TWI783831B - Processing system and method for verify and management of the firmware - Google Patents
Processing system and method for verify and management of the firmware Download PDFInfo
- Publication number
- TWI783831B TWI783831B TW110148014A TW110148014A TWI783831B TW I783831 B TWI783831 B TW I783831B TW 110148014 A TW110148014 A TW 110148014A TW 110148014 A TW110148014 A TW 110148014A TW I783831 B TWI783831 B TW I783831B
- Authority
- TW
- Taiwan
- Prior art keywords
- file
- server
- information
- verified
- client
- Prior art date
Links
- 238000012545 processing Methods 0.000 title claims abstract description 61
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000012795 verification Methods 0.000 claims description 88
- 230000006854 communication Effects 0.000 claims description 30
- 238000004891 communication Methods 0.000 claims description 29
- 238000012790 confirmation Methods 0.000 claims description 13
- 238000012986 modification Methods 0.000 claims description 10
- 230000004048 modification Effects 0.000 claims description 10
- 238000007726 management method Methods 0.000 claims 14
- 238000010200 validation analysis Methods 0.000 claims 2
- 238000004458 analytical method Methods 0.000 abstract description 2
- 238000003672 processing method Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 9
- 238000004806 packaging method and process Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 4
- 238000012937 correction Methods 0.000 description 3
- 238000005538 encapsulation Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012858 packaging process Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Landscapes
- Computer And Data Communications (AREA)
- Hardware Redundancy (AREA)
Abstract
Description
關於一種檔案的管理系統與方法,特別有關一種伺服器硬體元件的韌體驗證與管理系統與方法。The invention relates to a file management system and method, in particular to a firmware verification and management system and method of server hardware components.
隨著伺服器的快速發展,伺服器的運算能力也大幅的提升。為能確保伺服器運作時的穩定環境,因此伺服器中還需要配置多種相應的硬體元件,例如:感測器(sensor)、風扇或電源供應器等。由於伺服器中的每一種硬體元件都需要韌體(firmware)控制。所以硬體元件的韌體驗證與管理是項重要的課題。With the rapid development of the server, the computing power of the server has also been greatly improved. In order to ensure a stable environment when the server is running, the server also needs to be equipped with a variety of corresponding hardware components, such as sensors, fans, or power supplies. Because each hardware component in the server needs firmware (firmware) control. Therefore, firmware verification and management of hardware components is an important issue.
以風扇為例,由於風扇的控制與基板控制器(Board Management Controller,BMC)相關。因此風扇韌體除了需要韌體工程人員外,也需要由基板控制器的開發人員確認韌體內容。當雙方工程人員確認無誤後,才能開始發佈韌體檔案。由於冗長的溝通過程,可能造成韌體驗證不易,且後續發佈的版本也難以控管。Taking the fan as an example, since the control of the fan is related to a board management controller (Board Management Controller, BMC). Therefore, in addition to firmware engineering personnel, the fan firmware also needs to be confirmed by the development personnel of the baseboard controller to confirm the firmware content. The firmware file can only be released after the engineers of both parties confirm that it is correct. Due to the lengthy communication process, firmware verification may be difficult, and subsequent releases may be difficult to control.
有鑑於此,伺服器元件的韌體驗證與管理的處理系統,提供硬體元件的韌體驗證與發佈版號的相應管理。In view of this, the processing system of firmware verification and management of server components provides firmware verification of hardware components and corresponding management of release version numbers.
