CN111694782A - Framework and method for realizing automatic switching of trusted platform module - Google Patents

Framework and method for realizing automatic switching of trusted platform module Download PDF

Info

Publication number
CN111694782A
CN111694782A CN202010444932.0A CN202010444932A CN111694782A CN 111694782 A CN111694782 A CN 111694782A CN 202010444932 A CN202010444932 A CN 202010444932A CN 111694782 A CN111694782 A CN 111694782A
Authority
CN
China
Prior art keywords
controller
switching
trusted platform
chips
platform module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010444932.0A
Other languages
Chinese (zh)
Other versions
CN111694782B (en
Inventor
郭乃慎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202010444932.0A priority Critical patent/CN111694782B/en
Publication of CN111694782A publication Critical patent/CN111694782A/en
Application granted granted Critical
Publication of CN111694782B publication Critical patent/CN111694782B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/40Bus structure
    • G06F13/4004Coupling between buses
    • G06F13/4022Coupling between buses using switching circuits, e.g. switching matrix, connection or expansion network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a framework and a method for realizing automatic switching of a trusted platform module, wherein a plurality of chips, a controller and a switching information acquisition unit are connected with the controller respectively; the connection links of the chips and the controller are respectively provided with corresponding control selection switches; the controller is connected with the switching information acquisition unit through a serial bus. According to the invention, before the server is started, the server requirements of the user are acquired, and the server requirements are switched to the correct trusted platform module without replacing a hardware module.

