[go: up one dir, main page]

TWI783831B - Processing system and method for verify and management of the firmware - Google Patents

Processing system and method for verify and management of the firmware Download PDF

Info

Publication number
TWI783831B
TWI783831B TW110148014A TW110148014A TWI783831B TW I783831 B TWI783831 B TW I783831B TW 110148014 A TW110148014 A TW 110148014A TW 110148014 A TW110148014 A TW 110148014A TW I783831 B TWI783831 B TW I783831B
Authority
TW
Taiwan
Prior art keywords
file
server
information
verified
client
Prior art date
Application number
TW110148014A
Other languages
Chinese (zh)
Other versions
TW202326416A (en
Inventor
黃添壽
王羽庭
林桓均
Original Assignee
技嘉科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 技嘉科技股份有限公司 filed Critical 技嘉科技股份有限公司
Priority to TW110148014A priority Critical patent/TWI783831B/en
Application granted granted Critical
Publication of TWI783831B publication Critical patent/TWI783831B/en
Publication of TW202326416A publication Critical patent/TW202326416A/en

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Hardware Redundancy (AREA)

Abstract

The processing system and method for verify and management of the firmware is provided. The processing method comprise the steps. A client sends a firmware file to a server end. The server end fetches a policy information and a hardware information according to analysis the firmware file. The server end modify the policy information to a release information according to an information update request form the client. The server end selects at least of hardware function file according to the hardware information. The server end packs the release information and the hardware function file into a temporary file. The server end transform the temporary file to a confirm file according to an ack request from the client.

Description

伺服器硬體元件的韌體驗證與管理系統與方法System and method for firmware verification and management of server hardware components

關於一種檔案的管理系統與方法,特別有關一種伺服器硬體元件的韌體驗證與管理系統與方法。The invention relates to a file management system and method, in particular to a firmware verification and management system and method of server hardware components.

隨著伺服器的快速發展,伺服器的運算能力也大幅的提升。為能確保伺服器運作時的穩定環境,因此伺服器中還需要配置多種相應的硬體元件,例如:感測器(sensor)、風扇或電源供應器等。由於伺服器中的每一種硬體元件都需要韌體(firmware)控制。所以硬體元件的韌體驗證與管理是項重要的課題。With the rapid development of the server, the computing power of the server has also been greatly improved. In order to ensure a stable environment when the server is running, the server also needs to be equipped with a variety of corresponding hardware components, such as sensors, fans, or power supplies. Because each hardware component in the server needs firmware (firmware) control. Therefore, firmware verification and management of hardware components is an important issue.

以風扇為例,由於風扇的控制與基板控制器(Board Management Controller,BMC)相關。因此風扇韌體除了需要韌體工程人員外,也需要由基板控制器的開發人員確認韌體內容。當雙方工程人員確認無誤後,才能開始發佈韌體檔案。由於冗長的溝通過程,可能造成韌體驗證不易,且後續發佈的版本也難以控管。Taking the fan as an example, since the control of the fan is related to a board management controller (Board Management Controller, BMC). Therefore, in addition to firmware engineering personnel, the fan firmware also needs to be confirmed by the development personnel of the baseboard controller to confirm the firmware content. The firmware file can only be released after the engineers of both parties confirm that it is correct. Due to the lengthy communication process, firmware verification may be difficult, and subsequent releases may be difficult to control.

有鑑於此,伺服器元件的韌體驗證與管理的處理系統,提供硬體元件的韌體驗證與發佈版號的相應管理。In view of this, the processing system of firmware verification and management of server components provides firmware verification of hardware components and corresponding management of release version numbers.

在一些實施例中,伺服器元件的韌體驗證與管理的處理系統包括用戶端與伺服器端。用戶端具有待驗證檔案;伺服器端包括通訊單元、儲存單元與處理單元,通訊單元通訊連接於用戶端,通訊單元傳輸待驗證檔案,儲存單元儲存多個硬體功能檔案,處理單元電性連接於通訊單元與儲存單元,處理單元解析待驗證檔案,獲取待驗證檔案的佈建資訊與硬體資訊,通訊單元向用戶端傳輸佈建資訊,用戶端根據佈建資訊回應資訊修正命令,處理單元根據資訊修正命令修改佈建資訊,處理單元根據硬體資訊選擇至少一硬體功能檔案,處理單元將修改後之佈建資訊與受選的至少一硬體功能檔案封裝為目標檔案。伺服器元件的韌體驗證與管理的處理系統提供硬體元件的韌體驗證與版本號碼的相應管理。除了可以降低不同部門的開發人員對於韌體的各自驗證的負擔,也縮短不同部門的來回溝通的成本。更進一步而言,伺服器元件的韌體驗證與管理的處理系統可以對硬體元件的韌體檔案在生成的同時也自動編列相應的版本號碼。In some embodiments, the processing system for firmware verification and management of server components includes a client end and a server end. The client has files to be verified; the server includes a communication unit, a storage unit and a processing unit, the communication unit is connected to the client, the communication unit transmits files to be verified, the storage unit stores multiple hardware function files, and the processing unit is electrically connected Between the communication unit and the storage unit, the processing unit parses the file to be verified, obtains the configuration information and hardware information of the file to be verified, the communication unit transmits the configuration information to the client, and the client responds to the information modification command according to the configuration information, and the processing unit The configuration information is modified according to the information modification command, the processing unit selects at least one hardware function file according to the hardware information, and the processing unit packages the modified configuration information and the selected at least one hardware function file into a target file. The processing system of firmware verification and management of server components provides firmware verification of hardware components and corresponding management of version numbers. In addition to reducing the burden of firmware verification for developers in different departments, it also reduces the cost of back-and-forth communication between different departments. Furthermore, the processing system for verifying and managing the firmware of the server components can automatically compile the corresponding version numbers while generating the firmware files of the hardware components.

在一些實施例中,儲存單元更儲存驗證資訊,處理單元根據驗證資訊檢查佈建資訊的JSON文件格式,獲得文本驗證結果。In some embodiments, the storage unit further stores verification information, and the processing unit checks the JSON file format of the deployment information according to the verification information to obtain a text verification result.

在一些實施例中,伺服器端接收用戶端的確認要求,處理單元根據確認要求將目標檔案變更為已驗證檔案,處理單元將已驗證檔案儲存至儲存單元。In some embodiments, the server receives the confirmation request from the client, the processing unit changes the target file into a verified file according to the confirmation request, and the processing unit stores the verified file in the storage unit.

在一些實施例中,儲存單元包括至少一已驗證檔案,處理單元查找儲存單元中有與修改後之佈建資訊相關連者指定為受選檔案。In some embodiments, the storage unit includes at least one verified file, and the processing unit searches the storage unit for the selected file associated with the modified deployment information.