在一些實施例中,伺服器元件的韌體驗證與管理的處理系統包括用戶端與伺服器端。用戶端具有待驗證檔案;伺服器端包括通訊單元、儲存單元與處理單元,通訊單元通訊連接於用戶端,通訊單元傳輸待驗證檔案,儲存單元儲存多個硬體功能檔案,處理單元電性連接於通訊單元與儲存單元,處理單元解析待驗證檔案,獲取待驗證檔案的佈建資訊與硬體資訊,通訊單元向用戶端傳輸佈建資訊,用戶端根據佈建資訊回應資訊修正命令,處理單元根據資訊修正命令修改佈建資訊,處理單元根據硬體資訊選擇至少一硬體功能檔案,處理單元將修改後之佈建資訊與受選的至少一硬體功能檔案封裝為目標檔案。伺服器元件的韌體驗證與管理的處理系統提供硬體元件的韌體驗證與版本號碼的相應管理。除了可以降低不同部門的開發人員對於韌體的各自驗證的負擔,也縮短不同部門的來回溝通的成本。更進一步而言,伺服器元件的韌體驗證與管理的處理系統可以對硬體元件的韌體檔案在生成的同時也自動編列相應的版本號碼。In some embodiments, the processing system for firmware verification and management of server components includes a client end and a server end. The client has files to be verified; the server includes a communication unit, a storage unit and a processing unit, the communication unit is connected to the client, the communication unit transmits files to be verified, the storage unit stores multiple hardware function files, and the processing unit is electrically connected Between the communication unit and the storage unit, the processing unit parses the file to be verified, obtains the configuration information and hardware information of the file to be verified, the communication unit transmits the configuration information to the client, and the client responds to the information modification command according to the configuration information, and the processing unit The configuration information is modified according to the information modification command, the processing unit selects at least one hardware function file according to the hardware information, and the processing unit packages the modified configuration information and the selected at least one hardware function file into a target file. The processing system of firmware verification and management of server components provides firmware verification of hardware components and corresponding management of version numbers. In addition to reducing the burden of firmware verification for developers in different departments, it also reduces the cost of back-and-forth communication between different departments. Furthermore, the processing system for verifying and managing the firmware of the server components can automatically compile the corresponding version numbers while generating the firmware files of the hardware components.
在一些實施例中,儲存單元更儲存驗證資訊,處理單元根據驗證資訊檢查佈建資訊的JSON文件格式,獲得文本驗證結果。In some embodiments, the storage unit further stores verification information, and the processing unit checks the JSON file format of the deployment information according to the verification information to obtain a text verification result.
在一些實施例中,伺服器端接收用戶端的確認要求,處理單元根據確認要求將目標檔案變更為已驗證檔案,處理單元將已驗證檔案儲存至儲存單元。In some embodiments, the server receives the confirmation request from the client, the processing unit changes the target file into a verified file according to the confirmation request, and the processing unit stores the verified file in the storage unit.
在一些實施例中,儲存單元包括至少一已驗證檔案,處理單元查找儲存單元中有與修改後之佈建資訊相關連者指定為受選檔案。In some embodiments, the storage unit includes at least one verified file, and the processing unit searches the storage unit for the selected file associated with the modified deployment information.
在一些實施例中,儲存單元更包括輕量目錄存取程序,處理單元執行清量目錄存取程序,用以識別用戶端的登入資訊。In some embodiments, the storage unit further includes a lightweight directory access program, and the processing unit executes the lightweight directory access program to identify the login information of the client.
在一些實施例中,伺服器元件的韌體驗證與管理的處理方法包括由用戶端傳輸待驗證檔案至伺服器端;伺服器端解析待驗證檔案,獲取待驗證檔案的佈建資訊與硬體資訊;伺服器端向用戶端傳輸佈建資訊;用戶端根據佈建資訊回應資訊修正命令;伺服器端根據資訊修正命令修改佈建資訊,且伺服器端根據硬體資訊選擇至少一硬體功能檔案;伺服器端將修改後之佈建資訊與受選的至少一硬體功能檔案封裝為目標檔案。In some embodiments, the processing method of firmware verification and management of server components includes transmitting the file to be verified from the client to the server; the server parses the file to be verified, and obtains the deployment information and hardware of the file to be verified information; the server transmits deployment information to the client; the client responds to an information correction command according to the deployment information; the server modifies the deployment information according to the information correction command, and the server selects at least one hardware function according to the hardware information file; the server side encapsulates the modified deployment information and at least one selected hardware function file into a target file.
在一些實施例中,由用戶端傳輸待驗證檔案至伺服器端的步驟包括:伺服器端接收用戶端的用戶識別要求;伺服器端根據目錄存取程序判斷用戶識別要求是否為正確的用戶端或錯誤的用戶端;若為正確的用戶端,伺服器端傳輸來自於正確的用戶端的待驗證檔案;若為錯誤的用戶端,伺服器端拒絕來自於錯誤的用戶端的待驗證檔案。In some embodiments, the step of transmitting the file to be verified from the client to the server includes: the server receives the user identification request from the client; the server determines whether the user identification request is correct or incorrect according to the directory access procedure If it is a correct client, the server transmits the file to be verified from the correct client; if it is a wrong client, the server rejects the file to be verified from the wrong client.
