Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted hardware equipment and using method thereof

A hardware device and reliable technology, applied in the field of information security, can solve the problems of not being able to understand the security situation, not being able to guarantee the security of the design and production process, etc.

Active Publication Date: 2011-11-30
BEIJING UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is impossible for us to study foreign hardware devices and chips very clearly, let alone understand their security status
Since domestic chip design and production tools are almost completely monopolized by foreign products, we can guarantee the security of the hardware design scheme, but cannot guarantee the security of the design and production process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted hardware equipment and using method thereof
  • Trusted hardware equipment and using method thereof
  • Trusted hardware equipment and using method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] The present invention will be described in detail below in conjunction with the accompanying drawings and examples of implementation.

[0103] 1. Composition of trusted hardware devices

[0104] Trusted hardware devices mainly include hardware circuit part, firmware code part, control strategy part and working mode configuration part. like figure 1 As shown, the hardware circuit part includes: trusted module (TM), policy storage unit, configuration storage unit, firmware storage unit, confidential data storage unit, bus controller, basic hardware function circuit, circuit working status checkpoint, external bus interface , platform bus interface, restore default button and update button.

[0105] 1. Implementation method of the hardware circuit part:

[0106] 1) The hardware structure implementation method of the trusted module is as follows:

[0107] Execution engine: choose a 32-bit RISC processor (ARM9 processor).

[0108] Internal bus: use 32-bit AMBA bus.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses trusted hardware equipment and a using method thereof, which belong to the field of trusted computing. A trusted module with control function in the trusted hardware equipment is used for checking operating state and completeness of the trusted hardware equipment. The checking contents include but are not limited to a firmware code of a basic hardware functional circuit, operating mode configuration information, control strategy configuration information, a session key, an equipment certificate, trusted interaction-based controlled function, operating state of the basic hardware functional circuit and the like. The trusted module can verify a trusted computing platform digital signature or encrypted data packet including the firmware code, the operating mode configuration information, the control strategy configuration information, the session key and the equipment certificate and store the verified data packet into the firmware memory unit, the configuration memory unit, the strategy memory unit and the private data memory unit of the trusted hardware equipment. The equipment and the method provide a judgment means for judging the creditability and trustiness of the hardware equipment for a trusted computing platform.

Description

technical field [0001] The invention relates to the field of information security, in particular to a trusted hardware device. Background technique [0002] At present, the technical reasons for information security accidents are mainly the simplification of the current computer software and hardware structure, which leads to illegal use of resources. In order to solve hidden dangers of information security, trusted computing needs to start with improving the terminal's own protection capabilities and solve information security problems from the source. For example: hardware devices (especially SOC chips) are the basis of the entire computing system. Other system software, application software, and even information security systems are built on chips. If the hardware is not secure, all our efforts will be in vain. It is impossible for us to study foreign hardware devices and chips very clearly, let alone understand their security status. Since domestic chip design and pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F13/38G06F21/57
Inventor 沈昌祥毛军捷胡俊刘毅
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products