[go: up one dir, main page]

TWI403895B - Automatic testing system and a method of computer therefore - Google Patents

Automatic testing system and a method of computer therefore Download PDF

Info

Publication number
TWI403895B
TWI403895B TW98120745A TW98120745A TWI403895B TW I403895 B TWI403895 B TW I403895B TW 98120745 A TW98120745 A TW 98120745A TW 98120745 A TW98120745 A TW 98120745A TW I403895 B TWI403895 B TW I403895B
Authority
TW
Taiwan
Prior art keywords
computer
tested
information
hardware
automatic test
Prior art date
Application number
TW98120745A
Other languages
Chinese (zh)
Other versions
TW201101023A (en
Inventor
Liang Zhao
Tom Chen
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to TW98120745A priority Critical patent/TWI403895B/en
Publication of TW201101023A publication Critical patent/TW201101023A/en
Application granted granted Critical
Publication of TWI403895B publication Critical patent/TWI403895B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A automatic testing system and a method of computer therefore, checking the computer whether acknowledge or not according to the a software and a hardware, and performing corresponded a testing means. The automatic testing system comprises of a computer and a testing means. The computer has a collection information means, utilizes to correct the hardware information and the software information of the computer for generating a acknowledge information. A trust platform module performs a encryption means for the acknowledge information, and generating a encryption information. The checking device couples to the computer. The checking device searches a device lookup table according to the encryption information. The checking device utilizes to check the identify of the computer, and performing the testing means for the computer.

Description

計算機的自動測試系統及其測試方法Computer automatic test system and test method thereof

一種計算機的自動測試系統及其方法,特別有關於一種利用信賴平台模組用以對計算機的自動測試系統及其方法。A computer automatic test system and method thereof, in particular to an automatic test system and method for using a trusted platform module for a computer.

隨著計算機的普及,許多廠商也趁勢推出許多相應的產品。在每一項產品中包括有許多不同的硬體元件(例如:中央處理器、記憶體晶片、北橋晶片組、南橋晶片組、顯示晶片、儲存裝置或網路晶片),若是對於各項硬體元件一一進行檢測的話,對於廠商而言是一項沈重的負擔。而且在產線的安裝過程中,計算機會因為未安裝硬體元件的驅動程序或是該項硬體元件被禁能(disable)等因素,進而造成無法通過檢測。With the popularity of computers, many manufacturers are also launching many corresponding products. Each product includes many different hardware components (such as: central processing unit, memory chip, north bridge chipset, south bridge chipset, display chip, storage device or network chip), if it is for various hardware It is a heavy burden for the manufacturer to check the components one by one. Moreover, during the installation process of the production line, the computer may fail to pass the detection because the driver of the hardware component is not installed or the hardware component is disabled.

目前廠商的檢測程序大多是透過計算機的識別資料(例如,系統編號(System ID)或子系統編號(Subsystem ID))來進行檢測。這些識別資料都是儲存在計算機的基本輸入輸出系統中。因此,有心人士可以通過修改基本輸入輸出系統的識別資料來騙過檢測程序,藉以進行其他的程序(例如,安裝後門、破壞系統或植入木馬)。若是公司內部的檢測軟件外流,則有心人士可以通過修改此一檢測軟件來對不同廠商的計算機進行檢測。At present, most of the manufacturer's testing procedures are detected by computer identification data (for example, System ID or Subsystem ID). These identification materials are stored in the basic input and output system of the computer. Therefore, people who are interested can deceive the detection program by modifying the identification data of the basic input/output system, thereby performing other procedures (for example, installing a back door, destroying the system, or implanting a Trojan). If the company's internal inspection software is outflowing, then people who are interested can modify the computer of different manufacturers by modifying this detection software.

鑒於以上的問題,本發明的主要目的在於提供一種計算機的自動測試系統,其係根據計算機所連接的各項硬體元件用以驗證計算機是否合法,並對合法的計算機進行相應的檢測程序。In view of the above problems, the main object of the present invention is to provide an automatic test system for a computer, which is used to verify whether a computer is legal according to various hardware components connected to a computer, and to perform a corresponding detection procedure on a legitimate computer.