在一些實施例中,在伺服器端將修改後之佈建資訊與受選的至少一硬體功能檔案封裝為目標檔案的步驟中更包括:伺服器端接收用戶端的確認要求;處理單元根據確認要求將目標檔案變更為已驗證檔案;處理單元將已驗證檔案儲存至儲存單元。In some embodiments, the step of packaging the modified deployment information and the selected at least one hardware function file into a target file at the server side further includes: the server side receives a confirmation request from the client side; the processing unit according to the confirmation Request to change the target file to a verified file; the processing unit stores the verified file to the storage unit.
所述的伺服器元件的韌體驗證與管理的處理系統與方法提供即時的線上驗證韌體於同步管理版本號碼。用戶端僅需要將待驗證檔案上傳至處理系統,處理系統除了確認待驗證檔案的文件格式是否正確外,處理系統也會確認新修改後的內容是否正確。如此一來,使用者不需將待驗證檔案傳輸給不同單位進行驗證。The processing system and method for firmware verification and management of server components provide real-time online verification of firmware and synchronous management of version numbers. The client only needs to upload the file to be verified to the processing system. In addition to confirming whether the file format of the file to be verified is correct, the processing system will also confirm whether the newly modified content is correct. In this way, the user does not need to transmit the file to be verified to different units for verification.
請參考圖1所示,其係為此一實施例的系統架構示意圖。伺服器元件的韌體驗證與管理的處理系統001包括至少一用戶端100與伺服器端200。用戶端100通訊連接於伺服器端200。用戶端100可以是但不限定為個人電腦、筆記型電腦、行動電話、平板電腦或嵌入式系統(Embedded System)等。Please refer to FIG. 1 , which is a schematic diagram of the system architecture of this embodiment. The
用戶端100包括輸入單元110、顯示單元120、第一通訊單元130、第一儲存單元140與第一處理單元150。第一處理單元150電性連接於輸入單元110、顯示單元120、第一通訊單元130與第一儲存單元140。第一儲存單元140儲存操作介面程序141與至少一待驗證檔案310(profile)。所述的待驗證檔案310係為硬體元件的未驗證的韌體檔案。硬體元件可以是但不限定為風扇、散熱器、感測器或通訊匯流排,硬體元件係為伺服器端200中的相關電子元件或設備的統稱。因此在第一儲存單元140可以儲存風扇的待驗證檔案310(fan profile)、散熱器或其硬體元件的待驗證檔案310。The
操作介面程序141用於接收使用者操作時所發出的控制要求或播放韌體檔案的驗證結果。控制要求可能包括選擇檔案、傳輸待驗證檔案310、資訊更新或確認內容等操作。操作介面程序141可以是獨立的應用程序(application),也可以於瀏覽器(browser)之中執行。顯示單元120播放操作介面程序141的操作介面,或顯示來自於伺服器端200的相關資訊。The
伺服器端200包括第二通訊單元210、第二儲存單元220與第二處理單元230。第二處理單元230電性連接於第二通訊單元210與第二儲存單元220。第二通訊單元210通訊連接於用戶端100的第一通訊單元130。第二通訊單元210可以是但不限定為有線網路、無線網路或行動通訊網路等。第二通訊單元210可傳輸待驗證檔案310至第一通訊單元130,或第二通訊單元210接收其他資訊或操作要求。The
第二儲存單元220儲存韌體驗證平台程序231、已驗證檔案232與多個硬體功能檔案233。第二儲存單元220也可以暫時儲存韌體驗證過程中所產生的相關資訊。此外,已驗證檔案232係為待驗證檔案310驗證通過且成功封裝的輸出結果。硬體功能檔案233係為韌體封裝過程中,待驗證檔案310所需要的函數庫或應用程序。對於同一系列的硬體元件而言,不同版本的韌體檔案是可能需要相同的函數庫。在此將待驗證檔案310所需調用的函數庫或應用程序統稱為硬體功能檔案233。The second storage unit 220 stores a firmware
