Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for dynamically reconfiguring trust chain

A technology of dynamic reconstruction and chain of trust, which is applied in the fields of instruments, computing, and electronic digital data processing, etc., can solve the problems of lack of measurement theory and methods for software dynamic credibility, and achieve the effect of avoiding broken chains and damages of trust chains

Active Publication Date: 2012-03-28
淄博浪潮信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Trust measurement is the foundation of trusted computing, but there is still a lack of measurement theory and methods for software dynamic credibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for dynamically reconfiguring trust chain
  • Method for dynamically reconfiguring trust chain
  • Method for dynamically reconfiguring trust chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be described in detail below through specific embodiments and accompanying drawings.

[0025] In a trusted computing environment that follows the "Trusted Computing Cryptographic Support Platform Function and Interface Specification", since the server needs to run continuously for a long time, the server relies on hot-swapping technology to replace faulty components or expand and upgrade, and uninstall or load specific modules. new modules etc. All of these will lead to a change in an environment in the static trust chain, resulting in a broken chain of the trust chain. Therefore, in a server trusted environment, once a certain link of the chain of trust changes, it is necessary to start from this link, and the extended measurement module (EMM) of the operating system will reconstruct the trust chain. The reconstruction includes the following process:

[0026] 1) When adding a new component j, the reconstruction process of the trust chain is:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for dynamically reconfiguring a trust chain. The method is characterized in that: an operating system measures information of an original PCR value, a measurement value and a new PCR value recorded by an event log in a trusted computing environment following'Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing'; when an extended measurement module (EMM) of the operating system causes change of the trust chain because of adding components or deleting the components, unloading specific modules or loading new modules,or because the operating system generates asynchronous events or the extended measurement module (EMM) of the operating system measures the added components or modules, the trust chain needs reconfiguring to ensure that a computer can maintain the complete trust chain so as to reflect the current trusted state of the computer in real time and prevent the trust chain from being broken and damaged because of the change of the trust chain.

Description

technical field [0001] The invention relates to the technical field of computer information security, a method for reconstructing a trust chain by an operating system extended measurement module EMM by measuring information such as original PCR values, measurement values, and new PCR values ​​recorded in event logs. Background technique [0002] Trusted computing refers to the introduction of security chip architecture into the hardware platform of computing equipment, and the security features provided by it can improve the security of the system, thus fundamentally realizing the active defense against various unsafe factors. Its core is to establish a trust mechanism between users and computers and network platforms. Trusted computing can be understood from several aspects: (1) user identity authentication, which is the trust of the user; (2) the correctness of the platform software and hardware configuration, which reflects the user's trust in the platform operating envir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/50
Inventor 李清玉
Owner 淄博浪潮信息科技有限公司