在一些實施例中,儲存單元更包括輕量目錄存取程序,處理單元執行清量目錄存取程序,用以識別用戶端的登入資訊。In some embodiments, the storage unit further includes a lightweight directory access program, and the processing unit executes the lightweight directory access program to identify the login information of the client.

在一些實施例中,伺服器元件的韌體驗證與管理的處理方法包括由用戶端傳輸待驗證檔案至伺服器端;伺服器端解析待驗證檔案,獲取待驗證檔案的佈建資訊與硬體資訊;伺服器端向用戶端傳輸佈建資訊;用戶端根據佈建資訊回應資訊修正命令;伺服器端根據資訊修正命令修改佈建資訊,且伺服器端根據硬體資訊選擇至少一硬體功能檔案;伺服器端將修改後之佈建資訊與受選的至少一硬體功能檔案封裝為目標檔案。In some embodiments, the processing method of firmware verification and management of server components includes transmitting the file to be verified from the client to the server; the server parses the file to be verified, and obtains the deployment information and hardware of the file to be verified information; the server transmits deployment information to the client; the client responds to an information correction command according to the deployment information; the server modifies the deployment information according to the information correction command, and the server selects at least one hardware function according to the hardware information file; the server side encapsulates the modified deployment information and at least one selected hardware function file into a target file.

在一些實施例中,由用戶端傳輸待驗證檔案至伺服器端的步驟包括:伺服器端接收用戶端的用戶識別要求;伺服器端根據目錄存取程序判斷用戶識別要求是否為正確的用戶端或錯誤的用戶端;若為正確的用戶端,伺服器端傳輸來自於正確的用戶端的待驗證檔案;若為錯誤的用戶端,伺服器端拒絕來自於錯誤的用戶端的待驗證檔案。In some embodiments, the step of transmitting the file to be verified from the client to the server includes: the server receives the user identification request from the client; the server determines whether the user identification request is correct or incorrect according to the directory access procedure If it is a correct client, the server transmits the file to be verified from the correct client; if it is a wrong client, the server rejects the file to be verified from the wrong client.

在一些實施例中,在伺服器端將修改後之佈建資訊與受選的至少一硬體功能檔案封裝為目標檔案的步驟中更包括:伺服器端接收用戶端的確認要求;處理單元根據確認要求將目標檔案變更為已驗證檔案;處理單元將已驗證檔案儲存至儲存單元。In some embodiments, the step of packaging the modified deployment information and the selected at least one hardware function file into a target file at the server side further includes: the server side receives a confirmation request from the client side; the processing unit according to the confirmation Request to change the target file to a verified file; the processing unit stores the verified file to the storage unit.

所述的伺服器元件的韌體驗證與管理的處理系統與方法提供即時的線上驗證韌體於同步管理版本號碼。用戶端僅需要將待驗證檔案上傳至處理系統,處理系統除了確認待驗證檔案的文件格式是否正確外,處理系統也會確認新修改後的內容是否正確。如此一來,使用者不需將待驗證檔案傳輸給不同單位進行驗證。The processing system and method for firmware verification and management of server components provide real-time online verification of firmware and synchronous management of version numbers. The client only needs to upload the file to be verified to the processing system. In addition to confirming whether the file format of the file to be verified is correct, the processing system will also confirm whether the newly modified content is correct. In this way, the user does not need to transmit the file to be verified to different units for verification.

請參考圖1所示,其係為此一實施例的系統架構示意圖。伺服器元件的韌體驗證與管理的處理系統001包括至少一用戶端100與伺服器端200。用戶端100通訊連接於伺服器端200。用戶端100可以是但不限定為個人電腦、筆記型電腦、行動電話、平板電腦或嵌入式系統(Embedded System)等。Please refer to FIG. 1 , which is a schematic diagram of the system architecture of this embodiment. The processing system 001 for firmware verification and management of server components includes at least a client 100 and a server 200 . The client 100 is communicatively connected to the server 200 . The client 100 can be, but not limited to, a personal computer, a notebook computer, a mobile phone, a tablet computer, or an embedded system (Embedded System).

用戶端100包括輸入單元110、顯示單元120、第一通訊單元130、第一儲存單元140與第一處理單元150。第一處理單元150電性連接於輸入單元110、顯示單元120、第一通訊單元130與第一儲存單元140。第一儲存單元140儲存操作介面程序141與至少一待驗證檔案310(profile)。所述的待驗證檔案310係為硬體元件的未驗證的韌體檔案。硬體元件可以是但不限定為風扇、散熱器、感測器或通訊匯流排,硬體元件係為伺服器端200中的相關電子元件或設備的統稱。因此在第一儲存單元140可以儲存風扇的待驗證檔案310(fan profile)、散熱器或其硬體元件的待驗證檔案310。The user terminal 100 includes an input unit 110 , a display unit 120 , a first communication unit 130 , a first storage unit 140 and a first processing unit 150 . The first processing unit 150 is electrically connected to the input unit 110 , the display unit 120 , the first communication unit 130 and the first storage unit 140 . The first storage unit 140 stores the operation interface program 141 and at least one file 310 (profile) to be verified. The file to be verified 310 is an unverified firmware file of a hardware component. The hardware component may be but not limited to a fan, a heat sink, a sensor or a communication bus. The hardware component is a general term for related electronic components or devices in the server 200 . Therefore, the first storage unit 140 can store a fan profile to be verified 310 (fan profile), a heat sink or its hardware components to be verified.

操作介面程序141用於接收使用者操作時所發出的控制要求或播放韌體檔案的驗證結果。控制要求可能包括選擇檔案、傳輸待驗證檔案310、資訊更新或確認內容等操作。操作介面程序141可以是獨立的應用程序(application),也可以於瀏覽器(browser)之中執行。顯示單元120播放操作介面程序141的操作介面,或顯示來自於伺服器端200的相關資訊。The operation interface program 141 is used to receive the control request issued by the user during operation or the verification result of playing the firmware file. The control request may include operations such as selecting a file, transmitting the file 310 to be verified, updating information, or confirming content. The operation interface program 141 can be an independent application program (application), and can also be executed in a browser (browser). The display unit 120 plays the operation interface of the operation interface program 141 , or displays relevant information from the server 200 .

