Credible platform module and active measurement method thereof

An active measurement and platform technology, applied in the field of information security, can solve problems such as establishing a trusted computing environment, failure to establish a trusted environment, and security of trusted terminal systems

Inactive Publication Date: 2009-12-09
BEIJING UNIV OF TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the chain of trust is a one-way transmission chain, any problem in any node will cause the establishment of the entire trust environment to fail. Therefore, once the trusted measurement root is tampered with, it is impossible to establish a trusted computing environment in the trusted terminal system , leading to security risks in the trusted terminal system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible platform module and active measurement method thereof
  • Credible platform module and active measurement method thereof
  • Credible platform module and active measurement method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] TPCM hardware composition structure

[0046] The trusted platform module adopts the classic SOC design scheme, and mainly completes the basic functions of TPCM (see figure 1 ). The internal implementation of the chip includes CPU, non-volatile storage unit, volatile storage unit, random number generator, cryptographic algorithm engine, key generator, timer, control unit, active measurement unit, input-output bridge unit and bus control device, and these functional units are mapped to the access address space of the on-chip microprocessor by the input-output bridge unit. In addition, in addition to the LPC controller, the chip is equipped with multiple controller interfaces to adapt to different motherboard buses.

[0047] Among them, the active measurement unit, which includes a data access module, a data analysis module, a hash algorithm module and a synchronous clock module, is used to actively read the external information to be measured after the TPCM is powered o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted platform module and an active measurement method thereof, which relate to the field of information safety. The trusted platform module TPM is a root of trust of a trusted computing platform and a core module of trusted computing; the invention points out CRTM constitution of a root core of measurement in a TPM chip and a problem of establishing an information chain, proposes a new design proposal of the trusted platform module and the measurement method with an active mode based on the trusted platform module, designs the root of trust for measurement of the platform in the trusted platform module, solves the safety threat on the root of trust caused by tampering the BIOS and utilizes the module as the root of trust to establish a trust chain with the active mode. The invention names the module as a Trusted Platform Control Module TPCM and reflects the control function of the root of trust in the whole platform.

Description

technical field [0001] The invention relates to the field of information security, in particular to a trusted platform module and its active measurement method. Background technique [0002] The basic idea of ​​trusted computing proposed by the International Trusted Computing Organization TCG is to build a root of trust, and start from the root of trust, use the method of hash measurement to establish a verifiable chain of trust, from the hardware platform From the BIOS, the operating system, to the application, one level of verification is required to extend this trust to the entire computer system to ensure that the computer system is credible. [0003] TCG has launched a series of specifications centered on TPM (Trusted Platform modules), using TPM as the root of trust to establish a chain of trust from the underlying hardware to the operating system to form a trusted platform. [0004] Three trust roots are given in the TCG specification, trusted storage root, trusted r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/71
Inventor 张兴刘贤刚庄俊玺毛军捷李晨蒋敏慧黄宁玉李瑞华刘智君孙瑜姜广智
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products