Embed type platform guiding of credible mechanism

An embedded and embedded system technology, applied in the direction of program control devices, computer security devices, instruments, etc., can solve the problems of embedded system trust root dependence, difficulty, and poor predictability of modification results, etc., to achieve reliable measurement and the effectiveness of the reporting mechanism

Inactive Publication Date: 2008-02-13
WUHAN UNIV
View PDF0 Cites 57 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Some current architectural improvement schemes, such as relying on USB key and smart card for identity authentication and integrity measurement, have the problem that the root of trust of the embedded system depends on the startup program Bootloader. If t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embed type platform guiding of credible mechanism
  • Embed type platform guiding of credible mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The invention discloses an embedded platform booting method based on a trusted mechanism, specifically: according to the architectural characteristics of the trusted system, the embedded platform and the TPM hardware module (wherein, the TPM hardware module includes trusted measurement root, trusted report root, and trusted storage root), and the initialization of the embedded platform uses a Bootloader with a trust chain structure that is improved on the basis of vivi (a kind of Bootloader). The Bootloader is solidified in in the platform's Flash memory. The TPM first starts from the startup of the system based on the trusted integrity measurement root, and performs integrity verification on the Bootloader, operating system, etc. to ensure that the software in the platform startup chain has not been tampered with, and then allows the CPU to read the Bootloader to start. Since the source code of the Bootloader is open, the credible Bootloader supports TPM to control ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded platform guide on a creditable mechanism, i. e.: placing the embedded platform and a TPM together, and using the TPM to support safety and creditability of the embedded platform; In accordance with the creditability completeness measuring roots and prior to running of the CPU of the embedded platform, the TPM carries out completeness verification for the Bootloader and the operation system which are stored in the embedded platform to ensure that the software executable codes in the platform startup chain is not modified, and then permits the CPU of the embedded platform to read the Bootloader for startup; and the TPM controls the startup process and measures completeness and reliability of the appointed external devices as well as initializes the external devices. The invention is used for completeness measuring of the Bootloader executed at the platform in accordance with the creditability chain structure, ensuring good completeness of the Bootloader, and realizing a reporting mechanism in a creditable environment with a TPM monitoring.

Description

technical field [0001] The invention relates to an architecture for an embedded device to perform safety detection on external devices, especially storage type external devices, during the start-up phase. Background technique [0002] The traditional computer system has the following potential safety hazards: the computer software and hardware structure is simple, which leads to the arbitrary use of computer resources, especially the executable code can be modified, and malicious programs can be implanted; the virus program uses the computer operating system to execute code inconsistent Check for weaknesses, embed virus code into programs that execute code, achieve virus propagation, and more. Therefore, it is necessary to consider the transformation of the traditional computer software and hardware structure. [0003] TCG (Trust Computing Group, Trusted Computing Group) proposed the concepts of "trusted chain" and "trusted measurement", which include a series of trusted me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F9/445G06F21/10G06F21/62
Inventor 赵波张焕国郑鹏黄玮宋伟熊泉
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products