The present application relates to user privilege control operations. In particular, the present application relates to methods and systems for securing Basic Input/Output System (BIOS) passwords in a server computer under user privilege control operations, and the server computer thereof.
In a server computer, the traditional BIOS User Privilege Control operation runs on a system processor, which uses BIOS to perform user authentications. BIOS User Privilege Control comprises User Privilege and User Authentication. User privilege can be read from Non-volatile random-access memory (NVRAM) or written to NVRAM by BIOS. User Authentication depends on saved User Privilege.
In traditional methods, BIOS reads the valid passwords from an NVRAM and the user inputs the passwords from a keyboard. The passwords may be a single string of a password or a list of passwords. The BIOS compares the inputted passwords with the valid passwords. When the user changes the passwords, the BIOS saves the new passwords and sets the user privilege on the BIOS NVRAM.
Such traditional methods handle the user privilege in an unsecured way due to the lack of anti-spy mechanism or encryption over the network. Any spy software may crack the BIOS passwords and then get power on or administration privileges, such that the hacker may obtain the control privilege of a server computer. In a server group, which uses one global set of passwords for all server computers, if the hacker steals the passwords from a server computer in the server group, he/she can then obtain the control privilege of all of the server computers in the group and steal any data in the whole group.
Various features and advantages of the disclosed embodiments will be apparent from the detailed description which follows, taken in conjunction with the accompanying drawings, which together illustrate, by way of example, features of the disclosed embodiments.
As described above, the traditional BIOS User Privilege Control operation applies an unsecured method to handle the user privilege for the password authentication, such that a hacker may easily obtain the control privilege of server computers. The present invention aims to solve the aforesaid issue and provides a different structure over the traditional methods in order to avoid that the BIOS passwords and the control privilege of the server computers being hacked.
The present application proposes methods and systems for securing BIOS passwords in a server computer under user privilege control operations. According to the present invention, the BIOS, system processor and system memory cannot access the actual passwords, so the spy software has no chance to discover the BIOS passwords. According to the present invention, the hacker cannot steal the passwords with any cracking methods, such as applying unauthorized applications or unauthorized option ROM (Read-Only Memory), to read the passwords from the BIOS NVRAM storage.
The proposed invention handles the BIOS User Privilege Control operation by a BMC firmware running in a baseboard management controller (BMC) instead of a BIOS firmware running in a system processor of a server computer. From the hardware's aspect, the proposed invention comprises a server computer system with a BMC. From the firmware's aspect, the proposed invention comprises BIOS, BMC firmware and option ROM, which supports the Human Interface Infrastructure (HII) Configuration. The passwords are stored by the BMC, so the BIOS does not need to keep, save or compare them.
Under the aforesaid structure, when the user requests the password check operation locally, authentication operation will be handled by the BMC firmware (150) instead of the BIOS firmware running in a system processor of the server computer. When the user requests the password check operation and inputs the passwords remotely from the integrated remote console (160), the inputted passwords sent from the remote console (160) will be encrypted over a network.
According to the illustrated operations for BIOS user privilege authentication, any server computers and systems including the disclosed functionality of the BIOS and BMC may also secure the BIOS passwords and are also claimed by the present application. According to the present invention, BIOS, system processor and system memory cannot access the actual passwords, so the spy software has no chance to discover the BIOS passwords. According to the present invention, the hacker cannot steal the passwords with any codecrack methods, such as applying unauthorized applications or unauthorized option ROM, to read the passwords from the BIOS NVRAM storage. Accordingly, the present invention secures the user privilege for server computers and systems.
The aforesaid detailed descriptions illustrate the preferred embodiments of the present application. However, the scope of the claimed invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2014/049232 | 7/31/2014 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2016/018390 | 2/4/2016 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
7619544 | Piwonka et al. | Nov 2009 | B2 |
8181235 | Miyazaki | May 2012 | B2 |
8219792 | Jaber et al. | Jul 2012 | B2 |
20040268140 | Zimmer | Dec 2004 | A1 |
20070130481 | Takahashi | Jun 2007 | A1 |
20080162956 | Bozek | Jul 2008 | A1 |
20110083003 | Jaber | Apr 2011 | A1 |
20120079282 | Lowenstein | Mar 2012 | A1 |
20120131319 | Peng | May 2012 | A1 |
20130019281 | Jacobs et al. | Jan 2013 | A1 |
20130091260 | Murphy | Apr 2013 | A1 |
Number | Date | Country |
---|---|---|
2013161210 | Aug 2013 | JP |
Entry |
---|
Wang, Jiang. Hardware-assisted protection and isolation. Diss. 2011. (Year: 2011). |
Frykholm, Niklas, and Ari Juels. “Error-tolerant password recovery.” Proceedings of the 8th ACM conference on Computer and Communications Security. ACM, 2001. (Year: 2001). |
International Searching Authority, The International Search Report and the Written Opinion, PCT/US2014/049232, dated Apr. 9, 2015, 9 Pgs. |
Kuan-Jen Lin, “Using TPM to Improve Boot Security at BIOS Layer,” Jan. 13-16, 2012, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnurnber=6161909 > On pp. 376-377. |
Number | Date | Country | |
---|---|---|---|
20170185780 A1 | Jun 2017 | US |