第二處理單元230執行韌體驗證平台程序231。韌體驗證平台程序231除了提供操作介面外,韌體驗證平台程序231也用於解析待驗證檔案310的內容,並根據解析過程分別輸出相應訊息。韌體驗證平台程序231響應於用戶端100的操作介面程序141,使操作介面程序141也提供韌體驗證平台程序231的部分資訊。操作介面除了顯示韌體檔案的相關資訊,也可以接收前述的各項控制要求,並將控制要求回傳至伺服器端200。The
為清楚說明伺服器元件的韌體驗證與管理的處理過程,還請配合圖2A與圖2B所示,其係分別為伺服器元件的韌體驗證與管理的處理流程圖與運作示意圖。 步驟S210:由用戶端傳輸待驗證檔案至伺服器端; 步驟S220:伺服器端解析待驗證檔案,獲取待驗證檔案的佈建資訊與硬體資訊; 步驟S230:伺服器端向用戶端傳輸佈建資訊; 步驟S240:用戶端根據佈建資訊回應資訊修正命令; 步驟S250:伺服器端根據資訊修正命令修改佈建資訊,且伺服器端根據硬體資訊選擇至少一硬體功能檔案; 步驟S260:伺服器端將修改後之佈建資訊與受選的至少一硬體功能檔案封裝為目標檔案。 In order to clearly illustrate the process of firmware verification and management of server components, please also refer to FIG. 2A and FIG. 2B , which are respectively the processing flowchart and operation diagram of firmware verification and management of server components. Step S210: the client transmits the file to be verified to the server; Step S220: the server parses the file to be verified, and obtains the deployment information and hardware information of the file to be verified; Step S230: the server transmits deployment information to the client; Step S240: the client responds to an information modification command according to the deployment information; Step S250: the server side modifies the deployment information according to the information modification command, and the server side selects at least one hardware function file according to the hardware information; Step S260: The server encapsulates the modified deployment information and at least one selected hardware function file into a target file.
首先,用戶端100執行操作介面程序141,並選擇待驗證檔案310。操作介面程序141傳輸待驗證檔案310至伺服器端200。伺服器端200解析待驗證檔案310,並從待驗證檔案310中獲取佈建資訊311(policy)與硬體資訊312,可配合圖2B所示。佈建資訊311係為硬體元件的各項環境設定。例如:佈建資訊311可以是但不限定為維持選項(keep)、刪除選項(delete)、更名選項(rename)、預設選項或規格電力資訊。承如前例,在伺服器端200中具有風扇的硬體元件。因此,佈建資訊中同樣建置風扇的佈建資訊(fan policy)。First, the
一般而言,佈建資訊311於初始獲得時可能未賦予相應的設定值。在另一種情況中,待驗證檔案310係為修改其他已驗證檔案232的結果。因此,佈建資訊311的預設值將會繼承已驗證檔案232的內容。硬體資訊312係為硬體元件的種類、硬體元件的型號、主板型號、平台資訊、專案資訊、主持人資訊或環境設定資訊等。平台資訊係為硬體元件所應用的伺服器機型。專案資訊係為伺服器機型的開發專案。主持人資訊係為開發專案的負責人或主管。環境設定資訊係為硬體元件所適用的環境參數或設定參數等。Generally speaking, the
韌體驗證平台程序231接獲待驗證檔案310,韌體驗證平台程序231將佈建資訊311的各項環境設定傳輸至操作介面程序141。假設硬體元件的硬體資訊312包括「default」、「SPECpower」、「default0823」、「SPECpower0823」與「port 80」,每一各硬體資訊312各自具有相應的佈建資訊311,如圖3A所示,所述選項僅為示意並非限制於此。The firmware
伺服器端200向用戶端100傳輸佈建資訊311的內容,以供用戶端100確認是否對佈建資訊311進行修改。如果佈建資訊311有需要異動,用戶端100根據佈建資訊311向伺服器端200傳輸資訊修正命令,用以修改佈建資訊311的內容。此外,用戶端100若認為佈建資訊311內容無誤時,用戶端100可以向伺服器端200傳輸無修改的資訊修正命令,以使伺服器端200結束佈建資訊311的此一階段的處理,可參考步驟S230與圖2B。The
接著,韌體驗證平台程序231根據硬體資訊312選擇相應的硬體功能檔案233。韌體驗證平台程序231根據受選的硬體功能檔案233與佈建資訊311進行封裝,將封裝結果稱為目標檔案320。第二處理單元230將目標檔案320暫存第二儲存單元220中。韌體驗證平台程序231將封裝結果傳輸至用戶端100,以供用戶端100播放目標檔案320的相應畫面,如圖3B所示。Next, the firmware
在一些實施例中,在第二儲存單元220更包括至少一驗證資訊410。韌體驗證平台程序231根據驗證資訊410對佈建資訊311檢查是否存在JSON(JavaScript Object Notation)文件格式的格式錯誤,並獲得文本驗證結果。驗證資訊410可以是正規式表達(regular expression)所構成的文本檢查結構,如圖3C所示。若文本驗證結果為正確時,伺服器端200將根據待驗證檔案310產生相應的佈建資訊311。伺服器端200向用戶端100發送資訊回報,藉以提示伺服器端200已完成待驗證檔案310的解析處理。若文本驗證結果為錯誤,則伺服器端200也會向用戶端100傳輸資訊回報,藉以提示用戶端100所提供的待驗證檔案310存在格式的錯誤。In some embodiments, the second storage unit 220 further includes at least one
假設硬體元件的佈建資訊311包括「default」、「SPECpower」、「default0823」、「SPECpower0823」與「port 80」,且硬體元件僅需設定「default0823」、「SPECpower0823」與「port 80」等參數。若佈建資訊311的「default」、「SPECpower」、「default0823」、「SPECpower0823」與「port 80」均為「真值」(true)。因此該筆佈建資訊311將會被韌體驗證平台程序231檢測為錯誤。Assume that the
操作介面程序141也可以顯示佈建資訊311的修改頁面。用戶端100可以調整修改頁面中的各選項,如圖3A所示。圖3D與圖3E分別為操作介面程序141所呈現佈建資訊311的示意畫面。圖3D與圖3E係對應於圖3A的底層文件結構。圖3D係為錯誤的佈建資訊311,圖3D中係以勾選表示該參數為真值。圖3E是取消錯誤的參數的佈建資訊311的底層文件結構。The
在一實施例中,第二儲存單元220更包括一版號管理程序420(Stock Keeping Unit,簡稱SKU)。韌體驗證平台程序231於封裝目標檔案320的過程中會調用版號管理程序420。版號管理程序420除了檢查第二儲存單元220中是否儲存與佈建資訊311相關連的已驗證檔案232外,版號管理程序420也可以根據待驗證檔案310產生相應的韌體版本號,可配合圖2B的「封裝目標檔案」之步驟。版號管理程序420可以記錄封裝成功的韌體檔案(意即已驗證檔案232),也會記錄驗證失敗的韌體檔案。版號管理程序420將待驗證檔案310的相關操作記錄於歷程資訊中。每一筆歷程資訊代表不同的硬體元件,歷程資訊可以提供用戶端100查詢韌體封裝的過往所有檔案歷程。In one embodiment, the second storage unit 220 further includes a version management program 420 (Stock Keeping Unit, SKU for short). The firmware
若第二儲存單元220存在相關連的已驗證檔案232,版號管理程序420將待驗證檔案310的檔案名稱更名已驗證檔案232的檔案名稱。驗證資訊410係根據待驗證檔案310的硬體資訊312所產生。版號管理程序420根據驗證資訊410查找第二儲存單元220是否存在相同硬體元件的已驗證檔案232。If there is a related verified
將所查找到與修改後的佈建資訊311相關連的已驗證檔案232為一受選檔案(無標號)。若第二儲存單元220中存在受選檔案時,版號管理程序420將待驗證檔案310的檔案名稱修改為所查找到的已驗證檔案232的檔案名稱。若第二儲存單元220不存在受選檔案,版號管理程序420根據佈建資訊311建立新的檔案名稱。版號管理程序420無論有無查找到受選檔案,版號管理程序420向用戶端100傳輸相應的檔案查找結果。The found verified
