Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted computing terminal and trusted computing method

A trusted computing and terminal technology, applied in the field of information security, can solve problems such as the implementation method of trust transfer is not given, the specific method is not given, and the hidden dangers of the trusted terminal system

Inactive Publication Date: 2009-08-26
BEIJING UNIV OF TECH
View PDF0 Cites 65 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

figure 2 In addition to executing the execution processes ②, ④, and ⑥, the trusted terminal system shown in the work also executes the measurement processes ①, ③, and ⑤. However, how to implement the measurement processes ①, ③, and ⑤ is specified in the TCG specification no specific method
[0008] It can be seen from the above scheme that, according to the TCG specification, the establishment of a trusted computing environment depends on an unalterable root of trust and a chain of trust based on the root of trust. However, in the TCG trusted terminal system currently used in the industry, the trusted measurement root stores In the modifiable BIOS, because the trust chain is a one-way transmission chain, any problem in any node will cause the failure of the entire trust environment establishment. Therefore, once the trusted measurement root is tampered with, the trusted terminal cannot The establishment of a trusted computing environment in the system leads to security risks in the trusted terminal system
[0009] In the existing trusted terminal system, the TPM is placed on the LPC bus of the South Bridge as a slave device of the South Bridge chip, and is started by the South Bridge chip. Therefore, it is impossible to start the South Bridge chip itself and before the start actions to provide a trusted computing environment; and, the TCG specification only provides the trusted transfer process below the operating system (Operating System, OS) layer, but does not give a specific implementation method of trust transfer, and cannot provide a trusted computing environment for the OS layer. The above calculations provide a trusted computing environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing terminal and trusted computing method
  • Trusted computing terminal and trusted computing method
  • Trusted computing terminal and trusted computing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The trusted computing terminal provided by the embodiment of the present invention stores the CRTM in a non-tamperable manner, and loads and runs the startup program after the CRTM completes the measurement of the startup program, and starts the trusted computing terminal to perform calculations, thereby establishing a trusted computing environment.

[0053] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0054] image 3 is the structure diagram of the trusted computing terminal provided by the device embodiment of the present invention, as shown in image 3 As shown, the trusted computing terminal includes: central processing unit CPU, south bridge chip ICH, north bridge chip MCH, PCI, RAM, LAN interface, BIOS, trusted platform control module (Trusted Platform ComputingModule, TPCM) and LPC type bu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a trusted computing terminal, which comprises a trusted platform control module TPCM, a central processing unit CPU and an initialization program loading module, wherein the TPCM is used for irreversibly storing a core reliable measure root to measure a code of the initialization program loading module and send an indication that the measurement is finished; the CPU is used for loading and carrying out codes in the initialization program load module after receiving the indication that the measurement of the initialization program loading module by the TPCM is finished; and the initialization program loading module is used for storing initialization program codes of the trusted computing terminal. The embodiment of the invention discloses a trusted computing method simultaneously. The technical proposal disclosed by the embodiment of the invention can establish a trusted computing environment and can extend the trusted computing environment to an OS layer of an operating system.

Description

technical field [0001] The invention relates to the field of information security, in particular to a trusted computing terminal and a trusted computing method. Background technique [0002] As a new development direction in the field of information security, trusted computing has attracted more and more attention from companies and research institutions. The main goal of a trusted computing system is to build a computing environment that users can expect, so as to ensure that computing resources will not be maliciously tampered with or stolen. [0003] The trusted computing system determined by the Trusted Computing Group (Trusted Computing Group, TCG) mainly ensures the security of the entire computer system by enhancing the security of the existing terminal architecture. The main idea is to introduce a trusted architecture on the terminal hardware platform, and improve the security of the trusted computing system through the security features provided by the trusted arch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F9/445G06F21/51G06F21/71
Inventor 张兴沈昌祥李晨刘毅庄俊玺周明毛军捷于昇
Owner BEIJING UNIV OF TECH