Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted computing platform and method for verifying trusted chain transfer

A technology of trusted computing and trust chain, applied in the field of information security, can solve the problem of transmission trust decay and other problems

Inactive Publication Date: 2010-12-01
BEIJING UNIV OF TECH
View PDF3 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Effectively solve the problem of trust decay with the transfer of the trust chain and defend against TOCTOU attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing platform and method for verifying trusted chain transfer
  • Trusted computing platform and method for verifying trusted chain transfer
  • Trusted computing platform and method for verifying trusted chain transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention will be described in detail below in conjunction with the accompanying drawings and examples of implementation.

[0069] 1. Hardware Composition of Trusted Computing Platform

[0070] A kind of trusted computing platform, it is characterized in that, hardware composition comprises: processor, trusted platform control module, clock frequency generator, display device controller, memory device, north bridge controller, south bridge controller, peripheral equipment and BOOT ROM;

[0071] In actual application, the specific configuration is as follows:

[0072] 1) Asustek P5K-VM, an Intel G33 motherboard, is selected as the motherboard of the Trusted Computing Platform;

[0073] 2) The processor uses Intel's Core 2 processor, and a control switch needs to be set on the clock input signal interface and reset interface of the processor, which is used for the trusted platform control module to control the stop, continue, and reset of the processor;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a trusted computer platform and a method for verifying trusted chain transfer. A trusted chain is a key component of a trusted computer system, and ensures the safety and credibility of the computer system in the integral process from a trusted source to system starting, but the conventional trusted transfer mode is a chained transfer mode, and due to the problem of layer-by-layer attenuation of the trust level of chained transfer, potential safety hazards exist in the process of establishing the trusted chain of the trusted computer platform. A CPU is authorized by a trusted platform control module (TPCM) to perform chained measurement on the trusted computer platform, and simultaneously, the TPCM follows the CPU to perform the real-time, random and partitioned measurement on the trusted chain, and check points are embedded into codes of each part of the platform trusted chain to perform statistics and comparison on total operating time and total expected time and the operating time and expected time of each partition so as to judge whether each trusted node is distorted or not. The trusted computer platform and the method for verifying the trusted chain transfer improve the real-time of establishment and checking of the trusted chain, and particularly can protect against TOUTOC attack.

Description

technical field [0001] The invention relates to the field of information security, in particular to a verification method in the trust chain transfer process in a trusted platform. Background technique [0002] In network-based information systems, terminal computers can only effectively improve their security by comprehensively taking measures from chips, motherboards and other hardware BIOS, operating system and other underlying software. It is based on this technical problem that the birth of trusted computing is born. , the basic idea is to first establish a root of trust in the computer system, and then establish a chain of trust, one level of measurement and certification, one level of trust, one level of trust, and extend the trust relationship to the entire computer system, thereby ensuring the credibility of the computer system . Therefore, root of trust and chain of trust delivery are fundamental issues in trusted computing. [0003] In the technical field, trust...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/57
Inventor 方娟姜广智毛军捷
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products