Hardware security unit

A hardware security, computing unit technology, applied in computer security devices, instruments, computing, etc., to achieve the effect of flexible operation and improved user experience

Active Publication Date: 2009-07-15
LENOVO (BEIJING) LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The purpose of the present invention is to provide a hardware security unit to solve the problem of using binary logic judgment to serve the entire chain of trust in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware security unit
  • Hardware security unit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The invention provides a hardware security unit, which solves the problems encountered in the prior art when binary logic judgment is used to serve the entire trust chain.

[0034] see figure 1 , which is a structural diagram of the first embodiment of the hardware security unit of the present invention.

[0035] The hardware security unit 1 in the first embodiment of the present invention adopts two multi-valued logic calculation units, an operation unit 13 , a judgment unit 14 and an execution unit 15 . The two multi-valued logic computing units are specifically a first multi-valued logic computing unit 11 and a second multi-valued logic computing unit 12 .

[0036] Both the first multi-valued logic computing unit 11 and the second multi-valued logic computing unit 12 respectively include three registers.

[0037] The first register 111 of the first multi-valued logic computing unit describes the expected logic state of the specific functional entity corresponding t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hardware safety unit which at least comprises a first multivalued logic calculating element, a second multivalued logic calculating element, an operation element, a judging element and an implementing element. The first and second multivalued logic calculating elements are respectively connected with the operation element. Each multivalued logic calculating element comprises at least three registers. The operation element calls multivalued logic operators in a third register of the second multivalued logic calculating element, respectively calculates an expected logic state and a current logic state of the second multivalued logic calculating element and the first multivalued logic calculating element according to the multivalued logic operators, and obtains an expected logic operation result and a current logic operation result; the judging element judges if the current logic operation result achieves the expected logic operation result; the implementing element implements the corresponding operation according to the judged result which is judged by the judging element. The invention provides a hardware safety system and solves the problem in the process of adopting two-valued logic judgement to serve for the whole trust chain.

Description

technical field [0001] The invention relates to a hardware security system, especially a hardware security unit. Background technique [0002] In the existing TCG (Trusted Computing Group, Trusted Computing Group) and national standard security chip specifications, it is defined that security chips, that is, hardware security units, must serve the entire trust chain based on binary logic (true, false) judgments. [0003] Under the 2-value logic, the security chip mainly provides three functions: [0004] 1. Platform measurement, which provides comparison of measurement results, and restricts the use of entities in the chip, such as keys, when the measurement result is True. [0005] 2. Key management, according to the platform measurement results and authorization results are both True, the generation, loading, use, and destruction of keys are performed. [0006] 3. Cryptography service, when the platform measurement result and authorization result are both True, cryptolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
CPCG06F21/57G06F2221/2153
Inventor 李希喆田宏萍谢巍谷云
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products