Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Credible password module test case creation method and its test system

A test case generation and cryptographic module technology, applied in the computer field, can solve problems such as no method of test case, no system, etc.

Active Publication Date: 2010-01-20
ZHONGKE INFORMATION SECURITY COMMON TECH NAT ENG RES CENT CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] All these analysis and testing methods for TPM or TCM don't give a complete system and don't give a way how to generate test cases from specification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible password module test case creation method and its test system
  • Credible password module test case creation method and its test system
  • Credible password module test case creation method and its test system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0074] First, divide the subsystems of the trusted cryptographic module, and strictly divide them according to the functions realized by each subsystem, so that the dependence of each partitioned subsystem is low; here, the trusted cryptographic module can be divided into the following subsystems: cryptographic subsystem , TCM management subsystem, platform identity management subsystem, storage protection subsystem, identification and authentication subsystem, integrity protection subsystem, trusted path subsystem.

[0075] The dependencies between the various subsystems are as follows: Figure 8 As shown in , where the arrow points to indicate the dependency relationship, for example, the cryptosystem points to the integrity protection subsystem, indicating that the cryptosystem depends on the integrity protection subsystem.

[0076] Second...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a test case generating method and the test system for a credible password module, belonging to the computer technology field. The method in the invention is: modeling inside a subsystem divided by the credible password module, generating the extended finite state machine of the subsystem, then generating the test case through the extended finite state machine; the test system of the invention comprises: a script resolving engine, a result analysis engine, and a communication module. Compared with the existing technology, the test case in the invention can be generated in an automated way, avoided that the integrality of the test in a manual test case can not be confirmed so that the reliability of the test result is not high, and the system in the invention is an automated test system, much manual interpose is reduced, saved the cost.

Description

technical field [0001] The invention relates to a testing method of an embedded system and a system thereof, in particular to a method for generating a test case of a trusted cryptographic module and a testing system thereof, belonging to the technical field of computers. Background technique [0002] Trusted computing platform technology is a new technology to solve security problems through hardware root of trust. Trusted platform module (TPM) is the core and foundation of trusted computing platform, and is the key to the promotion and application of trusted computing platform. The development and application of the trusted computing platform are inseparable from the corresponding technical specifications. In order to promote the development of the trusted computing platform, in 2003, the Trusted Computing Group (TCG) gave the trusted platform module (Trusted PlatformModuel, TPM for short) 1.2 specification defines the functions of TPM in detail. At the same time, in orde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36G06F21/00G06F21/46
Inventor 陈小峰冯登国张敏初晓博李昊
Owner ZHONGKE INFORMATION SECURITY COMMON TECH NAT ENG RES CENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products