Creditable calculation password platform and realization method thereof

A technology of trusted computing and cryptographic algorithms, applied in computing, computer security devices, instruments, etc., can solve the problems of undefined trusted computing platform operating system, undefined measurement of application program integrity, etc., to increase the degree of attack resistance, Increase the scope of application and apply flexible effects

Inactive Publication Date: 2010-02-17
瑞达信息安全产业股份有限公司
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The trusted computing platform-related specifications published by TCG do not define how to improve the credibility of existin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Creditable calculation password platform and realization method thereof
  • Creditable calculation password platform and realization method thereof
  • Creditable calculation password platform and realization method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention is further described as follows in conjunction with accompanying drawings and embodiments.

[0040] As shown in the figure, a trusted computing cryptographic platform adopts a multi-level structure, and has a hardware system 100 and an operating system 200; the hardware system 100 is connected to the operating system 200; the hardware system 100 has a hardware security module HSM 110 (Hardware Security Module); the hardware security module HSM 110 is bound to the platform, and is an embedded security module ESM 130 (Embedded Security Module) connected to the motherboard, or a pluggable USB / PCI password module 170 / 150, when it is the pluggable USB password module 170, or the PCI password module 150, or when the three all have, then it is a different embodiment; the operating system 200 has an operating system security module, which is accessed by mandatory It consists of a control submodule 220, a process monitoring submodule 240, and an applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a creditable calculation password platform and a realization method thereof, which belong to the technical field of computer safety. The creditable calculation password platform comprises a hardware system and an operation system, wherein the hardware system is connected with the operation system; the hardware system comprises a hardware safety module (HSM); the HSM is bound with the platform and the realization method thereof and comprises an embedded safety module (ESM) or/and an inserted and pulled USB/PCI password module which is connected to a main plate; and theoperation system is provided with an operation system safety module comprising a forced access control submodule, a progress monitoring submodule and an application program integrality measurement identification module. The invention has the advantages of increasing the application range of the creditable calculation password platform and the technique of the realization method thereof, increasingthe self attack resisting degree of the forced access control submodule, the progress monitoring submodule and the integrality measurement identification module, measuring the integrality of the whole platform and the realization method thereof, establishing the creditable environment of the whole platform and the realization method thereof and fully ensuring the benefit of a user of the platformand the realization method thereof.

Description

technical field [0001] The invention relates to a credible computing cryptographic platform and its realization method, which belongs to the technical field of computer security and is especially suitable for occasions with strict computer information security requirements. Background technique [0002] With the development of information technology and related industries, various computing devices are widely used, and these computing devices are connected to each other in various ways to form an information network. Computing devices and information networks have promoted the progress of society, but also brought great security risks. These risks mainly originate from various computing devices. Malicious programs such as computer viruses and Trojan horses are implanted into computing devices, posing a huge threat to system security and data security, making these computing devices no longer "trustworthy". How to ensure the trustworthiness of computing devices has become a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/62
Inventor 刘毅余发江魏天运张大鹏胡晓
Owner 瑞达信息安全产业股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products