為達上述目的,本發明所揭露之計算機的自動測試系統包括:待測計算機與檢測裝置。在待測計算機中包含:至少一硬體元件與信賴平台模組;在每一硬體元件中皆具有一組設備資訊;信賴平台模組係電性連接於硬體元件,信賴平台模組收集設備資訊生成認證資訊,信賴平台模組對認證資訊進行加密程序,藉以產生已加密資訊;檢測裝置係連接於待測計算機,檢測裝置根據已加密資訊查找裝置查找表,藉以查找出符合待測計算機的檢測程序,並向該待測計算機執行檢測程序。To achieve the above objective, an automatic test system for a computer disclosed by the present invention includes: a computer to be tested and a detecting device. The computer to be tested includes: at least one hardware component and a trusted platform module; each device has a set of device information in each hardware component; the trusted platform module is electrically connected to the hardware component, and the platform module is trusted to collect The device information generates the authentication information, and the platform module trusts the authentication information to encrypt the program, so as to generate the encrypted information; the detecting device is connected to the computer to be tested, and the detecting device searches the device according to the encrypted information to find the matching computer. And the detection program is executed to the computer to be tested.

從本發明的另一觀點,本發明提出一種計算機的自動測試方法,其係根據計算機所連接的各項硬體元件用以驗證計算機是否合法,並對合法的計算機進行相應的檢測程序。From another aspect of the present invention, the present invention provides an automatic test method for a computer, which is based on various hardware components connected to a computer for verifying whether a computer is legal and performing a corresponding detection procedure on a legitimate computer.

為達上述目的,本發明所揭露之一種計算機的自動測試方法包括下列步驟:啟動待測計算機的信賴平台模組;由信賴平台模組取得待測計算機的硬體元件的設備資訊;根據設備資訊產生已加密資訊;查找檢測裝置的裝置查找表,判斷裝置查找表中是否包含有已加密資訊;若裝置查找表中包含有已加密資訊,則檢測裝置向待測計算機執行檢測程序。To achieve the above objective, an automatic test method for a computer disclosed by the present invention includes the following steps: starting a trusted platform module of a computer to be tested; obtaining device information of a hardware component of the computer to be tested by the trusted platform module; The encrypted information is generated; the device lookup table of the detecting device is searched to determine whether the device lookup table contains the encrypted information; and if the device lookup table contains the encrypted information, the detecting device executes the detecting program to the computer to be tested.

本發明提供了一種自動驗證與測試的系統及其方法。使得待檢測的計算機可以在不需安裝硬體元件的驅動程序之情況下,檢測裝置可以對待測計算機進行驗證。並且檢測裝置所運行的檢測程序可以達到完全保密的要求。就算有其他廠商取得此一檢測程序,但是沒有其相應的硬體架構,其他廠商仍無法啟動該檢測程序。有關本發明的特徵與實作,茲配合圖示作最佳實施例詳細說明如下。The present invention provides a system and method for automatic verification and testing. The detection device can verify the computer to be tested without causing the driver of the hardware component to be installed. And the detection program run by the detection device can achieve the requirement of complete confidentiality. Even if other vendors get this test, but there is no corresponding hardware architecture, other vendors still can't start the test. The features and implementations of the present invention are described in detail below with reference to the preferred embodiments.

請參考「第1圖」所示,其係為本發明之架構示意圖。在本發明之計算機的自動測試系統100包括:檢測裝置110與待測計算機120。檢測裝置110中包括有運算單元111與儲存單元112。儲存單元112用以儲存每一待測計算機120的裝置查找表113與檢測程序114。裝置查找表113則是記錄不同型號計算機的已加密資訊。其中,已加密資訊的取得可以由廠商產生後,再另行記錄的(其產生過程請參見後文)。檢測裝置110可以是內建於待測計算機120中,也可以利用獨立的一台計算機所實現。若檢測裝置110為獨利的計算機時,檢測裝置110可以透過網路(network)或排線的方式電性連結至待測計算機120。Please refer to "Figure 1" for a schematic diagram of the architecture of the present invention. The automatic test system 100 of the computer of the present invention includes a detecting device 110 and a computer to be tested 120. The detecting device 110 includes an arithmetic unit 111 and a storage unit 112. The storage unit 112 is configured to store the device lookup table 113 and the detection program 114 of each computer 120 to be tested. The device lookup table 113 is to record encrypted information of different types of computers. Among them, the acquisition of the encrypted information can be generated by the manufacturer and then recorded separately (for the generation process, please refer to the following). The detecting device 110 may be built in the computer to be tested 120 or may be implemented by using a separate computer. If the detecting device 110 is a computer with a single profit, the detecting device 110 can be electrically connected to the computer 120 to be tested through a network or a cable.

待測計算機120的種類可以是筆記型電腦、個人電腦或伺服器。在待測計算機120中包含至少一硬體元件121、加密程序122、軟體和硬體資訊收集程序123與信賴平台模組124。其中,硬體元件121可以是中央處理器、記憶體、南橋晶片、北橋晶片、顯示晶片組、音效晶片組、或網路晶片組。在每一個硬體元件121中具有一設備資訊,在設備資訊中更包括有硬體資訊與相應的軟體資訊。硬體資訊可以是全域唯一識別項(Global Unique Identifier,GUID)。而軟體資訊則是相應硬體的驅動程式或韌體版本。待測計算機120在運行軟體和硬體資訊收集程序123時,會收集待測計算機120所有連結的硬體元件121的軟體和硬體資訊,並根據所有的設備資訊產生為一認證資訊。The type of computer 120 to be tested may be a notebook computer, a personal computer or a server. The computer under test 120 includes at least one hardware component 121, an encryption program 122, a software and hardware information collection program 123, and a trust platform module 124. The hardware component 121 can be a central processing unit, a memory, a south bridge wafer, a north bridge wafer, a display chip group, a sound effect chip set, or a network chip set. Each piece of hardware component 121 has a device information, and the device information further includes hardware information and corresponding software information. The hardware information can be a Global Unique Identifier (GUID). The software information is the driver or firmware version of the corresponding hardware. When the software to be tested 120 runs the software and hardware information collecting program 123, the software and hardware information of all the connected hardware components 121 of the computer 120 to be tested are collected, and generated as one authentication information according to all the device information.

而信賴平台模組124(Trusted Platform Module)晶片是一種微晶片,其設計用意在於提供基本的安全性相關功能(主要與加密金鑰有關)。信賴平台模組124通常是安裝在電腦的主機板上,並且使用硬體匯流排與其他系統通訊。具有信賴平台模組124的電腦可以建立加密編譯金鑰及加密,而且只有信賴平台模組124能解密這些金鑰。這個處理程序通常稱為包裝金鑰,可避免金鑰洩露。每一個信賴平台模組124都具有一個主要包裝金鑰,儲存在該信賴平台模組124自身內部。信賴平台模組124中建立之金鑰的私密部分絕不會向其他任何元件、軟體、處理程序或個人公開。納入信賴平台模組124的電腦也可以建立一個包裝的金鑰,並讓該金鑰連結到特定的平台測量。惟有在建立金鑰時,那些平台測量已有相同的值,才能解除包裝此類金鑰。此處理程序稱為向信賴平台模組124進行密封金鑰的處理。而解密金鑰的處理過程則稱為拆封。信賴平台模組124也能密封和拆封在信賴平台模組124外所產生的資料。The Trusted Platform Module (124) chip is a microchip designed to provide basic security-related functions (mainly related to encryption keys). The trusted platform module 124 is typically mounted on the motherboard of the computer and communicates with other systems using a hardware bus. The computer with the trusted platform module 124 can establish an encrypted compilation key and encryption, and only the trusted platform module 124 can decrypt the keys. This handler is often referred to as a wrapper key to avoid key leaks. Each trusted platform module 124 has a primary package key stored in the trusted platform module 124 itself. The private portion of the key established in the trusted platform module 124 is never disclosed to any other component, software, handler, or individual. The computer incorporated into the Trusted Platform Module 124 can also create a packaged key and link the key to a particular platform measurement. Only when the key is established, those platforms measure the same value to unpack the key. This processing procedure is referred to as processing of the seal key to the trusted platform module 124. The process of decrypting the key is called unpacking. The trusted platform module 124 can also seal and unpack the data generated outside of the trusted platform module 124.

因此,在待測計算機120會透過信賴平台模組124對認證資訊進行加密程序122,為更進一步解釋本發明的運作流程,還請配合「第2圖」所示。本發明的此一實施態樣係包括以下步驟:步驟S210:將檢測裝置連接於待測計算機;步驟S220:待測計算機執行一軟體和硬體資訊收集程序,透過信賴平台模組收集待測計算機的硬體及相應的軟體資訊,生成一認證資訊;步驟S230:待測計算機執行一加密程序,用以將認證資訊轉換為已加密資訊;步驟S240:查找檢測裝置的裝置查找表,判斷裝置查找表中是否包含有已加密資訊;步驟S250:若裝置查找表中包含有已加密資訊,則檢測裝置向待測計算機執行檢測程序;以及步驟S260:若裝置查找表中不具有已加密資訊,則檢測裝置直接結束驗證程序。Therefore, the computer to be tested 120 encrypts the authentication information through the trusted platform module 124. To further explain the operational flow of the present invention, please also refer to "Figure 2". The embodiment of the present invention includes the following steps: Step S210: connecting the detecting device to the computer to be tested; Step S220: The computer to be tested executes a software and hardware information collecting program, and collects the computer to be tested through the trusted platform module. And the corresponding software information, generating an authentication information; step S230: the computer to be tested performs an encryption process for converting the authentication information into the encrypted information; step S240: searching the device lookup table of the detecting device, determining the device searching Whether the encrypted information is included in the table; step S250: if the device lookup table contains the encrypted information, the detecting device executes the detecting program to the computer to be tested; and step S260: if the device lookup table does not have the encrypted information, The detection device directly ends the verification process.

當檢測裝置110與待測計算機120連接完成後,檢測裝置110會開始對待測計算機120進行驗證。待測計算機120會擷取所連結的各項硬體元件121的設備資訊。設備資訊的擷取可以在待測計算機120於過電自檢(Power-On Self-Test,POST)過的過程中透過基本輸入輸出系統(Basic Input/Output System,BIOS)對各項硬體元件121擷取硬體資訊,並且待測計算機120在開機完成後,再透過作業系統向各硬體元件121擷取軟體資訊。When the connection between the detecting device 110 and the computer to be tested 120 is completed, the detecting device 110 starts to verify the computer 120 to be tested. The computer to be tested 120 retrieves the device information of the connected hardware components 121. The device information can be retrieved through the Basic Input/Output System (BIOS) to the hardware components during the Power-On Self-Test (POST) process of the computer under test 120. 121 captures the hardware information, and the computer to be tested 120 retrieves the software information from each hardware component 121 through the operating system after the booting is completed.

待測計算機120會透過信賴平台模組124向認證資訊進行加密程序122,藉以產生一已加密資訊。其中,加密程序122係為RSA(Rivest Shamir Adleman)加密程序、先進加密標準(Advanced Encryption Standard,AES)程序或橢圓加密程序。待測計算機120再將已加密資訊傳送至檢測裝置110。The computer under test 120 performs an encryption process 122 on the authentication information through the trusted platform module 124 to generate an encrypted information. The encryption program 122 is an RSA (Rivest Shamir Adleman) encryption program, an Advanced Encryption Standard (AES) program, or an elliptical encryption program. The computer under test 120 then transmits the encrypted information to the detecting device 110.

接著,檢測裝置110會將所接收的已加密資訊與在裝置查找表113中的已加密資訊逐一進行比對,判斷裝置查找表113中是否包含有已加密資訊。由於信賴平台模組124所產生的已加密資訊是不可逆資訊,所以每一種相同型號的待測計算機120所產生的已加密資訊也是唯一的。Next, the detecting device 110 compares the received encrypted information with the encrypted information in the device lookup table 113 one by one, and determines whether the device lookup table 113 contains the encrypted information. Since the encrypted information generated by the trusted platform module 124 is irreversible information, the encrypted information generated by each computer 120 of the same model to be tested is unique.

若裝置查找表113中存在有待檢測計算機的已加密資訊時,則檢測裝置110會選擇相應於待測計算機120的檢測程序114,並進行後續的測試。若裝置查找表113中沒有該筆已加密資訊,則代表待測計算機120並非合法的計算機。因此檢測裝置110就不會對待測計算機120進行檢測程序114。If there is encrypted information of the computer to be detected in the device lookup table 113, the detecting device 110 selects the detection program 114 corresponding to the computer 120 to be tested and performs subsequent testing. If the device has no encrypted information in the device lookup table 113, it means that the computer 120 to be tested is not a legitimate computer. Therefore, the detecting device 110 does not perform the detecting program 114 on the computer 120 to be tested.

為能清楚的說明本發明之精神,係以下述例子作為說明。請參考「第3圖」所示,其係為待測計算機120中硬體元件121示意圖。並以待測計算機120的中央處理器、記憶體與硬式磁碟機產生已加密資訊為例。In order to clearly illustrate the spirit of the present invention, the following examples are taken as an illustration. Please refer to FIG. 3, which is a schematic diagram of the hardware component 121 in the computer 120 to be tested. For example, the encrypted information is generated by the central processing unit of the computer 120 to be tested, the memory and the hard disk drive.

首先,將待測計算機120啟動。並且待測計算機120再進行過電自檢時擷取中央處理器、記憶體與硬式磁碟機的設備資訊。舉例來說,中央處理器的設備資訊係分別為:Brand ID、浮點運算單元(floating-point unit,FPU)、超線程技術、SSE2、SSE3、EM64T技術、外頻、前端序列匯流排(Frontier Serial Bus,FSB)、處理器速度、L1、L2和L3 Cache的容量、Processor ID、CPU Vendor ID、CPU Family Level、CPU Stepping Level、與CPU Model Level。而記憶體則是包括有下欄位的設備資訊:容量、Bank Label、Form Factor、速度、Module Name、Memory Type、Module Width、Serial Number、Module Voltage、Manufacture Name與Manufacture Date。而硬式磁碟機的設備資訊則是包括有:製造廠商、總磁柱、磁軌、磁區與容量。First, the computer 120 to be tested is started. And the computer 120 to be tested further retrieves the device information of the central processing unit, the memory and the hard disk drive when performing the power self-test. For example, the device information of the central processing unit is: Brand ID, floating-point unit (FPU), Hyper-Threading Technology, SSE2, SSE3, EM64T technology, FSB, front-end sequence bus (Frontier Serial Bus, FSB), processor speed, L1, L2, and L3 Cache capacity, Processor ID, CPU Vendor ID, CPU Family Level, CPU Stepping Level, and CPU Model Level. The memory is the device information including the lower field: Capacity, Bank Label, Form Factor, Speed, Module Name, Memory Type, Module Width, Serial Number, Module Voltage, Manufacture Name and Manufacture Date. The device information of the hard disk drive includes: manufacturer, total magnetic column, magnetic track, magnetic area and capacity.

接著,待測計算機120的信賴平台模組124會將上述設備資訊進行加密程序122,並生成相應該待測計算機120的一組已加密資訊。另外,在檢測裝置110中亦儲存有若干筆已加密資訊,每一筆已加密資訊係對應同一型號的計算機。由於信賴平台模組124所產生的已加密資訊是不可逆資訊,所以光從檢測裝置110中的已加密資訊是無法推知由哪些硬體元件121所構成的。最後,當檢測裝置110通過待測計算機120的驗證後,檢測裝置110才會開始對待測計算機120進行檢測程序114。Then, the trusted platform module 124 of the computer 120 to be tested performs the encryption process 122 on the device information, and generates a set of encrypted information corresponding to the computer 120 to be tested. In addition, a plurality of pieces of encrypted information are also stored in the detecting device 110, and each piece of encrypted information corresponds to a computer of the same model. Since the encrypted information generated by the trusted platform module 124 is irreversible information, the encrypted information in the light detecting device 110 cannot be inferred from which hardware components 121. Finally, when the detecting device 110 passes the verification of the computer 120 to be tested, the detecting device 110 starts the detecting process 114 for the computer 120 to be tested.

本發明提供了一種自動驗證與測試的系統及其方法。使得待檢測的計算機可以在不需安裝硬體元件121的驅動程序之情況下,檢測裝置110可以對待測計算機120進行驗證。並且檢測裝置110所運行的檢測程序114可以達到完全保密的要求。就算有其他廠商取得此一檢測程序114,但是沒有其相應的硬體架構,其他廠商仍無法啟動該檢測程序114。The present invention provides a system and method for automatic verification and testing. The detecting device 110 can verify the computer 120 to be tested without causing the driver of the hardware component 121 to be installed. And the detection program 114 run by the detection device 110 can reach the requirement of complete confidentiality. Even if another manufacturer obtains this detection program 114, but does not have its corresponding hardware architecture, other vendors still cannot start the detection program 114.

雖然本發明以前述之較佳實施例揭露如上,然其並非用以限定本發明,任何熟習相像技藝者,在不脫離本發明之精神和範圍內,當可作些許之更動與潤飾,因此本發明之專利保護範圍須視本說明書所附之申請專利範圍所界定者為準。While the present invention has been described above in terms of the preferred embodiments thereof, it is not intended to limit the invention, and the invention may be modified and modified without departing from the spirit and scope of the invention. The patent protection scope of the invention is subject to the definition of the scope of the patent application attached to the specification.

100‧‧‧自動測試系統100‧‧‧Automatic test system

110‧‧‧檢測裝置110‧‧‧Detection device

111‧‧‧運算單元111‧‧‧ arithmetic unit

112‧‧‧儲存單元112‧‧‧storage unit

113‧‧‧裝置查找表113‧‧‧Device lookup table

114‧‧‧檢測程序114‧‧‧Test procedures

120‧‧‧待測計算機120‧‧‧Computer under test

121‧‧‧硬體元件121‧‧‧ hardware components

122‧‧‧加密程序122‧‧‧Encryption procedures

123‧‧‧軟體和硬體資訊收集程序123‧‧‧Software and hardware information collection procedures

124‧‧‧信賴平台模組124‧‧‧trust platform module

第1圖係為本發明的架構示意圖。Figure 1 is a schematic diagram of the architecture of the present invention.

第2圖係為本發明的運作流程示意圖。Figure 2 is a schematic diagram of the operational flow of the present invention.

第3圖係為本發明的待測計算機中硬體元件示意圖。Figure 3 is a schematic view of the hardware components of the computer to be tested of the present invention.

Claims (10)

一種計算機的自動測試系統,其係根據一待測計算機所連接的一硬體元件之一設備資訊,用以驗證該待測計算機是否合法,並對合法的該待測計算機進行相應的檢測,該測試系統包括:一信賴平台模組,係運行於該待測計算機中,該待測計算機內建有一軟體和硬體資訊收集程序,用以收集該待測計算機的硬體及相應的軟體資訊生成一認證資訊,該信賴平台模組再對該認證資訊進行一加密程序,產生一已加密資訊;以及一檢測裝置,其係連接於該待測計算機,該檢測裝置根據該已加密資訊查找一裝置查找表,該檢測裝置用以對該待測計算機進行身分驗證,並對通過身分驗證的該待測計算機執行一檢測程序。 An automatic test system for a computer, which is based on device information of a hardware component connected to a computer to be tested, to verify whether the computer to be tested is legal, and to perform corresponding detection on the legal computer to be tested. The test system comprises: a trusted platform module, which is run in the computer to be tested, and the software to be tested has a software and hardware information collecting program for collecting the hardware of the computer to be tested and the corresponding software information generation. a certification information, the trusted platform module performs an encryption process on the authentication information to generate an encrypted information; and a detecting device connected to the computer to be tested, the detecting device searching for a device according to the encrypted information The detecting device is configured to perform identity verification on the computer to be tested, and perform a detection procedure on the computer to be tested verified by the identity. 如請求項1所述之計算機的自動測試系統,其中該設備資訊包括有一軟體資訊與一硬體資訊。 The automatic test system of the computer of claim 1, wherein the device information includes a software information and a hardware information. 如請求項2所述之計算機的自動測試系統,其中該硬體資訊係為一全域唯一識別項(Global Unique Identifier,GUID)。 The automatic test system of the computer of claim 2, wherein the hardware information is a Global Unique Identifier (GUID). 如請求項1所述之計算機的自動測試系統,其中該待測計算機係包括一筆記型電腦、一個人電腦或一伺服器。 The automatic test system of the computer of claim 1, wherein the computer to be tested comprises a notebook computer, a personal computer or a server. 如請求項1所述之計算機的自動測試系統,其中該硬體元件係包括一中央處理器、一記憶體、一南橋晶片、一北橋晶片、一顯示晶片組、一音效晶片組、或一網路晶片組。 The automatic test system of the computer of claim 1, wherein the hardware component comprises a central processing unit, a memory, a south bridge chip, a north bridge chip, a display chip group, an audio chip set, or a network. Road chip set. 如請求項1所述之計算機的自動測試系統,其中該待測計算機 透過一基本輸入輸出系統向該硬體元件擷取所屬的該設備資訊。 The automatic test system of the computer of claim 1, wherein the computer to be tested The device information is retrieved from the hardware component through a basic input/output system. 如請求項1所述之計算機的自動測試系統,其中該檢測裝置另包括一儲存單元,該儲存單元用以儲存每一該待測計算機的該已加密資訊、該裝置查找表與該些檢測程序。 The automatic test system of the computer of claim 1, wherein the detecting device further comprises a storage unit, wherein the storage unit is configured to store the encrypted information of each computer to be tested, the device lookup table and the detection programs. . 一種計算機的自動測試方法,其係根據一待測計算機所連接的硬體元件之一設備資訊,用以驗證該待測計算機是否合法,並對合法的該待測計算機進行相應的一檢測程序,該測試方法包括:透過該待測計算機的一信賴平台模組取得該待測計算機的一硬體元件的一硬體資訊及相應的一軟體資訊,藉以產生一已加密資訊;查找一檢測裝置的一裝置查找表,判斷該裝置查找表中是否包含有該已加密資訊;以及若該裝置查找表中包含有該已加密資訊,則該檢測裝置向該待測計算機執行該檢測程序。 An automatic test method for a computer, which is based on device information of a hardware component connected to a computer to be tested, to verify whether the computer to be tested is legal, and performs a corresponding detection procedure on the legal computer to be tested. The test method includes: obtaining a piece of hardware information and a corresponding piece of software information of a hardware component of the computer to be tested through a trusted platform module of the computer to be tested, thereby generating an encrypted information; and searching for a detecting device A device lookup table determines whether the encrypted lookup information is included in the device lookup table; and if the device lookup table includes the encrypted information, the detecting device executes the detection procedure to the computer to be tested. 如請求項8所述之計算機的自動測試方法,其中該待測計算機在過電自檢過程中對該些硬體元件進行收集該設備資訊。 The automatic test method of the computer of claim 8, wherein the computer to be tested collects the device information for the hardware components during the over-power self-test. 如請求項8所述之計算機的自動測試方法,其中該待測計算機透過一作業系統(Operation System)向該些硬體元件擷取所屬的該設備資訊。The method of claim 8, wherein the computer to be tested retrieves the device information from the hardware components through an operation system.
TW98120745A 2009-06-19 2009-06-19 Automatic testing system and a method of computer therefore TWI403895B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW98120745A TWI403895B (en) 2009-06-19 2009-06-19 Automatic testing system and a method of computer therefore

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW98120745A TWI403895B (en) 2009-06-19 2009-06-19 Automatic testing system and a method of computer therefore

Publications (2)

Publication Number Publication Date
TW201101023A TW201101023A (en) 2011-01-01
TWI403895B true TWI403895B (en) 2013-08-01

Family

ID=44836839

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98120745A TWI403895B (en) 2009-06-19 2009-06-19 Automatic testing system and a method of computer therefore

Country Status (1)

Country Link
TW (1) TWI403895B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319516A (en) * 2017-12-28 2018-07-24 上海科梁信息工程股份有限公司 A kind of test system and test method

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9509502B2 (en) * 2014-03-13 2016-11-29 Intel Corporation Symmetric keying and chain of trust
TWI590152B (en) * 2016-05-27 2017-07-01 緯創資通股份有限公司 Testing method for electronic device
US10122686B2 (en) 2016-10-03 2018-11-06 Mediatek Inc. Method of building a firewall for networked devices

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060020781A1 (en) * 2004-06-24 2006-01-26 Scarlata Vincent R Method and apparatus for providing secure virtualization of a trusted platform module
TW200805970A (en) * 2005-10-27 2008-01-16 Ibm Method and apparatus for super secure network authentication
CN101247399A (en) * 2007-02-14 2008-08-20 株式会社日立制作所 Information processing system and remote access method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060020781A1 (en) * 2004-06-24 2006-01-26 Scarlata Vincent R Method and apparatus for providing secure virtualization of a trusted platform module
TW200805970A (en) * 2005-10-27 2008-01-16 Ibm Method and apparatus for super secure network authentication
CN101247399A (en) * 2007-02-14 2008-08-20 株式会社日立制作所 Information processing system and remote access method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319516A (en) * 2017-12-28 2018-07-24 上海科梁信息工程股份有限公司 A kind of test system and test method

Also Published As

Publication number Publication date
TW201101023A (en) 2011-01-01

Similar Documents

Publication Publication Date Title
US8127146B2 (en) Transparent trust validation of an unknown platform
US10878097B2 (en) BIOS flashing method and BIOS image file processing method
US8209542B2 (en) Methods and apparatus for authenticating components of processing systems
KR101662618B1 (en) Measuring platform components with a single trusted platform module
JP4855679B2 (en) Encapsulation of reliable platform module functions by TCPA inside server management coprocessor subsystem
KR101402542B1 (en) Persistent security system and method
US8433924B2 (en) Apparatus, system, and method for authentication of a core root of trust measurement chain
US8756414B2 (en) Information processing apparatus, software verification method, and software verification program
US20190035201A1 (en) Method and apparatus for establishing trust in smart card readers
KR20110132443A (en) Integrity Verification Using Peripherals
US10346179B2 (en) Information processing apparatus, server apparatus, information processing system, control method, and computer program
CN114021106B (en) Remote authentication method, device and system for credibility measurement
CN113448681B (en) Registration method, equipment and storage medium of virtual machine monitor public key
TWI403895B (en) Automatic testing system and a method of computer therefore
WO2015035843A1 (en) Measurement method, electronic device and measurement system
CN101930389A (en) Automatic test system and method for computer
CN109117643B (en) System processing method and related equipment
Kumar et al. Towards designing a secure RISC-V system-on-chip: ITUS
CN113190880A (en) Determining whether to perform an action on a computing device based on an analysis of endorsement information of a security co-processor
Dave Trusted Building Blocks for Resilient Embedded Systems Design
Sailer et al. The role of TPM in enterprise security
CN112099909B (en) Virtual machine memory measurement method, device, processor chip and system
Ye et al. Runtime hardware security verification using approximate computing: A case study on video motion detection
CN106992860A (en) A detection method of server TPM module
JP2000339153A (en) Program verification method and apparatus, and storage medium storing program verification program

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees