Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for implementing safety chip BIOS drive design

A technology of security chip and implementation method, which is applied in the field of information security, can solve problems such as disclosure of technical implementation methods, and achieve the effect of reducing security risks and reducing workload

Active Publication Date: 2007-12-05
SHENZHEN SINOSUN TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is no corresponding technical implementation method disclosed in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for implementing safety chip BIOS drive design
  • A method for implementing safety chip BIOS drive design

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0023] As shown in Figure 1, it is the security chip BIOS drive module of the present invention and the mainboard architecture relationship diagram, wherein the south bridge chip 101 of the mainboard, the security chip 103, the system BIOS104 are connected by the LPC (Low PinCount, low pin bus) bus 102 , the LPC bus is a common bus of the host; the system BIOS 104 is set in a FLASH (flash memory) chip, all hung on the LPC bus, and communicates through the LPC bus 102. The security chip BIOS driver module 105 of the method of the present invention is a binary file set in the system BIOS, which is included in the system BIOS.

[0024] As shown in Fig. 2, be the module architecture and the data transmission figure that the security chip BIOS of the presen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for achieving a safety chip BIOS driving design, which comprises: a safety chip BIOS input and output parameter module obtains the operation information of the system BIOS; the safety chip BIOS input and output parameter module quotes the needed type operation of the system BIOS and decides the corresponding sub-function module; it executes sub-module calling requirement: it obtains the corresponding sub-function module number by the safety chip BIOS input and output parameter module and calls the corresponding sub-function module; the safety chip BIOS input and output parameter module returns the result to the system BIOS; it finishes the communication between the system BIOS and the safety chip.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for realizing BIOS security driver design in a security chip. Background technique [0002] Nowadays, with the increasing popularity of computers and the continuous strengthening and wide application of their functions, the security of computer systems is becoming more and more important. In October 1999, a trustworthy organization was established by Intel, Microsoft, Compaq, HP and IBM The Computer Platform Alliance TCPA (Trusted Computing Platform Alliance, hereinafter referred to as TCPA) is an organization that defines a unified standard for TCPA and its products, with the purpose of contributing to a new generation of trusted hardware platforms. The trusted computing platform module TPM (Trusted Platform Module, hereinafter referred to as TPM) security chip based on this standard has the function of encryption and safe storage, and can monitor the softw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00G06F9/445
Inventor 陈志国张璐
Owner SHENZHEN SINOSUN TECH