伺服器端200包括第二通訊單元210、第二儲存單元220與第二處理單元230。第二處理單元230電性連接於第二通訊單元210與第二儲存單元220。第二通訊單元210通訊連接於用戶端100的第一通訊單元130。第二通訊單元210可以是但不限定為有線網路、無線網路或行動通訊網路等。第二通訊單元210可傳輸待驗證檔案310至第一通訊單元130,或第二通訊單元210接收其他資訊或操作要求。The server 200 includes a second communication unit 210 , a second storage unit 220 and a second processing unit 230 . The second processing unit 230 is electrically connected to the second communication unit 210 and the second storage unit 220 . The second communication unit 210 is communicatively connected to the first communication unit 130 of the user terminal 100 . The second communication unit 210 may be, but not limited to, a wired network, a wireless network, or a mobile communication network. The second communication unit 210 can transmit the file 310 to be verified to the first communication unit 130, or the second communication unit 210 can receive other information or operation requirements.

第二儲存單元220儲存韌體驗證平台程序231、已驗證檔案232與多個硬體功能檔案233。第二儲存單元220也可以暫時儲存韌體驗證過程中所產生的相關資訊。此外,已驗證檔案232係為待驗證檔案310驗證通過且成功封裝的輸出結果。硬體功能檔案233係為韌體封裝過程中,待驗證檔案310所需要的函數庫或應用程序。對於同一系列的硬體元件而言,不同版本的韌體檔案是可能需要相同的函數庫。在此將待驗證檔案310所需調用的函數庫或應用程序統稱為硬體功能檔案233。The second storage unit 220 stores a firmware verification platform program 231 , a verified file 232 and a plurality of hardware function files 233 . The second storage unit 220 can also temporarily store relevant information generated during the firmware verification process. In addition, the verified file 232 is the output result of the verified and packaged file to be verified 310 . The hardware function file 233 is a function library or an application program required by the file 310 to be verified during the firmware packaging process. For the same series of hardware components, different versions of firmware files may require the same function library. Here, the function libraries or application programs that need to be called by the file 310 to be verified are collectively referred to as the hardware function file 233 .

第二處理單元230執行韌體驗證平台程序231。韌體驗證平台程序231除了提供操作介面外,韌體驗證平台程序231也用於解析待驗證檔案310的內容,並根據解析過程分別輸出相應訊息。韌體驗證平台程序231響應於用戶端100的操作介面程序141,使操作介面程序141也提供韌體驗證平台程序231的部分資訊。操作介面除了顯示韌體檔案的相關資訊,也可以接收前述的各項控制要求,並將控制要求回傳至伺服器端200。The second processing unit 230 executes the firmware verification platform program 231 . In addition to providing the operation interface, the firmware verification platform program 231 is also used to analyze the content of the file 310 to be verified, and output corresponding messages according to the analysis process. The firmware verification platform program 231 responds to the operation interface program 141 of the client 100 , so that the operation interface program 141 also provides part of the information of the firmware verification platform program 231 . In addition to displaying relevant information of the firmware file, the operation interface can also receive the above-mentioned various control requests, and return the control requests to the server 200 .

為清楚說明伺服器元件的韌體驗證與管理的處理過程,還請配合圖2A與圖2B所示,其係分別為伺服器元件的韌體驗證與管理的處理流程圖與運作示意圖。 步驟S210:由用戶端傳輸待驗證檔案至伺服器端; 步驟S220:伺服器端解析待驗證檔案,獲取待驗證檔案的佈建資訊與硬體資訊; 步驟S230:伺服器端向用戶端傳輸佈建資訊; 步驟S240:用戶端根據佈建資訊回應資訊修正命令; 步驟S250:伺服器端根據資訊修正命令修改佈建資訊,且伺服器端根據硬體資訊選擇至少一硬體功能檔案; 步驟S260:伺服器端將修改後之佈建資訊與受選的至少一硬體功能檔案封裝為目標檔案。 In order to clearly illustrate the process of firmware verification and management of server components, please also refer to FIG. 2A and FIG. 2B , which are respectively the processing flowchart and operation diagram of firmware verification and management of server components. Step S210: the client transmits the file to be verified to the server; Step S220: the server parses the file to be verified, and obtains the deployment information and hardware information of the file to be verified; Step S230: the server transmits deployment information to the client; Step S240: the client responds to an information modification command according to the deployment information; Step S250: the server side modifies the deployment information according to the information modification command, and the server side selects at least one hardware function file according to the hardware information; Step S260: The server encapsulates the modified deployment information and at least one selected hardware function file into a target file.

首先,用戶端100執行操作介面程序141,並選擇待驗證檔案310。操作介面程序141傳輸待驗證檔案310至伺服器端200。伺服器端200解析待驗證檔案310,並從待驗證檔案310中獲取佈建資訊311(policy)與硬體資訊312,可配合圖2B所示。佈建資訊311係為硬體元件的各項環境設定。例如:佈建資訊311可以是但不限定為維持選項(keep)、刪除選項(delete)、更名選項(rename)、預設選項或規格電力資訊。承如前例,在伺服器端200中具有風扇的硬體元件。因此,佈建資訊中同樣建置風扇的佈建資訊(fan policy)。First, the user terminal 100 executes the operation interface program 141 and selects the file 310 to be verified. The operation interface program 141 transmits the file 310 to be verified to the server 200 . The server 200 parses the file 310 to be verified, and obtains deployment information 311 (policy) and hardware information 312 from the file 310 to be verified, which can be matched with that shown in FIG. 2B . Deployment information 311 is for setting various environments of hardware components. For example, the deployment information 311 may be, but not limited to, keep options (keep), delete options (delete), rename options (rename), default options or specification power information. As in the previous example, there is a hardware component of a fan in the server end 200 . Therefore, the configuration information of the fan is also configured in the deployment information (fan policy).

一般而言,佈建資訊311於初始獲得時可能未賦予相應的設定值。在另一種情況中,待驗證檔案310係為修改其他已驗證檔案232的結果。因此,佈建資訊311的預設值將會繼承已驗證檔案232的內容。硬體資訊312係為硬體元件的種類、硬體元件的型號、主板型號、平台資訊、專案資訊、主持人資訊或環境設定資訊等。平台資訊係為硬體元件所應用的伺服器機型。專案資訊係為伺服器機型的開發專案。主持人資訊係為開發專案的負責人或主管。環境設定資訊係為硬體元件所適用的環境參數或設定參數等。Generally speaking, the deployment information 311 may not be given corresponding setting values when initially obtained. In another case, the profile to be verified 310 is the result of modifying other verified files 232 . Therefore, the default value of the deployment information 311 will inherit the content of the verified file 232 . The hardware information 312 is the type of the hardware component, the model of the hardware component, the model of the motherboard, platform information, project information, host information or environment setting information. The platform information refers to the server model used by the hardware components. Project Information is a development project for server models. The host information department is the person in charge or supervisor of the development project. The environment setting information refers to the environment parameters or setting parameters applicable to the hardware components.

韌體驗證平台程序231接獲待驗證檔案310,韌體驗證平台程序231將佈建資訊311的各項環境設定傳輸至操作介面程序141。假設硬體元件的硬體資訊312包括「default」、「SPECpower」、「default0823」、「SPECpower0823」與「port 80」,每一各硬體資訊312各自具有相應的佈建資訊311,如圖3A所示,所述選項僅為示意並非限制於此。The firmware verification platform program 231 receives the file 310 to be verified, and the firmware verification platform program 231 transmits various environment settings of the deployment information 311 to the operation interface program 141 . Assuming that the hardware information 312 of the hardware component includes "default", "SPECpower", "default0823", "SPECpower0823" and "port 80", each hardware information 312 has corresponding deployment information 311, as shown in FIG. 3A As shown, the options described are illustrative only and not limiting.

伺服器端200向用戶端100傳輸佈建資訊311的內容,以供用戶端100確認是否對佈建資訊311進行修改。如果佈建資訊311有需要異動,用戶端100根據佈建資訊311向伺服器端200傳輸資訊修正命令,用以修改佈建資訊311的內容。此外,用戶端100若認為佈建資訊311內容無誤時,用戶端100可以向伺服器端200傳輸無修改的資訊修正命令,以使伺服器端200結束佈建資訊311的此一階段的處理,可參考步驟S230與圖2B。The server 200 transmits the content of the deployment information 311 to the client 100 for the client 100 to confirm whether to modify the deployment information 311 . If the deployment information 311 needs to be changed, the client 100 transmits an information modification command to the server 200 according to the deployment information 311 to modify the content of the deployment information 311 . In addition, if the client 100 thinks that the content of the deployment information 311 is correct, the client 100 can transmit an unmodified information correction command to the server 200, so that the server 200 ends the processing of the deployment information 311 at this stage, Refer to step S230 and FIG. 2B.

接著,韌體驗證平台程序231根據硬體資訊312選擇相應的硬體功能檔案233。韌體驗證平台程序231根據受選的硬體功能檔案233與佈建資訊311進行封裝,將封裝結果稱為目標檔案320。第二處理單元230將目標檔案320暫存第二儲存單元220中。韌體驗證平台程序231將封裝結果傳輸至用戶端100,以供用戶端100播放目標檔案320的相應畫面,如圖3B所示。Next, the firmware verification platform program 231 selects the corresponding hardware function file 233 according to the hardware information 312 . The firmware verification platform program 231 performs packaging according to the selected hardware function file 233 and the deployment information 311 , and the packaging result is called the target file 320 . The second processing unit 230 temporarily stores the target file 320 in the second storage unit 220 . The firmware verification platform program 231 transmits the encapsulation result to the client 100 for the client 100 to play the corresponding screen of the target file 320 , as shown in FIG. 3B .

在一些實施例中,在第二儲存單元220更包括至少一驗證資訊410。韌體驗證平台程序231根據驗證資訊410對佈建資訊311檢查是否存在JSON(JavaScript Object Notation)文件格式的格式錯誤,並獲得文本驗證結果。驗證資訊410可以是正規式表達(regular expression)所構成的文本檢查結構,如圖3C所示。若文本驗證結果為正確時,伺服器端200將根據待驗證檔案310產生相應的佈建資訊311。伺服器端200向用戶端100發送資訊回報,藉以提示伺服器端200已完成待驗證檔案310的解析處理。若文本驗證結果為錯誤,則伺服器端200也會向用戶端100傳輸資訊回報,藉以提示用戶端100所提供的待驗證檔案310存在格式的錯誤。In some embodiments, the second storage unit 220 further includes at least one verification information 410 . The firmware verification platform program 231 checks the deployment information 311 according to the verification information 410 whether there is a format error in the JSON (JavaScript Object Notation) file format, and obtains a text verification result. The verification information 410 may be a text checking structure formed by regular expressions, as shown in FIG. 3C . If the text verification result is correct, the server 200 will generate corresponding deployment information 311 according to the file 310 to be verified. The server 200 sends an information report to the client 100 to remind the server 200 that the parsing process of the file 310 to be verified has been completed. If the text verification result is an error, the server 200 will also transmit an information report to the client 100 to remind the client 100 that the file 310 to be verified has a format error.

假設硬體元件的佈建資訊311包括「default」、「SPECpower」、「default0823」、「SPECpower0823」與「port 80」,且硬體元件僅需設定「default0823」、「SPECpower0823」與「port 80」等參數。若佈建資訊311的「default」、「SPECpower」、「default0823」、「SPECpower0823」與「port 80」均為「真值」(true)。因此該筆佈建資訊311將會被韌體驗證平台程序231檢測為錯誤。Assume that the deployment information 311 of the hardware component includes "default", "SPECpower", "default0823", "SPECpower0823" and "port 80", and the hardware component only needs to set "default0823", "SPECpower0823" and "port 80" and other parameters. If "default", "SPECpower", "default0823", "SPECpower0823" and "port 80" of the deployment information 311 are all "true". Therefore, the provisioning information 311 will be detected as an error by the firmware verification platform program 231 .

操作介面程序141也可以顯示佈建資訊311的修改頁面。用戶端100可以調整修改頁面中的各選項,如圖3A所示。圖3D與圖3E分別為操作介面程序141所呈現佈建資訊311的示意畫面。圖3D與圖3E係對應於圖3A的底層文件結構。圖3D係為錯誤的佈建資訊311,圖3D中係以勾選表示該參數為真值。圖3E是取消錯誤的參數的佈建資訊311的底層文件結構。The operation interface program 141 can also display a modification page of the deployment information 311 . The user terminal 100 can adjust and modify various options on the page, as shown in FIG. 3A . FIG. 3D and FIG. 3E are schematic images of the deployment information 311 presented by the operation interface program 141 respectively. 3D and 3E correspond to the underlying file structure of FIG. 3A. FIG. 3D shows wrong deployment information 311 . In FIG. 3D , a tick is used to indicate that the parameter is a true value. FIG. 3E is the underlying file structure of the provisioning information 311 that cancels the wrong parameters.