Description

Framework and method for realizing automatic switching of trusted platform module
Technical Field
The invention belongs to the technical field of server security, and particularly relates to a framework and a method for realizing automatic switching of a trusted platform module.
Background
Nowadays, servers are widely used, and confidential data is often required on the servers, thereby deriving the security requirements of the servers. The TCPA alliance was established by many IT macros in 1999 and defined the TPM specification, which defines that a server must have the capability to generate encryption and decryption keys, and must also be able to perform high-speed data encryption and decryption, and act as a co-processor that protects the BIOS and operating system from modification to secure the data on the server. Then China also puts forward TCM standards as the security standard indexes of domestic servers. A TPM specification-based server with a standard-based security subsystem, typically located on a motherboard, is commonly referred to as a trusted platform module ("TPM"). The Field Replace Unit (abbreviated as "FRU"), Field replaceable Unit, refers to some parts on large-scale equipment such as server, etc. which can be directly replaced without repair, and can obtain the user's demand according to the information in the FRU.
When the existing server is regenerated, the trusted platform module is usually made into a mode of modular small plates, a user-defined connector is used for being connected with a mainboard, and the trusted platform module is fixed on the mainboard by adding a one-way screw, so that the trusted platform module is prevented from being removed; in addition, the trusted platform module determines to follow the TPM specification or the TCM specification according to the user's requirement, but the TPM specification and the TCM specification are incompatible and need to be handled differently.
The existing management mode has the following defects:
(1) because the TPM specification and the TCM specification are not compatible, different chips are required to be used, so that the production and manufacturing cost is increased; the need to distinguish between the same configuration but to ship to different guests or areas results in increased costs for control and management.
(2) The trusted platform module platelet is in case the installation just can't be dismantled, can't directly change the module to the user that needs switch support two kinds of specifications, must return the server to the mill and reprocess, very inconvenient in the use.
Disclosure of Invention
In view of the above-mentioned deficiencies of the prior art, the present invention provides a framework and a method for implementing automatic switching of a trusted platform module, so as to solve the above-mentioned technical problems.
In a first aspect, the present invention provides an architecture for implementing automatic switching of a trusted platform module, including: the switching device comprises a plurality of chips, a controller and a switching information acquisition unit, wherein the chips are respectively connected with the controller; the connection links of the chips and the controller are respectively provided with corresponding control selection switches; the controller is connected with the switching information acquisition unit through a serial bus.
Furthermore, the chips are two different chips of the trusted platform module, and the two chips are respectively a first chip and a second chip; a first control selection switch is arranged on a connection link of the first chip and the controller; and a second control selection switch is arranged on a connection link of the second chip and the controller.
Further, the controller is connected with the baseboard management controller.
In a second aspect, the present invention provides a method for implementing automatic switching of a trusted platform module, including:
reading the information of the switching information acquisition unit;
judging the chips needing to be switched according to the information;
switching to the corresponding chip by controlling the selection switch;
and outputting the waveform to the control selection switch, and transmitting the waveform back to the controller to confirm the completion of switching.
Further, after the controller confirms that the handover is completed, the method further includes: the controller controls the server to be started.
Further, the method further comprises: judging whether the controller confirms that the switching is completed: and if the controller does not receive the returned waveform, alarming and recording through the substrate management controller.
Further, the method further comprises:
and judging whether the information of the switching information acquisition unit is successfully read, and if not, stopping starting the server and reporting an error.
The beneficial effect of the invention is that,
before starting up, the server requirement of a user is judged according to information in a switching information acquisition unit, a trusted platform module chip is switched by using a controller, so that the trusted platform module is more convenient and faster, a hardware path is switched to a correct trusted platform module, and two trusted platform modules can be quickly switched on a system without replacing hardware modules; after the switching module is confirmed to be successful, the server is started, and the use safety of the server is improved.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a framework according to one embodiment of the present application;
FIG. 2 is a schematic structural diagram of a framework according to an embodiment of the present application;
fig. 3 is a waveform transceiver diagram of a CPLD according to an embodiment of the present application;
FIG. 4 is a flow diagram of a method of one embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
In the description of the present invention, it is to be understood that the terms "first", "second", and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated. Thus, a feature defined as "first," "second," etc. may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless otherwise specified.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art through specific situations.
The following explains key terms appearing in the present invention.
FRU: the field replaceable unit stores FRU data including information of manufacturer, product model, product serial number, asset serial number and the like, and provides asset information management for manufacturers and customers. The FRU is a handover information acquisition unit in this embodiment.
The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
As shown in fig. 1, the present embodiment provides an architecture for implementing automatic switching of a trusted platform module, including a server motherboard and a trusted platform module board card, where the server motherboard and the trusted platform module board card are connected by a trusted platform module connector; the server mainboard is provided with a CPLD, the trusted platform module board is provided with a TPM chip and a TCM chip, the CPLD is provided with an I2C bus, and the I2C bus is connected with a field replaceable unit; the CPLD and TPM chip are connected with each other through a first control selection switch, the CPLD and TPM chip are connected with each other through a second control selection switch, and the first control selection switch and the second control selection switch are respectively connected with the CPLD.
The circuit architecture provided in this embodiment gives play to the most advanced power-up characteristic of the CPLD, reads the FRU on the motherboard by using the CPLD, determines the server requirement of the user according to the information in the FRU, selects the adaptive security standard according to the requirement, switches the chip included in the corresponding trusted platform module by using the CPLD, and implements the TPM standard correspondingly by using the TPM chip, and as shown in fig. 3, after the CPLD completes the path switching, the CPLD outputs a waveform through a custom-defined pin and transmits the waveform back to the CPLD through the switched path for confirmation, if the CPLD does not receive the returned waveform after the switching, the path switching is represented as incomplete, or the trusted platform module may not be installed, and at this time, the CPLD determines that the module switching is not completed correctly, and stops powering on the server. This design has compatible TPM/TCM standard's support, reduces system BOM's management, has saved the production cost of opening a line of trusted platform module integrated circuit board to increased the elasticity in the design, different SPI/LPC busbar can be walked respectively to TPM chip and TCM chip, let the design end have had more freedom on the selection material, reach best price/performance ratio. This design also can be preferentially examined credible platform module and whether install correctly, just discover to install incomplete risk after avoiding locking the one-way screw.
Example 2
As shown in fig. 2, this embodiment provides an architecture for implementing automatic switching of trusted platform modules, and a baseboard management controller is added on the basis of embodiment 1, and the baseboard management controller is connected to a CPLD.
If the CPLD does not receive the return waveform after switching, the path switching is incomplete, or the trusted platform module is not installed, at the moment, the CPLD sends an alarm through the substrate management controller and records a fault, and the starting safety of the server is improved.
FIG. 4 is a schematic flow chart diagram of a method of one embodiment of the present invention. The execution subject in fig. 4 may be a framework for implementing automatic switching of the trusted platform module.
As shown in fig. 4, the method 100 includes:
step 110, reading the information of the switching information acquisition unit;
step 120, judging the chips needing to be switched according to the information;
step 130, switching to a corresponding chip by controlling a selection switch;
step 140, output waveform to the control selection switch and return to the controller to confirm the completion of switching.
Optionally, as an embodiment of the present invention, after the controller confirms that the handover is completed, the method further includes: the controller controls the server to be started.
Optionally, as an embodiment of the present invention, the method further includes: judging whether the controller confirms that the switching is completed: and if the controller does not receive the returned waveform, alarming and recording through the substrate management controller.
Optionally, as an embodiment of the present invention, the method further includes:
and judging whether the information of the switching information acquisition unit is successfully read, and if not, stopping starting the server and reporting an error.
In order to facilitate understanding of the present invention, the method for automatically switching the trusted platform module according to the present invention is further described below with reference to the principle of the method for automatically switching the trusted platform module according to the present invention and the process of switching the trusted platform module in the embodiment.
Specifically, the method for implementing automatic switching of the trusted platform module includes:
s1, reading system information of the server by the CPLD through the field replaceable unit;
the system information of the server comprises information such as a manufacturer, a product model, a product serial number, an asset serial number and the like, the CPLD can acquire the system information through the FRU and judge whether the CPLD reads the field replaceable unit successfully, and if not, the server is stopped to be started and an error is reported;
s2, the CPLD judges the safety standard which the trusted platform module conforms to according to the system information;
through the above-mentioned server system information, the security standard that the credible platform module of server accords with is analyzed to CPLD, includes: TPM specification and TCM specification; if the TPM specification is met, the CPLD outputs an instruction that FM _ TPM _ EN is 1 and FM _ TCM _ EN is 0, and the trusted platform module is switched to the TPM chip; if the trusted platform module meets the TCM specification, the CPLD outputs an instruction that FM _ TPM _ EN is 0 and FM _ TCM _ EN is 1, and the trusted platform module is switched to the TCM chip;
s3, the CPLD outputs waveforms to the first control selection switch and the second control selection switch, and the waveforms are transmitted back to the CPLD through the switched path to confirm that the switching is completed;
when the CPLD finishes switching the trusted platform module, outputting a waveform through a self-defined pin and transmitting the waveform back to the CPLD for confirmation through a switched path, and if the CPLD does not receive the waveform sent by the CPLD after switching again, indicating that the path switching is incomplete or the trusted platform module is possibly not installed, alarming and recording through a substrate management controller; and after the CPLD confirms that the switching is completed, the CPLD controls the server to start.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. An architecture for implementing automatic switching of trusted platform modules, comprising: the switching device comprises a plurality of chips, a controller and a switching information acquisition unit, wherein the chips are respectively connected with the controller; the connection links of the chips and the controller are respectively provided with corresponding control selection switches; the controller is connected with the switching information acquisition unit through a serial bus.
2. The architecture of claim 1, wherein the chips are two different chips of the trusted platform module, and the two chips are a first chip and a second chip respectively; a first control selection switch is arranged on a connection link of the first chip and the controller; and a second control selection switch is arranged on a connection link of the second chip and the controller.
3. The architecture of claim 1, further comprising a baseboard management controller, wherein the controller is connected to the baseboard management controller.
4. A method for realizing automatic switching of a trusted platform module is characterized by comprising the following steps:
reading the information of the switching information acquisition unit;
judging the chips needing to be switched according to the information;
switching to the corresponding chip by controlling the selection switch;
and outputting the waveform to the control selection switch, and transmitting the waveform back to the controller to confirm the completion of switching.
5. The method of claim 4, wherein after the controller confirms that the switch is completed, the method further comprises: the controller controls the server to be started.
6. The method of claim 4, wherein the method further comprises: judging whether the controller confirms that the switching is completed: and if the controller does not receive the returned waveform, alarming and recording through the substrate management controller.
7. The method of claim 4, wherein the method further comprises:
and judging whether the information of the switching information acquisition unit is successfully read, and if not, stopping starting the server and reporting an error.
CN202010444932.0A 2020-05-23 2020-05-23 Device and method for realizing automatic switching of trusted platform module Active CN111694782B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010444932.0A CN111694782B (en) 2020-05-23 2020-05-23 Device and method for realizing automatic switching of trusted platform module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010444932.0A CN111694782B (en) 2020-05-23 2020-05-23 Device and method for realizing automatic switching of trusted platform module

Publications (2)

Publication Number Publication Date
CN111694782A true CN111694782A (en) 2020-09-22
CN111694782B CN111694782B (en) 2022-03-04

Family

ID=72477589

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010444932.0A Active CN111694782B (en) 2020-05-23 2020-05-23 Device and method for realizing automatic switching of trusted platform module

Country Status (1)

Country Link
CN (1) CN111694782B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113094316A (en) * 2021-04-01 2021-07-09 浪潮电子信息产业股份有限公司 Online switching device and method of NCSI (non-volatile memory) signals

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201820230U (en) * 2010-01-22 2011-05-04 华北计算技术研究所 Computer and trusted-computing trusted root equipment for same
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN104254986A (en) * 2012-02-10 2014-12-31 日本电信电话株式会社 Wavelength selection switch system and method for controlling wavelength selection switch
CN204203971U (en) * 2014-10-13 2015-03-11 长城信息产业股份有限公司 A kind of credible accounting system
US20150281237A1 (en) * 2014-03-25 2015-10-01 Robert C. Swanson Multinode hubs for trusted computing
CN105302759A (en) * 2015-10-29 2016-02-03 青岛海尔智能家电科技有限公司 Automatic switching circuit device and method of 485 communication chip transmitting and receiving data
CN105912488A (en) * 2016-05-20 2016-08-31 英业达科技有限公司 Computer apparatus and control method therefor
CN206649517U (en) * 2017-03-28 2017-11-17 华大半导体有限公司 Server credible platform measures control system and the server including the system
CN207182262U (en) * 2017-09-08 2018-04-03 郑州云海信息技术有限公司 A kind of more CPLD selectively burnings frameworks based on BMC controls
CN107925481A (en) * 2015-12-21 2018-04-17 三菱电机株式会社 Light relay device, control method and optical transmission system
US20180157484A1 (en) * 2016-12-06 2018-06-07 Inventec (Pudong) Technology Corp. Firmware update method and system
CN108984354A (en) * 2018-06-27 2018-12-11 郑州云海信息技术有限公司 A kind of server chips debug circuit, adjustment method and server
CN109508279A (en) * 2018-11-28 2019-03-22 郑州云海信息技术有限公司 A kind of server monitoring device, method and its system
CN110032399A (en) * 2019-04-15 2019-07-19 苏州浪潮智能科技有限公司 A kind of TPM initial method and relevant apparatus
CN111090539A (en) * 2019-10-30 2020-05-01 苏州浪潮智能科技有限公司 Dual-flash-memory self-repairing method and device based on CPLD
CN111143256A (en) * 2019-11-29 2020-05-12 苏州浪潮智能科技有限公司 Method and device for reading field replaceable unit information

