Fixed hardware security unit backup and recovery method and system

A technology of hardware security and recovery method, the redundancy applied in the operation is used for data error detection, response error generation and other directions, which can solve the problem that attackers leave backdoors, cannot synchronize hardware security units and restore, and affect hardware security units. Firmness and other issues to achieve the effect of overcoming inconsistencies in state information

Active Publication Date: 2009-07-01
LENOVO (BEIJING) CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] When solving the above problems, based on the security considerations of the hardware security unit, it is impossible to use a simple button such as hard disk recovery or a simple command method to allow the hardware security unit to perform "synchronous" recovery
Because this simple recovery interface will directly affect the robustness of the hardware security unit, and it is very easy to leave a back door for the attacker and destroy the existing state of the hardware security unit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fixed hardware security unit backup and recovery method and system
  • Fixed hardware security unit backup and recovery method and system
  • Fixed hardware security unit backup and recovery method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention provides a backup and recovery method and system for a fixed hardware security unit, which is used to meet the requirement that the state information recorded by the fixed hardware security unit is consistent with the state information of its solidified computer equipment or other equipment.

[0070] see reference figure 1 , which is a flow chart of the first embodiment of the method for backing up a fixed hardware security unit according to the present invention.

[0071] The fixed hardware security unit backup method described in the first embodiment of the present invention includes the following steps:

[0072] S100. Through the interaction of the unique identification information of the fixed hardware security unit and the mobile hardware security unit, mutual binding is realized.

[0073] The binding between the fixed hardware security unit and the mobile hardware security unit can be realized through the following steps:

[0074] S101. Set...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a backup method of a fixed hardware safe unit, which comprises that the mutual binding is achieved through the interaction of unique identifying information of the fixed hardware safe unit and a mobile hardware safe unit, first state information and second state information are recorded and backup in the fixed hardware safe unit, the first state information corresponds to the equipment state of the fixed hardware safe unit which is cured, and the second state information of the self state of the fixed hardware safe unit corresponds to the first state information. Through the bonding relationship, the first state information and the second state information are transported to the mobile hardware safe unit. The invention provides a backup and recovering method of the fixed hardware safe unit and a system, the state information which is recorded by the fixed hardware safe unit is consistent with the state information of curing equipment thereof.

Description

technical field [0001] The invention relates to a hardware security system, in particular to a backup method and recovery method for a fixed hardware security unit, a backup system and a recovery system for a fixed hardware security unit. Background technique [0002] Hardware security units based on PCs, servers, mobile phones or other devices, such as TPM (Trusted Root) or TCM (Trusted Cryptographic Module), for security reasons, at the beginning of the design, the hardware security unit is required to have its own CPU, memory, storage space. The space and computing logic of the hardware security unit are not controlled by the devices it serves, such as PCs, servers, mobile phones or other devices. [0003] The internal logic, program flow, key and password management of the hardware security unit is a closed environment, which is completely free from the management and interference of the devices it serves, such as PCs, servers, mobile phones or other devices. Thus, whe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14
Inventor 李希喆田宏萍谢巍谷云毛兴中
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products