在建立佈建資訊311的檔案名稱之後,韌體驗證平台程序231向用戶端100傳輸待確認頁面,藉以向用戶端100再次確認待驗證檔案310的處理過程是否有發生錯誤。若用戶端100確認待驗證檔案310的處理過程均無錯誤,用戶端100向伺服器端200傳輸確認要求。韌體驗證平台程序231根據確認要求將目標檔案320變更為新的已驗證檔案232。韌體驗證平台程序231發布已驗證檔案232。若驗證過程中存在錯誤,用戶端100向伺服器端200傳輸取消要求。韌體驗證平台程序231將目標檔案320記錄於第二儲存單元220中,並將目標檔案320記錄於歷程資訊中。取消要求包括待驗證檔案310的驗證、解析或封裝的錯誤資訊,以便將錯誤資訊記錄於歷程資訊(log)中。After establishing the file name of the
在一實施例中,韌體驗證平台程序231在產生目標檔案320的過程中將同時調用版號管理程序420。版號管理程序420將生成一組韌體版本號碼。版號管理程序420將韌體版本號碼加入目標檔案320中,可配合圖2B所示。韌體版本號碼除了可以由用戶端100設定外,也可以是以現有韌體版本號碼以流水號編輯,亦或是以時間戳記(time stamp)為編號等方式實現。In one embodiment, the firmware
在一實施例中,第二儲存單元220更包括輕型目錄存取協定程序(Lightweight Directory Access Protocol,簡稱LDAP)。請參考圖4所示,其係為一實施例的伺服器元件的韌體驗證與管理的處理系統架構示意圖。用戶端100連接至伺服器端200時,伺服器端200執行LDAP程序511。伺服器端200根據LDAP程序511或向外部計算機520獲取用戶端100的登入資訊521。LDAP程序511根據登入資訊521判斷用戶端100是否為正確或錯誤。若用戶端100為正確時,第二處理單元230執行韌體驗證平台程序231,並進行待驗證檔案310的相關處理。反之,伺服器端200將傳輸錯誤訊息至用戶端100。並且,伺服器端200拒絕來自於錯誤的用戶端100的待驗證檔案310。In one embodiment, the second storage unit 220 further includes Lightweight Directory Access Protocol (LDAP for short). Please refer to FIG. 4 , which is a schematic diagram of a processing system architecture for firmware verification and management of server components according to an embodiment. When the
在一實施例中,伺服器端200在獲得待驗證檔案310後,韌體驗證平台將調用硬體元件的歷程資訊。在韌體驗證平台程序231調用歷程資訊後,韌體驗證平台程序231將會綁定待驗證檔案310與用戶端100的編輯鎖定關係。編輯鎖定關係除了限定可以編輯待驗證檔案310的用戶端100外,另用於確認待驗證檔案310是否已經結案。韌體驗證平台程序231於接獲待驗證檔案310時,韌體驗證平台程序231對待驗證檔案310設定為鎖定狀態,請配合圖2B的「封裝目標檔案」之步驟。In one embodiment, after the
當用戶端100完成前述所有的操作後,用戶端100向伺服器端200傳輸確認要求。韌體驗證平台程序231根據結案要求解除編輯鎖定關係,請配合圖2B的「封裝目標檔案」之步驟。若用戶端100於設定參數或其他操作發生中斷,韌體驗證平台程序231將維持編輯關係,直至相同用戶端100重新接入。當韌體驗證平台程序231維持編輯關係的存在,則其他用戶端100不能設定該筆待驗證檔案310的相關參數、新增或刪除檔案的操作。After the
伺服器元件的韌體驗證與管理的處理系統與方法提供硬體元件的韌體驗證與版本號碼的相應管理。除了可以降低不同部門的開發人員對於韌體的各自驗證的負擔,也縮短不同部門的來回溝通的成本。更進一步而言,伺服器元件的韌體驗證與管理的處理系統可以對硬體元件的韌體檔案在生成的同時也自動編列相應的版本號碼。The processing system and method for firmware verification and management of server components provide firmware verification of hardware components and corresponding management of version numbers. In addition to reducing the burden of firmware verification for developers in different departments, it also reduces the cost of back-and-forth communication between different departments. Furthermore, the processing system for verifying and managing the firmware of the server components can automatically compile the corresponding version numbers while generating the firmware files of the hardware components.
001:處理系統 100:用戶端 110:輸入單元 120:顯示單元 130:第一通訊單元 140:第一儲存單元 150:第一處理單元 141:操作介面程序 200:伺服器端 210:第二通訊單元 220:第二儲存單元 230:第二處理單元 231:韌體驗證平台程序 232:已驗證檔案 233:硬體功能檔案 310:待驗證檔案 311:佈建資訊 312:硬體資訊 320:目標檔案 410:驗證資訊 420:版號管理程序 511:LDAP程序 520:外部計算機 521:登入資訊 S210、S220、S230、S240、S250、S260:步驟001: Processing system 100: client 110: input unit 120: display unit 130: The first communication unit 140: the first storage unit 150: The first processing unit 141: Operation interface program 200: server side 210: The second communication unit 220: the second storage unit 230: second processing unit 231: Firmware verification platform program 232: Verified file 233:Hardware function file 310: file to be verified 311: Deployment information 312:Hardware information 320: target file 410: Verify information 420: version number management program 511:LDAP procedure 520: external computer 521: login information S210, S220, S230, S240, S250, S260: steps
[圖1]係為一實施例的系統架構示意圖。 [圖2A]係為一實施例的伺服器元件的韌體驗證與管理的處理流程圖。 [圖2B]係為一實施例的伺服器元件的韌體驗證與管理的時序圖。 [圖3A]係為一實施例的操作介面程序中的硬體資訊與佈建資訊示意圖。 [圖3B]係為一實施例的操作介面程序中的多組目標檔案的示意圖。 [圖3C]係為一實施例的驗證資訊的文本結構示意圖。 [圖3D]係為一實施例的操作介面程序所呈現佈建資訊的示意畫面。 [圖3E]係為一實施例的操作介面程序所呈現佈建資訊的另一示意畫面。 [圖4]係為此一實施例的伺服器元件的韌體驗證與管理的處理系統架構示意圖。 [FIG. 1] is a schematic diagram of the system architecture of an embodiment. [ FIG. 2A ] is a process flowchart of firmware verification and management of server components according to an embodiment. [ FIG. 2B ] is a sequence diagram of firmware verification and management of server components according to an embodiment. [ FIG. 3A ] is a schematic diagram of hardware information and deployment information in the operation interface program of an embodiment. [ FIG. 3B ] is a schematic diagram of multiple sets of target files in the operation interface program of an embodiment. [ FIG. 3C ] is a schematic diagram of the text structure of the verification information of an embodiment. [ FIG. 3D ] is a schematic picture of the deployment information presented by the operation interface program of an embodiment. [FIG. 3E] is another schematic picture of the deployment information presented by the operation interface program of an embodiment. [ FIG. 4 ] is a schematic diagram of a processing system architecture for firmware verification and management of server components according to an embodiment.
001:處理系統 001: Processing system
100:用戶端 100: client
110:輸入單元 110: input unit
120:顯示單元 120: display unit
130:第一通訊單元 130: The first communication unit
140:第一儲存單元 140: the first storage unit
150:第一處理單元 150: The first processing unit
141:操作介面程序 141: Operation interface program
200:伺服器端 200: server side
210:第二通訊單元 210: The second communication unit
220:第二儲存單元 220: the second storage unit
230:第二處理單元 230: second processing unit
231:韌體驗證平台程序 231: Firmware verification platform program
232:已驗證檔案 232: Verified file
233:硬體功能檔案 233:Hardware function file
310:待驗證檔案 310: file to be verified
311:佈建資訊 311: Deployment information
312:硬體資訊 312:Hardware information
Claims (15)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW110148014A TWI783831B (en) | 2021-12-21 | 2021-12-21 | Processing system and method for verify and management of the firmware |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW110148014A TWI783831B (en) | 2021-12-21 | 2021-12-21 | Processing system and method for verify and management of the firmware |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI783831B true TWI783831B (en) | 2022-11-11 |
| TW202326416A TW202326416A (en) | 2023-07-01 |
Family
ID=85794508
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW110148014A TWI783831B (en) | 2021-12-21 | 2021-12-21 | Processing system and method for verify and management of the firmware |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI783831B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20250217129A1 (en) * | 2024-01-02 | 2025-07-03 | Quanta Computer Inc. | Automatic firmware updating |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150052596A1 (en) * | 2013-08-13 | 2015-02-19 | American Megatrends, Inc. | Network based firmware feature configuration and firmware image generation |
| TW201540034A (en) * | 2014-02-05 | 2015-10-16 | 蘋果公司 | Uniform communication protocols for communication between controllers and accessories |
| TW201839622A (en) * | 2017-04-27 | 2018-11-01 | 廣達電腦股份有限公司 | Firmware for server device and setting method for custom setting |
| CN111221684A (en) * | 2018-11-23 | 2020-06-02 | 英业达科技有限公司 | Server detection method |
| TW202022610A (en) * | 2018-12-05 | 2020-06-16 | 英業達股份有限公司 | Method for detecting a server |
| CN111625263A (en) * | 2020-05-22 | 2020-09-04 | 苏州浪潮智能科技有限公司 | A method for updating server component firmware |
-
2021
- 2021-12-21 TW TW110148014A patent/TWI783831B/en active
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150052596A1 (en) * | 2013-08-13 | 2015-02-19 | American Megatrends, Inc. | Network based firmware feature configuration and firmware image generation |
| TW201540034A (en) * | 2014-02-05 | 2015-10-16 | 蘋果公司 | Uniform communication protocols for communication between controllers and accessories |
| TW201839622A (en) * | 2017-04-27 | 2018-11-01 | 廣達電腦股份有限公司 | Firmware for server device and setting method for custom setting |
| CN111221684A (en) * | 2018-11-23 | 2020-06-02 | 英业达科技有限公司 | Server detection method |
| TW202022610A (en) * | 2018-12-05 | 2020-06-16 | 英業達股份有限公司 | Method for detecting a server |
| CN111625263A (en) * | 2020-05-22 | 2020-09-04 | 苏州浪潮智能科技有限公司 | A method for updating server component firmware |
Also Published As
| Publication number | Publication date |
|---|---|
| TW202326416A (en) | 2023-07-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111414407B (en) | Database data query method and device, computer equipment and storage medium | |
| CN108460686B (en) | Execution of hardware blockchain correction consensus operation procedure | |
| JP2021512379A (en) | Blockchain-based smart contract calling methods and devices, and electronic devices | |
| WO2019227573A1 (en) | Collaborative office data stream processing method and apparatus, computer device, and storage medium | |
| WO2020192141A1 (en) | Method and device for simulating interface, computer apparatus, and storage medium | |
| CN110413269A (en) | Interface encoding method, server and computer-readable storage medium | |
| WO2020233081A1 (en) | Client plugin-ization implementation method, apparatus, computer device and storage medium | |
| US20090307137A1 (en) | Managing provenance of digitally signed data in user editable records | |
| CN107733847A (en) | Platform Website login method, apparatus, computer equipment and readable storage medium storing program for executing | |
| CN112070501B (en) | Block chain transaction initiating and verifying method and system | |
| EP3796616A1 (en) | Container management method, apparatus, and device | |
| CN110018835A (en) | YANG model configuration data processing method and device, terminal device and storage medium | |
| TWI783831B (en) | Processing system and method for verify and management of the firmware | |
| US9380000B2 (en) | Deploying and modifying a service-oriented architecture deployment environment model | |
| JP6329552B2 (en) | Reference data segmentation from single table to multiple tables | |
| CN113330419B (en) | Device application installation method, device, equipment and storage medium | |
| US20210075701A1 (en) | Method and system for onboarding a virtual network function package utilized by one or more network services | |
| CN121039661A (en) | Generation of computer simulation packages | |
| CN113505125B (en) | Data uploading method and uploading agent device | |
| CN115454472A (en) | Remote upgrade problem solving method, device, equipment and readable storage medium | |
| CN116361124A (en) | Processing system and method for verifying and managing firmware of server element | |
| US20160267172A1 (en) | Constraint free model | |
| WO2020008244A1 (en) | Printed circuit board layout assessment tool | |
| CN116125853A (en) | Integrated circuit security control method and device, storage medium and electronic equipment | |
| CN111460436B (en) | A blockchain-based unstructured data operation method and system |