Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dependable computing system capable of protecting BIOS and method of use thereof

A trusted computing and trusted technology, applied in the field of information security, can solve the problem of not taking into account the need for real-time BIOS code update, etc.

Inactive Publication Date: 2008-10-08
BEIJING UNIV OF TECH
View PDF0 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage does not take into account the need for real-time update of the BIOS code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dependable computing system capable of protecting BIOS and method of use thereof
  • Dependable computing system capable of protecting BIOS and method of use thereof
  • Dependable computing system capable of protecting BIOS and method of use thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] security architecture

[0041] Taking the trusted computer terminal based on the INTEL architecture as an example, aiming at the incomplete security protection measures for the trusted platform module TPM on the hardware platform of the trusted computing system in the existing technology, a trusted computing module based trusted computer terminal is proposed. The realization of the hardware platform of the information computing system and the method of protecting the security and trustworthiness of the hardware platform, so as to establish a trustworthy computing environment.

[0042] Compared with the traditional TPM trusted platform module system structure and mainboard wiring method specified by TCG (such as figure 1 , figure 2 ), the trusted computing module system structure and main board wiring method proposed in the present invention (such as image 3 , Figure 4 ) The specific improvements are as follows:

[0043] A FIFO unit is added inside the trusted com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted computer system for protecting BIOS and the application method thereof, belonging to the field of information security. The invention is characterized in the physical connective way of a trusted computing module and a BOOT ROM, wherein the trusted computing module is connected to a system mainboard, and the BOOT ROM is connected to the trusted computing module by a communication bus. The trusted computing module comprises a DMA controller, a FIFO unit and a security isolation unit; the DMA controller is used for reading BIOS code to the FIFO unit of the trusted computing module or reading the BIOS code from the FIFO unit to the I / O bus of the trusted computing module; the FIFO unit is used for temporally storing BIOS code to be processed; the security isolation unit is used for preventing vicious procedures outside the trusted computing module from reading confidential information in memory cell inside the trusted computing module. The read / write and update of BIOS code need the identity authentication and password authentication of a current user, ensuring the security of BIOS key code; the equipment access control is realized by hardware method, reaching the effect of active control of mainboard peripheral equipment.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for realizing a hardware platform of a trusted computing system and protecting the security and credibility of the hardware platform. Background technique [0002] In recent years, trusted computing has become a new development direction in the field of information security, and more and more relevant research units have paid attention to it. The trusted computing system is mainly based on trusted security chips to establish a secure computing environment that users can expect to ensure that computing software and hardware resources will not be maliciously tampered with. [0003] The Trusted Computing Group (Trusted Computing Group, TCG) first proposed and specified the trusted computing industry standard. By introducing a security chip on the motherboard, a chain of trust is established step by step, and the security of the chain of trust is guaranteed, and finally ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F9/445G06F21/12
Inventor 张兴毛军捷刘贤刚姜广智孙瑜庄俊玺李萌萌李瑜
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products