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201820230U (en) * 2010-01-22 2011-05-04 华北计算技术研究所 Computer and trusted-computing trusted root equipment for same
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN104254986A (en) * 2012-02-10 2014-12-31 日本电信电话株式会社 Wavelength selection switch system and method for controlling wavelength selection switch
US20150281237A1 (en) * 2014-03-25 2015-10-01 Robert C. Swanson Multinode hubs for trusted computing
CN204203971U (en) * 2014-10-13 2015-03-11 长城信息产业股份有限公司 A kind of credible accounting system
CN105302759A (en) * 2015-10-29 2016-02-03 青岛海尔智能家电科技有限公司 Automatic switching circuit device and method of 485 communication chip transmitting and receiving data
CN107925481A (en) * 2015-12-21 2018-04-17 三菱电机株式会社 Light relay device, control method and optical transmission system
CN105912488A (en) * 2016-05-20 2016-08-31 英业达科技有限公司 Computer apparatus and control method therefor
US20180157484A1 (en) * 2016-12-06 2018-06-07 Inventec (Pudong) Technology Corp. Firmware update method and system
CN206649517U (en) * 2017-03-28 2017-11-17 华大半导体有限公司 Server credible platform measures control system and the server including the system
CN207182262U (en) * 2017-09-08 2018-04-03 郑州云海信息技术有限公司 A kind of more CPLD selectively burnings frameworks based on BMC controls
CN108984354A (en) * 2018-06-27 2018-12-11 郑州云海信息技术有限公司 A kind of server chips debug circuit, adjustment method and server
CN109508279A (en) * 2018-11-28 2019-03-22 郑州云海信息技术有限公司 A kind of server monitoring device, method and its system
CN110032399A (en) * 2019-04-15 2019-07-19 苏州浪潮智能科技有限公司 A kind of TPM initial method and relevant apparatus
CN111090539A (en) * 2019-10-30 2020-05-01 苏州浪潮智能科技有限公司 Dual-flash-memory self-repairing method and device based on CPLD
CN111143256A (en) * 2019-11-29 2020-05-12 苏州浪潮智能科技有限公司 Method and device for reading field replaceable unit information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113094316A (en) * 2021-04-01 2021-07-09 浪潮电子信息产业股份有限公司 Online switching device and method of NCSI (non-volatile memory) signals

Also Published As

Publication number Publication date
CN111694782B (en) 2022-03-04

Similar Documents

Publication Publication Date Title
US7844768B2 (en) Blade server system and method of managing same
US7317620B2 (en) LCD panel for a server system
US7685348B2 (en) Dedicated server management card with hot swap functionality
US7395323B2 (en) System and method for providing network address information in a server system
US7263620B2 (en) System and method for graceful shutdown of host processor cards in a server system
CN111694782B (en) Device and method for realizing automatic switching of trusted platform module
CN101494564B (en) Apparatus for monitoring power supply and method for implementing veneer thermal backup
US20030033466A1 (en) Server system with multiple management user interfaces
US7103654B2 (en) Server system with segregated management LAN and payload LAN
WO2009052741A1 (en) A micro telecommunications computing architecture system and a method for reliability management thereof
CN113076210B (en) Server fault diagnosis result notification method, system, terminal and storage medium
CN107544883B (en) Diagnostic device, system and method of server
RU2434281C2 (en) Method, module and system for protection at start-up
CN109032867A (en) A kind of method for diagnosing faults, device and equipment
CN117472625A (en) Method and device for determining abnormal information of PCIE link
CN101894091B (en) Method and system for single board I2C expansion and ID check
Cisco Troubleshooting the Initial Hardware Configuration
Cisco Troubleshooting
Cisco Troubleshooting the Initial Hardware Configuration
Cisco Troubleshooting the Initial Hardware Configuration
Cisco Troubleshooting the Initial Hardware Configuration
Cisco Troubleshooting the Initial Hardware Configuration
Cisco Troubleshooting the Initial Hardware Configuration
CN2566367Y (en) Storage device for monitoring information of servicer monitor system
CN108243358A (en) Pluggable business board

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant