Trusted computation trust root device for computer and computer

A technology of trusted computing and root devices, applied in the computer field, can solve the problem that ordinary computers cannot be installed with secure chips, trusted computing, etc., and achieve the effect of simple security

Inactive Publication Date: 2010-08-04
华北计算技术研究所
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on the problems existing in the above-mentioned prior art, the embodiment of the present invention provides a trusted computing root of trust device and computer for computers, which solves the problem that ordinary computers cannot be installed with security chips to realize trusted computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computation trust root device for computer and computer
  • Trusted computation trust root device for computer and computer
  • Trusted computation trust root device for computer and computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] The first embodiment provides a trusted computing trust root device for computers, which is applied to ordinary computers to enable ordinary computers to have trusted computing functions, such as figure 1 As shown, the trusted computing trust root device includes:

[0024] circuit board 1, interface conversion module 3 and at least one root of trust module 4;

[0025] Wherein, the circuit board 1 is provided with an interface 2, and the interface 2 can adopt a PCI interface or a PCI-E interface or a USB interface, which is connected to the PCI interface or PCI-E interface of the computer motherboard (that is, the PCI slot on the computer motherboard or the PCI-E interface). PCI-E slot) or USB interface; when interface 2 adopts PCI interface or PCI-E interface, it is generally the PCI interface or PCI-E interface formed by the electrical connection between the interface module and the golden fingers printed on the circuit board. The golden finger on the circuit board re...

Embodiment 2

[0033] The second embodiment provides a trusted computing root of trust device for computers, which is applied to an ordinary computer to enable the ordinary computer to have a trusted computing function. The structure of the root of trust device is basically the same as the root of trust device given in the first embodiment above. The same, the difference is that the root of trust device in this embodiment is also provided with an identity recognition module 5 and a main control module 6, such as image 3 As shown, the identity recognition module 5 and the main control module 6 of the root of trust device are both arranged on the circuit board 1, the identity recognition module 5 and the main control module 6 are respectively electrically connected with the interface conversion module 3, and the main control module 6 is respectively connected with the identity Identification module 5. Each root of trust module is electrically connected;

[0034] Described identity recognition...

Embodiment 3

[0043] The third embodiment provides a computer, such as Figure 5 shown, the computer includes:

[0044] The host 21, the trusted computing trust root device 25, the storage device (not shown in the figure), the input device 22 and the output device 23; wherein the host 21 is provided with a main board 24, and the trusted computing trust root device 25 adopts the above-mentioned The trusted computing trust root device given in the first embodiment;

[0045] The storage device, the input device 22 and the output device 23 are all electrically connected to the mainboard 24 in the host 21; the trusted computing trust root device 25 is connected to the PCI slot or PCI of the mainboard 24 in the host 21 -E slot or USB interface is electrically connected with the motherboard 24.

[0046] The hardware structure of the computer is basically the same as that of an ordinary computer. The difference is that the computer also includes a trusted computing root of trust device. By connec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a trusted computation trust root device for a computer and the computer. The device comprises a circuit board, an interface conversion module and at least one trust root module, wherein the circuit board is connected with an interface, the interface is matched with a PCI (Programmable Communication Interface), a PCI-E interface or a USB interface of a computer motherboard, the interface conversion module and the trust root module are both arranged on the circuit board, the interface conversion module is used for exchanging data between the interface of the circuit board and the PCI interface, the PCI-E interface or the USB interface of the computer, and the trust root module is used for carrying out secret key production and encryption and decryption treatment, storing a secret key and sensitive data and supplying integrity measurement, data safety protection and identity authentication information. The device can be used for an ordinary computer to enable the ordinary computer to have the safety of a trusted computer.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a trusted computing trust root device for computers and a computer. Background technique [0002] Traditional security means are often concentrated at the network boundary, which is a misunderstanding of people's treatment of information security. In fact, endpoints are where important data is created and stored, and the vast majority of attacks originate from endpoints. Investigating the root cause, security problems are mainly caused by the insecurity of the terminal architecture and operating system. For example, resources may be used arbitrarily, especially the executable code can be modified, and malicious programs can be implanted into attack programs. What is serious is that there is no strict access control for legitimate users, and access beyond the authority can be performed, resulting in unsafe incidents. Traditional security methods overemphasize ease of use, whil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/72G06F21/85
Inventor 李光牛峰吴悠郝福珍王江少张拥政张淑芬张心臻唐海张玉张鹏范耀学章文康葛小蔓张金霞杨红郑玉冰马文龙吴迪贾立宗从秀芳刘绍方
Owner 华北计算技术研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products