Credible computing system

A trusted computing and trusted technology, applied in the field of information security, can solve the problem of not taking into account the need for real-time updating of BIOS codes, and achieve the effect of improving request response speed and data transmission time, improving flexibility, and realizing security protection.

Inactive Publication Date: 2008-10-08
BEIJING UNIV OF TECH
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage does not take into account t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible computing system
  • Credible computing system
  • Credible computing system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0045] Computer hardware transformation, such as figure 1 Shown:

[0046] 1) Set up a safety controller on the computer hardware platform, and connect the control signal line to the computer motherboard south bridge device controller through the data line.

[0047]2) BOOT ROM and motherboard peripherals are connected to the output terminal of the safety controller through data lines and control signal lines.

[0048] 3) As a slave device, the trusted security module is connected to the computer south bridge device controller through its LPC communication interface or USB communication interface.

[0049] 4) The trusted security module is used as the control terminal and is connected to the security controller through the communication bus for control and data transmission.

[0050] 5) BOOT ROM, security controller, BIOS backup storage unit, identification device and trusted security module use the same power system, and this power system is independent of the power system of othe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted computing system, belonging to the field of information security. The invention is characterized in that a safety controller is provided, the security controller is connected to a system mainboard south bridge controller by communication lines, and a BOOT ROM is connected to the security controller by communication lines; the security controller is also connected to a trusted security module and mainboard peripheral equipment by communication lines; the security controller includes a bus address mapping unit, a security isolation unit, a strategy execution unit, a solidified strategy unit and a dynamic unit. By the cooperation of the trusted security module and the security controller, an access control strategy for the mainboard peripheral equipment is provided, a method for real-time protection of BIOS code management operation is provided, and a function for real-time virus diction of communication data of mainboard peripheral equipment is also provided.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for realizing a hardware platform of a trusted computing system and protecting the security and credibility of the hardware platform. Background technique [0002] In recent years, trusted computing has become a new development direction in the field of information security, and more and more relevant research units have paid attention to it. The trusted computing system is mainly based on trusted security chips to establish a secure computing environment that users can expect to ensure that computing software and hardware resources will not be maliciously tampered with. [0003] The Trusted Computing Group (Trusted Computing Group, TCG) first proposed and specified the trusted computing industry standard. By introducing a security chip on the motherboard, a chain of trust is established step by step, and the security of the chain of trust is guaranteed, and finally ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/22G06F21/56
Inventor 张兴毛军捷姜广智刘贤刚孙瑜庄俊玺李萌萌李瑜
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products