在一實施例中,第二儲存單元220更包括一版號管理程序420(Stock Keeping Unit,簡稱SKU)。韌體驗證平台程序231於封裝目標檔案320的過程中會調用版號管理程序420。版號管理程序420除了檢查第二儲存單元220中是否儲存與佈建資訊311相關連的已驗證檔案232外,版號管理程序420也可以根據待驗證檔案310產生相應的韌體版本號,可配合圖2B的「封裝目標檔案」之步驟。版號管理程序420可以記錄封裝成功的韌體檔案(意即已驗證檔案232),也會記錄驗證失敗的韌體檔案。版號管理程序420將待驗證檔案310的相關操作記錄於歷程資訊中。每一筆歷程資訊代表不同的硬體元件,歷程資訊可以提供用戶端100查詢韌體封裝的過往所有檔案歷程。In one embodiment, the second storage unit 220 further includes a version management program 420 (Stock Keeping Unit, SKU for short). The firmware verification platform program 231 calls the version number management program 420 during the process of packaging the target file 320 . In addition to checking whether the verified file 232 associated with the deployment information 311 is stored in the second storage unit 220, the version number management program 420 can also generate a corresponding firmware version number according to the file 310 to be verified. Cooperate with the steps of "packaging target files" in Figure 2B. The version number management program 420 can record the successfully packaged firmware files (that is, the verified files 232 ), and also record the failed firmware files. The version number management program 420 records the related operations of the file 310 to be verified in the history information. Each piece of history information represents a different hardware component, and the history information can provide the client 100 to query all past file history of the firmware package.

若第二儲存單元220存在相關連的已驗證檔案232,版號管理程序420將待驗證檔案310的檔案名稱更名已驗證檔案232的檔案名稱。驗證資訊410係根據待驗證檔案310的硬體資訊312所產生。版號管理程序420根據驗證資訊410查找第二儲存單元220是否存在相同硬體元件的已驗證檔案232。If there is a related verified file 232 in the second storage unit 220 , the version number management program 420 renames the file name of the file to be verified 310 to the file name of the verified file 232 . The verification information 410 is generated according to the hardware information 312 of the file 310 to be verified. The version number management program 420 searches the second storage unit 220 for the verified file 232 of the same hardware component according to the verification information 410 .

將所查找到與修改後的佈建資訊311相關連的已驗證檔案232為一受選檔案(無標號)。若第二儲存單元220中存在受選檔案時,版號管理程序420將待驗證檔案310的檔案名稱修改為所查找到的已驗證檔案232的檔案名稱。若第二儲存單元220不存在受選檔案,版號管理程序420根據佈建資訊311建立新的檔案名稱。版號管理程序420無論有無查找到受選檔案,版號管理程序420向用戶端100傳輸相應的檔案查找結果。The found verified file 232 associated with the modified deployment information 311 is a selected file (no label). If the selected file exists in the second storage unit 220 , the version number management program 420 modifies the file name of the file to be verified 310 to the found file name of the verified file 232 . If the selected file does not exist in the second storage unit 220 , the version management program 420 creates a new file name according to the deployment information 311 . No matter whether the version number management program 420 finds the selected file or not, the version number management program 420 transmits the corresponding file search result to the client terminal 100 .

在建立佈建資訊311的檔案名稱之後,韌體驗證平台程序231向用戶端100傳輸待確認頁面,藉以向用戶端100再次確認待驗證檔案310的處理過程是否有發生錯誤。若用戶端100確認待驗證檔案310的處理過程均無錯誤,用戶端100向伺服器端200傳輸確認要求。韌體驗證平台程序231根據確認要求將目標檔案320變更為新的已驗證檔案232。韌體驗證平台程序231發布已驗證檔案232。若驗證過程中存在錯誤,用戶端100向伺服器端200傳輸取消要求。韌體驗證平台程序231將目標檔案320記錄於第二儲存單元220中,並將目標檔案320記錄於歷程資訊中。取消要求包括待驗證檔案310的驗證、解析或封裝的錯誤資訊,以便將錯誤資訊記錄於歷程資訊(log)中。After establishing the file name of the deployment information 311 , the firmware verification platform program 231 transmits the page to be confirmed to the client 100 , so as to reconfirm to the client 100 whether there is any error in the process of processing the file 310 to be verified. If the client 100 confirms that there is no error in the processing of the file 310 to be verified, the client 100 transmits a confirmation request to the server 200 . The firmware verification platform program 231 changes the target file 320 to a new verified file 232 according to the confirmation requirement. The firmware verification platform program 231 publishes the verified file 232 . If there is an error in the verification process, the client 100 transmits a cancel request to the server 200 . The firmware verification platform program 231 records the target file 320 in the second storage unit 220 and records the target file 320 in the history information. The cancellation request includes verification, parsing or packaging error information of the file 310 to be verified, so that the error information can be recorded in the log.

在一實施例中,韌體驗證平台程序231在產生目標檔案320的過程中將同時調用版號管理程序420。版號管理程序420將生成一組韌體版本號碼。版號管理程序420將韌體版本號碼加入目標檔案320中,可配合圖2B所示。韌體版本號碼除了可以由用戶端100設定外,也可以是以現有韌體版本號碼以流水號編輯,亦或是以時間戳記(time stamp)為編號等方式實現。In one embodiment, the firmware verification platform program 231 calls the version number management program 420 during the process of generating the target file 320 . The version number management program 420 will generate a set of firmware version numbers. The version number management program 420 adds the firmware version number into the target file 320, which can be matched with that shown in FIG. 2B. The firmware version number can be set by the client terminal 100 , it can also be implemented by editing the existing firmware version number with a serial number, or using a time stamp as a number.

在一實施例中,第二儲存單元220更包括輕型目錄存取協定程序(Lightweight Directory Access Protocol,簡稱LDAP)。請參考圖4所示,其係為一實施例的伺服器元件的韌體驗證與管理的處理系統架構示意圖。用戶端100連接至伺服器端200時,伺服器端200執行LDAP程序511。伺服器端200根據LDAP程序511或向外部計算機520獲取用戶端100的登入資訊521。LDAP程序511根據登入資訊521判斷用戶端100是否為正確或錯誤。若用戶端100為正確時,第二處理單元230執行韌體驗證平台程序231,並進行待驗證檔案310的相關處理。反之,伺服器端200將傳輸錯誤訊息至用戶端100。並且,伺服器端200拒絕來自於錯誤的用戶端100的待驗證檔案310。In one embodiment, the second storage unit 220 further includes Lightweight Directory Access Protocol (LDAP for short). Please refer to FIG. 4 , which is a schematic diagram of a processing system architecture for firmware verification and management of server components according to an embodiment. When the client 100 is connected to the server 200 , the server 200 executes the LDAP program 511 . The server 200 obtains the login information 521 of the client 100 according to the LDAP program 511 or from the external computer 520 . The LDAP program 511 judges whether the client terminal 100 is correct or incorrect according to the login information 521 . If the user terminal 100 is correct, the second processing unit 230 executes the firmware verification platform program 231 and performs related processing on the file 310 to be verified. Otherwise, the server 200 will transmit an error message to the client 100 . Moreover, the server 200 rejects the file 310 to be verified from the wrong client 100 .

在一實施例中,伺服器端200在獲得待驗證檔案310後,韌體驗證平台將調用硬體元件的歷程資訊。在韌體驗證平台程序231調用歷程資訊後,韌體驗證平台程序231將會綁定待驗證檔案310與用戶端100的編輯鎖定關係。編輯鎖定關係除了限定可以編輯待驗證檔案310的用戶端100外,另用於確認待驗證檔案310是否已經結案。韌體驗證平台程序231於接獲待驗證檔案310時,韌體驗證平台程序231對待驗證檔案310設定為鎖定狀態,請配合圖2B的「封裝目標檔案」之步驟。In one embodiment, after the server 200 obtains the file 310 to be verified, the firmware verification platform will invoke the history information of the hardware components. After the firmware verification platform program 231 invokes the history information, the firmware verification platform program 231 will bind the edit lock relationship between the file to be verified 310 and the client terminal 100 . In addition to limiting the client 100 that can edit the file 310 to be verified, the editing lock relationship is also used to confirm whether the file 310 to be verified has been closed. When the firmware verification platform program 231 receives the file 310 to be verified, the firmware verification platform program 231 sets the file 310 to be verified as a locked state, please cooperate with the steps of "encapsulating the target file" in FIG. 2B.

當用戶端100完成前述所有的操作後,用戶端100向伺服器端200傳輸確認要求。韌體驗證平台程序231根據結案要求解除編輯鎖定關係,請配合圖2B的「封裝目標檔案」之步驟。若用戶端100於設定參數或其他操作發生中斷,韌體驗證平台程序231將維持編輯關係,直至相同用戶端100重新接入。當韌體驗證平台程序231維持編輯關係的存在,則其他用戶端100不能設定該筆待驗證檔案310的相關參數、新增或刪除檔案的操作。After the client terminal 100 completes all the aforementioned operations, the client terminal 100 transmits a confirmation request to the server terminal 200 . The firmware verification platform program 231 releases the editing lock relationship according to the closing requirements, please cooperate with the steps of "encapsulating the target file" in FIG. 2B. If the client terminal 100 is interrupted during parameter setting or other operations, the firmware verification platform program 231 will maintain the editing relationship until the same client terminal 100 is reconnected. When the firmware verification platform program 231 maintains the editing relationship, other client terminals 100 cannot set relevant parameters of the file 310 to be verified, or perform operations of adding or deleting files.

伺服器元件的韌體驗證與管理的處理系統與方法提供硬體元件的韌體驗證與版本號碼的相應管理。除了可以降低不同部門的開發人員對於韌體的各自驗證的負擔,也縮短不同部門的來回溝通的成本。更進一步而言,伺服器元件的韌體驗證與管理的處理系統可以對硬體元件的韌體檔案在生成的同時也自動編列相應的版本號碼。The processing system and method for firmware verification and management of server components provide firmware verification of hardware components and corresponding management of version numbers. In addition to reducing the burden of firmware verification for developers in different departments, it also reduces the cost of back-and-forth communication between different departments. Furthermore, the processing system for verifying and managing the firmware of the server components can automatically compile the corresponding version numbers while generating the firmware files of the hardware components.

001:處理系統 100:用戶端 110:輸入單元 120:顯示單元 130:第一通訊單元 140:第一儲存單元 150:第一處理單元 141:操作介面程序 200:伺服器端 210:第二通訊單元 220:第二儲存單元 230:第二處理單元 231:韌體驗證平台程序 232:已驗證檔案 233:硬體功能檔案 310:待驗證檔案 311:佈建資訊 312:硬體資訊 320:目標檔案 410:驗證資訊 420:版號管理程序 511:LDAP程序 520:外部計算機 521:登入資訊 S210、S220、S230、S240、S250、S260:步驟001: Processing system 100: client 110: input unit 120: display unit 130: The first communication unit 140: the first storage unit 150: The first processing unit 141: Operation interface program 200: server side 210: The second communication unit 220: the second storage unit 230: second processing unit 231: Firmware verification platform program 232: Verified file 233:Hardware function file 310: file to be verified 311: Deployment information 312:Hardware information 320: target file 410: Verify information 420: version number management program 511:LDAP procedure 520: external computer 521: login information S210, S220, S230, S240, S250, S260: steps

[圖1]係為一實施例的系統架構示意圖。 [圖2A]係為一實施例的伺服器元件的韌體驗證與管理的處理流程圖。 [圖2B]係為一實施例的伺服器元件的韌體驗證與管理的時序圖。 [圖3A]係為一實施例的操作介面程序中的硬體資訊與佈建資訊示意圖。 [圖3B]係為一實施例的操作介面程序中的多組目標檔案的示意圖。 [圖3C]係為一實施例的驗證資訊的文本結構示意圖。 [圖3D]係為一實施例的操作介面程序所呈現佈建資訊的示意畫面。 [圖3E]係為一實施例的操作介面程序所呈現佈建資訊的另一示意畫面。 [圖4]係為此一實施例的伺服器元件的韌體驗證與管理的處理系統架構示意圖。 [FIG. 1] is a schematic diagram of the system architecture of an embodiment. [ FIG. 2A ] is a process flowchart of firmware verification and management of server components according to an embodiment. [ FIG. 2B ] is a sequence diagram of firmware verification and management of server components according to an embodiment. [ FIG. 3A ] is a schematic diagram of hardware information and deployment information in the operation interface program of an embodiment. [ FIG. 3B ] is a schematic diagram of multiple sets of target files in the operation interface program of an embodiment. [ FIG. 3C ] is a schematic diagram of the text structure of the verification information of an embodiment. [ FIG. 3D ] is a schematic picture of the deployment information presented by the operation interface program of an embodiment. [FIG. 3E] is another schematic picture of the deployment information presented by the operation interface program of an embodiment. [ FIG. 4 ] is a schematic diagram of a processing system architecture for firmware verification and management of server components according to an embodiment.

001:處理系統 001: Processing system

100:用戶端 100: client

110:輸入單元 110: input unit

120:顯示單元 120: display unit

130:第一通訊單元 130: The first communication unit

140:第一儲存單元 140: the first storage unit

150:第一處理單元 150: The first processing unit

141:操作介面程序 141: Operation interface program

200:伺服器端 200: server side

210:第二通訊單元 210: The second communication unit

220:第二儲存單元 220: the second storage unit

230:第二處理單元 230: second processing unit

231:韌體驗證平台程序 231: Firmware verification platform program

232:已驗證檔案 232: Verified file

233:硬體功能檔案 233:Hardware function file

310:待驗證檔案 310: file to be verified

311:佈建資訊 311: Deployment information

312:硬體資訊 312:Hardware information

Claims (15)

一種伺服器硬體元件的韌體驗證與管理系統,包括: 一用戶端,具有一待驗證檔案;以及 一伺服器端,包括一通訊單元、一儲存單元與一處理單元,該通訊單元通訊連接於該用戶端,該通訊單元傳輸該待驗證檔案,該儲存單元儲存多個硬體功能檔案,該處理單元電性連接於該通訊單元與該儲存單元,該處理單元解析該待驗證檔案,獲取該待驗證檔案的一佈建資訊與一硬體資訊,該通訊單元向該用戶端傳輸該佈建資訊,該用戶端根據該佈建資訊回應一資訊修正命令,該處理單元根據該資訊修正命令修改該佈建資訊,該處理單元根據該硬體資訊選擇至少一硬體功能檔案,該處理單元將修改後之該佈建資訊與受選的該至少一硬體功能檔案封裝為一目標檔案。 A firmware verification and management system for server hardware components, comprising: a user terminal having a file to be verified; and A server end includes a communication unit, a storage unit and a processing unit, the communication unit is connected to the user end, the communication unit transmits the file to be verified, the storage unit stores a plurality of hardware function files, and the processing The unit is electrically connected to the communication unit and the storage unit, the processing unit analyzes the file to be verified, obtains a configuration information and a hardware information of the file to be verified, and the communication unit transmits the configuration information to the client , the client responds to an information modification command according to the configuration information, the processing unit modifies the deployment information according to the information modification command, the processing unit selects at least one hardware function file according to the hardware information, and the processing unit modifies Afterwards, the deployment information and the selected at least one hardware function file are packaged into a target file. 如請求項1所述的伺服器硬體元件的韌體驗證與管理系統,其中該儲存單元更儲存一驗證資訊,該處理單元根據該驗證資訊檢查該佈建資訊的JSON文件格式,獲得一文本驗證結果。The firmware verification and management system for server hardware components as described in Claim 1, wherein the storage unit further stores a verification information, and the processing unit checks the JSON file format of the deployment information according to the verification information, and obtains a text Validation results. 如請求項2所述的伺服器硬體元件的韌體驗證與管理系統,其中該處理單元根據該文本驗證結果驅動該通訊單元向該用戶端傳輸一資訊回報。The firmware verification and management system for server hardware components as described in Claim 2, wherein the processing unit drives the communication unit to transmit an information report to the client according to the text verification result. 如請求項1所述的伺服器硬體元件的韌體驗證與管理系統,其中該伺服器端接收該用戶端的一確認要求,該處理單元根據該確認要求將該目標檔案變更為一已驗證檔案,該處理單元將該已驗證檔案儲存至該儲存單元。The firmware verification and management system for server hardware components as described in Claim 1, wherein the server receives a confirmation request from the client, and the processing unit changes the target file into a verified file according to the confirmation request , the processing unit stores the verified file in the storage unit. 如請求項1所述的伺服器硬體元件的韌體驗證與管理系統,其中該儲存單元包括至少一已驗證檔案,該處理單元查找該儲存單元中有與修改後之該佈建資訊相關連者指定為一受選檔案。The firmware verification and management system for server hardware components as described in Claim 1, wherein the storage unit includes at least one verified file, and the processing unit finds that the storage unit is associated with the modified deployment information is designated as a selected file. 如請求項5所述的伺服器硬體元件的韌體驗證與管理系統,其中該處理單元將該目標檔案的檔案名稱修改為該受選檔案的檔案名稱。The firmware verification and management system for server hardware components as described in claim 5, wherein the processing unit modifies the file name of the target file to the file name of the selected file. 如請求項1所述的伺服器硬體元件的韌體驗證與管理系統,其中該目標檔案更包括一韌體版本號碼。The firmware verification and management system for server hardware components as described in Claim 1, wherein the target file further includes a firmware version number. 如請求項1所述的伺服器硬體元件的韌體驗證與管理系統,其中該儲存單元更包括一輕量目錄存取程序,該處理單元執行該輕量目錄存取程序,用以識別該用戶端的登入資訊。The firmware verification and management system for server hardware components as described in Claim 1, wherein the storage unit further includes a lightweight directory access program, and the processing unit executes the lightweight directory access program to identify the Client login information. 一種伺服器硬體元件的韌體驗證與管理方法,包括: 由一用戶端傳輸一待驗證檔案至一伺服器端; 該伺服器端解析該待驗證檔案,獲取該待驗證檔案的一佈建資訊與一硬體資訊; 該伺服器端向該用戶端傳輸該佈建資訊; 該用戶端根據該佈建資訊回應一資訊修正命令; 該伺服器端根據該資訊修正命令修改該佈建資訊,且該伺服器端根據該硬體資訊選擇至少一硬體功能檔案;以及 該伺服器端將修改後之該佈建資訊與受選的該至少一硬體功能檔案封裝為一目標檔案。 A method for verifying and managing firmware of server hardware components, comprising: Transmitting a file to be verified from a client to a server; The server parses the file to be verified, and obtains a deployment information and a hardware information of the file to be verified; the server transmits the deployment information to the client; The client responds to an information modification command according to the provisioning information; The server side modifies the deployment information according to the information modification command, and the server side selects at least one hardware function file according to the hardware information; and The server encapsulates the modified deployment information and the selected at least one hardware function file into a target file. 如請求項9所述的伺服器硬體元件的韌體驗證與管理方法,其中由該用戶端傳輸該待驗證檔案至該伺服器端的步驟包括: 該伺服器端接收該用戶端的一用戶識別要求; 該伺服器端根據一目錄存取程序判斷該用戶識別要求是否為正確的用戶端或錯誤的用戶端; 若為該正確的用戶端,該伺服器端傳輸來自於該正確的用戶端的該待驗證檔案;以及 若為該錯誤的用戶端,該伺服器端拒絕來自於該錯誤的用戶端的該待驗證檔案。 The firmware verification and management method of server hardware components as described in claim 9, wherein the step of transmitting the file to be verified from the client to the server includes: the server receives a user identification request from the client; The server judges whether the user identification request is a correct client or a wrong client according to a directory access program; If it is the correct client, the server transmits the file to be verified from the correct client; and If it is the wrong client, the server rejects the file to be verified from the wrong client. 如請求項9所述的伺服器硬體元件的韌體驗證與管理方法,其中在該伺服器端向該用戶端傳輸該佈建資訊的步驟中更包括: 該伺服器端根據一驗證資訊檢查該佈建資訊的JSON文件格式,獲得一文本驗證結果;以及 該伺服器端根據該文本驗證結果驅動該通訊單元向該用戶端傳輸一資訊回報。 The firmware verification and management method for server hardware components as described in claim 9, wherein the step of transmitting the deployment information from the server to the client further includes: The server side checks the JSON file format of the deployment information according to the verification information, and obtains a text verification result; and The server drives the communication unit to transmit an information report to the client according to the text verification result. 如請求項9所述的伺服器硬體元件的韌體驗證與管理方法,其中在該伺服器端將修改後之該佈建資訊與受選的至少一該硬體功能檔案封裝為該目標檔案的步驟中更包括: 該伺服器端接收該用戶端的一確認要求; 該處理單元根據該確認要求將該目標檔案變更為一已驗證檔案;以及 該處理單元將該已驗證檔案儲存至一儲存單元。 The firmware verification and management method for server hardware components as described in claim 9, wherein the modified deployment information and at least one selected hardware function file are packaged as the target file on the server side The steps further include: The server receives a confirmation request from the client; the processing unit changes the target file to a verified file according to the validation request; and The processing unit stores the verified file into a storage unit. 如請求項12所述的伺服器硬體元件的韌體驗證與管理方法,其中在該處理單元根據該確認要求將該目標檔案變更為該已驗證檔案的步驟後包括: 該伺服器端查找一儲存單元之至少一已驗證檔案中有與修改後之該佈建資訊相關連者指定為一受選檔案;以及 該伺服器端將該目標檔案的檔案名稱修改為該受選檔案的檔案名稱。 The firmware verification and management method for server hardware components as described in claim 12, wherein after the step of changing the target file to the verified file by the processing unit according to the confirmation request, it includes: The server-side finds at least one verified file in a storage unit that is associated with the modified provisioning information and is designated as a selected file; and The server modifies the file name of the target file to the file name of the selected file. 如請求項12所述的伺服器硬體元件的韌體驗證與管理方法,其中在該伺服器端接收該用戶端的該確認要求的步驟更包括: 該伺服器端根據該確認要求解除該待驗證檔案的一編輯鎖定關係。 The firmware verification and management method for server hardware components as described in claim 12, wherein the step of receiving the confirmation request from the client at the server further includes: The server releases an edit lock relationship of the file to be verified according to the confirmation request. 如請求項9所述的伺服器硬體元件的韌體驗證與管理方法,其中在該伺服器端將修改後之該佈建資訊與受選的至少一該硬體功能檔案封裝為該目標檔案的步驟後更包括: 該伺服器端將一韌體版本號碼加入該目標檔案。 The firmware verification and management method for server hardware components as described in claim 9, wherein the modified deployment information and at least one selected hardware function file are packaged as the target file on the server side The steps later include: The server adds a firmware version number to the target file.
TW110148014A 2021-12-21 2021-12-21 Processing system and method for verify and management of the firmware TWI783831B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW110148014A TWI783831B (en) 2021-12-21 2021-12-21 Processing system and method for verify and management of the firmware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW110148014A TWI783831B (en) 2021-12-21 2021-12-21 Processing system and method for verify and management of the firmware

Publications (2)

Publication Number Publication Date
TWI783831B true TWI783831B (en) 2022-11-11
TW202326416A TW202326416A (en) 2023-07-01

Family

ID=85794508

Family Applications (1)

Application Number Title Priority Date Filing Date
TW110148014A TWI783831B (en) 2021-12-21 2021-12-21 Processing system and method for verify and management of the firmware

Country Status (1)

Country Link
TW (1) TWI783831B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20250217129A1 (en) * 2024-01-02 2025-07-03 Quanta Computer Inc. Automatic firmware updating

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150052596A1 (en) * 2013-08-13 2015-02-19 American Megatrends, Inc. Network based firmware feature configuration and firmware image generation
TW201540034A (en) * 2014-02-05 2015-10-16 蘋果公司 Uniform communication protocols for communication between controllers and accessories
TW201839622A (en) * 2017-04-27 2018-11-01 廣達電腦股份有限公司 Firmware for server device and setting method for custom setting
CN111221684A (en) * 2018-11-23 2020-06-02 英业达科技有限公司 Server detection method
TW202022610A (en) * 2018-12-05 2020-06-16 英業達股份有限公司 Method for detecting a server
CN111625263A (en) * 2020-05-22 2020-09-04 苏州浪潮智能科技有限公司 A method for updating server component firmware

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150052596A1 (en) * 2013-08-13 2015-02-19 American Megatrends, Inc. Network based firmware feature configuration and firmware image generation
TW201540034A (en) * 2014-02-05 2015-10-16 蘋果公司 Uniform communication protocols for communication between controllers and accessories
TW201839622A (en) * 2017-04-27 2018-11-01 廣達電腦股份有限公司 Firmware for server device and setting method for custom setting
CN111221684A (en) * 2018-11-23 2020-06-02 英业达科技有限公司 Server detection method
TW202022610A (en) * 2018-12-05 2020-06-16 英業達股份有限公司 Method for detecting a server
CN111625263A (en) * 2020-05-22 2020-09-04 苏州浪潮智能科技有限公司 A method for updating server component firmware

Also Published As

Publication number Publication date
TW202326416A (en) 2023-07-01

Similar Documents

Publication Publication Date Title
CN111414407B (en) Database data query method and device, computer equipment and storage medium
CN108460686B (en) Execution of hardware blockchain correction consensus operation procedure
JP2021512379A (en) Blockchain-based smart contract calling methods and devices, and electronic devices
WO2019227573A1 (en) Collaborative office data stream processing method and apparatus, computer device, and storage medium
WO2020192141A1 (en) Method and device for simulating interface, computer apparatus, and storage medium
CN110413269A (en) Interface encoding method, server and computer-readable storage medium
WO2020233081A1 (en) Client plugin-ization implementation method, apparatus, computer device and storage medium
US20090307137A1 (en) Managing provenance of digitally signed data in user editable records
CN107733847A (en) Platform Website login method, apparatus, computer equipment and readable storage medium storing program for executing
CN112070501B (en) Block chain transaction initiating and verifying method and system
EP3796616A1 (en) Container management method, apparatus, and device
CN110018835A (en) YANG model configuration data processing method and device, terminal device and storage medium
TWI783831B (en) Processing system and method for verify and management of the firmware
US9380000B2 (en) Deploying and modifying a service-oriented architecture deployment environment model
JP6329552B2 (en) Reference data segmentation from single table to multiple tables
CN113330419B (en) Device application installation method, device, equipment and storage medium
US20210075701A1 (en) Method and system for onboarding a virtual network function package utilized by one or more network services
CN121039661A (en) Generation of computer simulation packages
CN113505125B (en) Data uploading method and uploading agent device
CN115454472A (en) Remote upgrade problem solving method, device, equipment and readable storage medium
CN116361124A (en) Processing system and method for verifying and managing firmware of server element
US20160267172A1 (en) Constraint free model
WO2020008244A1 (en) Printed circuit board layout assessment tool
CN116125853A (en) Integrated circuit security control method and device, storage medium and electronic equipment
CN111460436B (en) A blockchain-based unstructured data operation method and system