Google Patents
Framework and method for realizing automatic switching of trusted platform module Download PDFInfo
- Publication number
- CN111694782A CN111694782A CN202010444932.0A CN202010444932A CN111694782A CN 111694782 A CN111694782 A CN 111694782A CN 202010444932 A CN202010444932 A CN 202010444932A CN 111694782 A CN111694782 A CN 111694782A
- Authority
- CN
- China
- Prior art keywords
- controller
- switching
- trusted platform
- chips
- platform module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 239000000758 substrate Substances 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- QZXCCPZJCKEPSA-UHFFFAOYSA-N chlorfenac Chemical compound OC(=O)CC1=C(Cl)C=CC(Cl)=C1Cl QZXCCPZJCKEPSA-UHFFFAOYSA-N 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/40—Bus structure
- G06F13/4004—Coupling between buses
- G06F13/4022—Coupling between buses using switching circuits, e.g. switching matrix, connection or expansion network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides a framework and a method for realizing automatic switching of a trusted platform module, wherein a plurality of chips, a controller and a switching information acquisition unit are connected with the controller respectively; the connection links of the chips and the controller are respectively provided with corresponding control selection switches; the controller is connected with the switching information acquisition unit through a serial bus. According to the invention, before the server is started, the server requirements of the user are acquired, and the server requirements are switched to the correct trusted platform module without replacing a hardware module.
Description
Technical Field
The invention belongs to the technical field of server security, and particularly relates to a framework and a method for realizing automatic switching of a trusted platform module.
Background
Nowadays, servers are widely used, and confidential data is often required on the servers, thereby deriving the security requirements of the servers. The TCPA alliance was established by many IT macros in 1999 and defined the TPM specification, which defines that a server must have the capability to generate encryption and decryption keys, and must also be able to perform high-speed data encryption and decryption, and act as a co-processor that protects the BIOS and operating system from modification to secure the data on the server. Then China also puts forward TCM standards as the security standard indexes of domestic servers. A TPM specification-based server with a standard-based security subsystem, typically located on a motherboard, is commonly referred to as a trusted platform module ("TPM"). The Field Replace Unit (abbreviated as "FRU"), Field replaceable Unit, refers to some parts on large-scale equipment such as server, etc. which can be directly replaced without repair, and can obtain the user's demand according to the information in the FRU.
When the existing server is regenerated, the trusted platform module is usually made into a mode of modular small plates, a user-defined connector is used for being connected with a mainboard, and the trusted platform module is fixed on the mainboard by adding a one-way screw, so that the trusted platform module is prevented from being removed; in addition, the trusted platform module determines to follow the TPM specification or the TCM specification according to the user's requirement, but the TPM specification and the TCM specification are incompatible and need to be handled differently.
The existing management mode has the following defects:
(1) because the TPM specification and the TCM specification are not compatible, different chips are required to be used, so that the production and manufacturing cost is increased; the need to distinguish between the same configuration but to ship to different guests or areas results in increased costs for control and management.
(2) The trusted platform module platelet is in case the installation just can't be dismantled, can't directly change the module to the user that needs switch support two kinds of specifications, must return the server to the mill and reprocess, very inconvenient in the use.
Disclosure of Invention
In view of the above-mentioned deficiencies of the prior art, the present invention provides a framework and a method for implementing automatic switching of a trusted platform module, so as to solve the above-mentioned technical problems.
In a first aspect, the present invention provides an architecture for implementing automatic switching of a trusted platform module, including: the switching device comprises a plurality of chips, a controller and a switching information acquisition unit, wherein the chips are respectively connected with the controller; the connection links of the chips and the controller are respectively provided with corresponding control selection switches; the controller is connected with the switching information acquisition unit through a serial bus.
Furthermore, the chips are two different chips of the trusted platform module, and the two chips are respectively a first chip and a second chip; a first control selection switch is arranged on a connection link of the first chip and the controller; and a second control selection switch is arranged on a connection link of the second chip and the controller.
Further, the controller is connected with the baseboard management controller.
In a second aspect, the present invention provides a method for implementing automatic switching of a trusted platform module, including:
reading the information of the switching information acquisition unit;
judging the chips needing to be switched according to the information;
switching to the corresponding chip by controlling the selection switch;
and outputting the waveform to the control selection switch, and transmitting the waveform back to the controller to confirm the completion of switching.
Further, after the controller confirms that the handover is completed, the method further includes: the controller controls the server to be started.
Further, the method further comprises: judging whether the controller confirms that the switching is completed: and if the controller does not receive the returned waveform, alarming and recording through the substrate management controller.
Further, the method further comprises:
and judging whether the information of the switching information acquisition unit is successfully read, and if not, stopping starting the server and reporting an error.
The beneficial effect of the invention is that,
before starting up, the server requirement of a user is judged according to information in a switching information acquisition unit, a trusted platform module chip is switched by using a controller, so that the trusted platform module is more convenient and faster, a hardware path is switched to a correct trusted platform module, and two trusted platform modules can be quickly switched on a system without replacing hardware modules; after the switching module is confirmed to be successful, the server is started, and the use safety of the server is improved.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a framework according to one embodiment of the present application;
FIG. 2 is a schematic structural diagram of a framework according to an embodiment of the present application;
fig. 3 is a waveform transceiver diagram of a CPLD according to an embodiment of the present application;
FIG. 4 is a flow diagram of a method of one embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
In the description of the present invention, it is to be understood that the terms "first", "second", and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated. Thus, a feature defined as "first," "second," etc. may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless otherwise specified.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art through specific situations.
The following explains key terms appearing in the present invention.
FRU: the field replaceable unit stores FRU data including information of manufacturer, product model, product serial number, asset serial number and the like, and provides asset information management for manufacturers and customers. The FRU is a handover information acquisition unit in this embodiment.
The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
As shown in fig. 1, the present embodiment provides an architecture for implementing automatic switching of a trusted platform module, including a server motherboard and a trusted platform module board card, where the server motherboard and the trusted platform module board card are connected by a trusted platform module connector; the server mainboard is provided with a CPLD, the trusted platform module board is provided with a TPM chip and a TCM chip, the CPLD is provided with an I2C bus, and the I2C bus is connected with a field replaceable unit; the CPLD and TPM chip are connected with each other through a first control selection switch, the CPLD and TPM chip are connected with each other through a second control selection switch, and the first control selection switch and the second control selection switch are respectively connected with the CPLD.
The circuit architecture provided in this embodiment gives play to the most advanced power-up characteristic of the CPLD, reads the FRU on the motherboard by using the CPLD, determines the server requirement of the user according to the information in the FRU, selects the adaptive security standard according to the requirement, switches the chip included in the corresponding trusted platform module by using the CPLD, and implements the TPM standard correspondingly by using the TPM chip, and as shown in fig. 3, after the CPLD completes the path switching, the CPLD outputs a waveform through a custom-defined pin and transmits the waveform back to the CPLD through the switched path for confirmation, if the CPLD does not receive the returned waveform after the switching, the path switching is represented as incomplete, or the trusted platform module may not be installed, and at this time, the CPLD determines that the module switching is not completed correctly, and stops powering on the server. This design has compatible TPM/TCM standard's support, reduces system BOM's management, has saved the production cost of opening a line of trusted platform module integrated circuit board to increased the elasticity in the design, different SPI/LPC busbar can be walked respectively to TPM chip and TCM chip, let the design end have had more freedom on the selection material, reach best price/performance ratio. This design also can be preferentially examined credible platform module and whether install correctly, just discover to install incomplete risk after avoiding locking the one-way screw.
Example 2
As shown in fig. 2, this embodiment provides an architecture for implementing automatic switching of trusted platform modules, and a baseboard management controller is added on the basis of embodiment 1, and the baseboard management controller is connected to a CPLD.
If the CPLD does not receive the return waveform after switching, the path switching is incomplete, or the trusted platform module is not installed, at the moment, the CPLD sends an alarm through the substrate management controller and records a fault, and the starting safety of the server is improved.
FIG. 4 is a schematic flow chart diagram of a method of one embodiment of the present invention. The execution subject in fig. 4 may be a framework for implementing automatic switching of the trusted platform module.
As shown in fig. 4, the method 100 includes:
Optionally, as an embodiment of the present invention, after the controller confirms that the handover is completed, the method further includes: the controller controls the server to be started.
Optionally, as an embodiment of the present invention, the method further includes: judging whether the controller confirms that the switching is completed: and if the controller does not receive the returned waveform, alarming and recording through the substrate management controller.
Optionally, as an embodiment of the present invention, the method further includes:
and judging whether the information of the switching information acquisition unit is successfully read, and if not, stopping starting the server and reporting an error.
In order to facilitate understanding of the present invention, the method for automatically switching the trusted platform module according to the present invention is further described below with reference to the principle of the method for automatically switching the trusted platform module according to the present invention and the process of switching the trusted platform module in the embodiment.
Specifically, the method for implementing automatic switching of the trusted platform module includes:
s1, reading system information of the server by the CPLD through the field replaceable unit;
the system information of the server comprises information such as a manufacturer, a product model, a product serial number, an asset serial number and the like, the CPLD can acquire the system information through the FRU and judge whether the CPLD reads the field replaceable unit successfully, and if not, the server is stopped to be started and an error is reported;
s2, the CPLD judges the safety standard which the trusted platform module conforms to according to the system information;
through the above-mentioned server system information, the security standard that the credible platform module of server accords with is analyzed to CPLD, includes: TPM specification and TCM specification; if the TPM specification is met, the CPLD outputs an instruction that FM _ TPM _ EN is 1 and FM _ TCM _ EN is 0, and the trusted platform module is switched to the TPM chip; if the trusted platform module meets the TCM specification, the CPLD outputs an instruction that FM _ TPM _ EN is 0 and FM _ TCM _ EN is 1, and the trusted platform module is switched to the TCM chip;
s3, the CPLD outputs waveforms to the first control selection switch and the second control selection switch, and the waveforms are transmitted back to the CPLD through the switched path to confirm that the switching is completed;
when the CPLD finishes switching the trusted platform module, outputting a waveform through a self-defined pin and transmitting the waveform back to the CPLD for confirmation through a switched path, and if the CPLD does not receive the waveform sent by the CPLD after switching again, indicating that the path switching is incomplete or the trusted platform module is possibly not installed, alarming and recording through a substrate management controller; and after the CPLD confirms that the switching is completed, the CPLD controls the server to start.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (7)
1. An architecture for implementing automatic switching of trusted platform modules, comprising: the switching device comprises a plurality of chips, a controller and a switching information acquisition unit, wherein the chips are respectively connected with the controller; the connection links of the chips and the controller are respectively provided with corresponding control selection switches; the controller is connected with the switching information acquisition unit through a serial bus.
2. The architecture of claim 1, wherein the chips are two different chips of the trusted platform module, and the two chips are a first chip and a second chip respectively; a first control selection switch is arranged on a connection link of the first chip and the controller; and a second control selection switch is arranged on a connection link of the second chip and the controller.
3. The architecture of claim 1, further comprising a baseboard management controller, wherein the controller is connected to the baseboard management controller.
4. A method for realizing automatic switching of a trusted platform module is characterized by comprising the following steps:
reading the information of the switching information acquisition unit;
judging the chips needing to be switched according to the information;
switching to the corresponding chip by controlling the selection switch;
and outputting the waveform to the control selection switch, and transmitting the waveform back to the controller to confirm the completion of switching.
5. The method of claim 4, wherein after the controller confirms that the switch is completed, the method further comprises: the controller controls the server to be started.
6. The method of claim 4, wherein the method further comprises: judging whether the controller confirms that the switching is completed: and if the controller does not receive the returned waveform, alarming and recording through the substrate management controller.
7. The method of claim 4, wherein the method further comprises:
and judging whether the information of the switching information acquisition unit is successfully read, and if not, stopping starting the server and reporting an error.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010444932.0A CN111694782B (en) | 2020-05-23 | 2020-05-23 | Device and method for realizing automatic switching of trusted platform module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010444932.0A CN111694782B (en) | 2020-05-23 | 2020-05-23 | Device and method for realizing automatic switching of trusted platform module |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111694782A true CN111694782A (en) | 2020-09-22 |
CN111694782B CN111694782B (en) | 2022-03-04 |
Family
ID=72477589
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010444932.0A Active CN111694782B (en) | 2020-05-23 | 2020-05-23 | Device and method for realizing automatic switching of trusted platform module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111694782B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113094316A (en) * | 2021-04-01 | 2021-07-09 | 浪潮电子信息产业股份有限公司 | Online switching device and method of NCSI (non-volatile memory) signals |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201820230U (en) * | 2010-01-22 | 2011-05-04 | 华北计算技术研究所 | Computer and trusted-computing trusted root equipment for same |
CN202362788U (en) * | 2011-11-21 | 2012-08-01 | 国民技术股份有限公司 | Dependable computing device with USB (Universal Serial Bus) interfaces |
CN104254986A (en) * | 2012-02-10 | 2014-12-31 | 日本电信电话株式会社 | Wavelength selection switch system and method for controlling wavelength selection switch |
CN204203971U (en) * | 2014-10-13 | 2015-03-11 | 长城信息产业股份有限公司 | A kind of credible accounting system |
US20150281237A1 (en) * | 2014-03-25 | 2015-10-01 | Robert C. Swanson | Multinode hubs for trusted computing |
CN105302759A (en) * | 2015-10-29 | 2016-02-03 | 青岛海尔智能家电科技有限公司 | Automatic switching circuit device and method of 485 communication chip transmitting and receiving data |
CN105912488A (en) * | 2016-05-20 | 2016-08-31 | 英业达科技有限公司 | Computer apparatus and control method therefor |
CN206649517U (en) * | 2017-03-28 | 2017-11-17 | 华大半导体有限公司 | Server credible platform measures control system and the server including the system |
CN207182262U (en) * | 2017-09-08 | 2018-04-03 | 郑州云海信息技术有限公司 | A kind of more CPLD selectively burnings frameworks based on BMC controls |
CN107925481A (en) * | 2015-12-21 | 2018-04-17 | 三菱电机株式会社 | Light relay device, control method and optical transmission system |
US20180157484A1 (en) * | 2016-12-06 | 2018-06-07 | Inventec (Pudong) Technology Corp. | Firmware update method and system |
CN108984354A (en) * | 2018-06-27 | 2018-12-11 | 郑州云海信息技术有限公司 | A kind of server chips debug circuit, adjustment method and server |
CN109508279A (en) * | 2018-11-28 | 2019-03-22 | 郑州云海信息技术有限公司 | A kind of server monitoring device, method and its system |
CN110032399A (en) * | 2019-04-15 | 2019-07-19 | 苏州浪潮智能科技有限公司 | A kind of TPM initial method and relevant apparatus |
CN111090539A (en) * | 2019-10-30 | 2020-05-01 | 苏州浪潮智能科技有限公司 | Dual-flash-memory self-repairing method and device based on CPLD |
CN111143256A (en) * | 2019-11-29 | 2020-05-12 | 苏州浪潮智能科技有限公司 | Method and device for reading field replaceable unit information |
-
2020
- 2020-05-23 CN CN202010444932.0A patent/CN111694782B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201820230U (en) * | 2010-01-22 | 2011-05-04 | 华北计算技术研究所 | Computer and trusted-computing trusted root equipment for same |
CN202362788U (en) * | 2011-11-21 | 2012-08-01 | 国民技术股份有限公司 | Dependable computing device with USB (Universal Serial Bus) interfaces |
CN104254986A (en) * | 2012-02-10 | 2014-12-31 | 日本电信电话株式会社 | Wavelength selection switch system and method for controlling wavelength selection switch |
US20150281237A1 (en) * | 2014-03-25 | 2015-10-01 | Robert C. Swanson | Multinode hubs for trusted computing |
CN204203971U (en) * | 2014-10-13 | 2015-03-11 | 长城信息产业股份有限公司 | A kind of credible accounting system |
CN105302759A (en) * | 2015-10-29 | 2016-02-03 | 青岛海尔智能家电科技有限公司 | Automatic switching circuit device and method of 485 communication chip transmitting and receiving data |
CN107925481A (en) * | 2015-12-21 | 2018-04-17 | 三菱电机株式会社 | Light relay device, control method and optical transmission system |
CN105912488A (en) * | 2016-05-20 | 2016-08-31 | 英业达科技有限公司 | Computer apparatus and control method therefor |
US20180157484A1 (en) * | 2016-12-06 | 2018-06-07 | Inventec (Pudong) Technology Corp. | Firmware update method and system |
CN206649517U (en) * | 2017-03-28 | 2017-11-17 | 华大半导体有限公司 | Server credible platform measures control system and the server including the system |
CN207182262U (en) * | 2017-09-08 | 2018-04-03 | 郑州云海信息技术有限公司 | A kind of more CPLD selectively burnings frameworks based on BMC controls |
CN108984354A (en) * | 2018-06-27 | 2018-12-11 | 郑州云海信息技术有限公司 | A kind of server chips debug circuit, adjustment method and server |
CN109508279A (en) * | 2018-11-28 | 2019-03-22 | 郑州云海信息技术有限公司 | A kind of server monitoring device, method and its system |
CN110032399A (en) * | 2019-04-15 | 2019-07-19 | 苏州浪潮智能科技有限公司 | A kind of TPM initial method and relevant apparatus |
CN111090539A (en) * | 2019-10-30 | 2020-05-01 | 苏州浪潮智能科技有限公司 | Dual-flash-memory self-repairing method and device based on CPLD |
CN111143256A (en) * | 2019-11-29 | 2020-05-12 | 苏州浪潮智能科技有限公司 | Method and device for reading field replaceable unit information |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113094316A (en) * | 2021-04-01 | 2021-07-09 | 浪潮电子信息产业股份有限公司 | Online switching device and method of NCSI (non-volatile memory) signals |
Also Published As
Publication number | Publication date |
---|---|
CN111694782B (en) | 2022-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7844768B2 (en) | Blade server system and method of managing same | |
US7317620B2 (en) | LCD panel for a server system | |
US7685348B2 (en) | Dedicated server management card with hot swap functionality | |
US7395323B2 (en) | System and method for providing network address information in a server system | |
US7263620B2 (en) | System and method for graceful shutdown of host processor cards in a server system | |
CN111694782B (en) | Device and method for realizing automatic switching of trusted platform module | |
CN101494564B (en) | Apparatus for monitoring power supply and method for implementing veneer thermal backup | |
US20030033466A1 (en) | Server system with multiple management user interfaces | |
US7103654B2 (en) | Server system with segregated management LAN and payload LAN | |
WO2009052741A1 (en) | A micro telecommunications computing architecture system and a method for reliability management thereof | |
CN113076210B (en) | Server fault diagnosis result notification method, system, terminal and storage medium | |
CN107544883B (en) | Diagnostic device, system and method of server | |
RU2434281C2 (en) | Method, module and system for protection at start-up | |
CN109032867A (en) | A kind of method for diagnosing faults, device and equipment | |
CN117472625A (en) | Method and device for determining abnormal information of PCIE link | |
CN101894091B (en) | Method and system for single board I2C expansion and ID check | |
Cisco | Troubleshooting the Initial Hardware Configuration | |
Cisco | Troubleshooting | |
Cisco | Troubleshooting the Initial Hardware Configuration | |
Cisco | Troubleshooting the Initial Hardware Configuration | |
Cisco | Troubleshooting the Initial Hardware Configuration | |
Cisco | Troubleshooting the Initial Hardware Configuration | |
Cisco | Troubleshooting the Initial Hardware Configuration | |
CN2566367Y (en) | Storage device for monitoring information of servicer monitor system | |
CN108243358A (en) | Pluggable business board |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |