Credible computer platform

A computer and trusted technology, applied in computer security devices, computing, internal/peripheral computer component protection, etc., can solve the problems of data encryption protection, insufficient user identity authentication, etc., to improve information security protection capabilities, prevent BIOS from being tampered with, The effect of preventing illegal user login

Inactive Publication Date: 2011-02-16
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a credible computer platform to solve the problems of general computer platform I / O port control, BIOS security protection, data encryption protection and user identity authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible computer platform
  • Credible computer platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] A trusted computer platform, comprising: CPU1, Northbridge 2, Southbridge 3, BIOS chip 4, PCI-E bus 5, power supply chip 6, clock chip 7 and reset chip 8, also includes: Trusted platform controller 9, Trusted cryptographic chip 10, Nandflash memory 11, Norflash memory 12 and SDRAM memory 13; wherein, trusted platform controller 9 includes: microprocessor 14, boot sequence control module 15, BIOS access control module 16, PCI-E bus interface Module 17, cryptographic chip interface module 18, platform identity authentication module 19, platform I / O port control module 20, Nandflash controller 21, Norflash controller 22, SDRAM controller 23 and on-chip bus 24.

[0011] Two-way connection between CPU1 and North Bridge 2, two-way connection between North Bridge 2 and South Bridge 3, bus interconnection in Trusted Platform Controller 9, microprocessor 14, boot sequence control module 15, BIOS access control module 16, PCI-E bus interface module 17 , cryptographic chip interfa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible computer platform, comprising a CPU (1), a North bridge (2), a South bridge (3), a credible platform controller (9), a credible crypto chip (10), a Nandflash storage (11), a Norflash storage (12) and a SDRAM (Synchronous Dynamic Random Access Memory) storage (13). The CPU (1) is bidirectionally connected with the North bridge (2), the North bridge (2) is bidirectionally connected with the South bridge (3), and buses are mutually connected inside the credible platform controller (9). The credible platform controller (9) isolates the South bridge (3) and a BIOS (Basic Input/Output System) chip (4) physically, and when being electrified, the credible platform controller (9) can be used for measuring and recovering BIOS completeness, verifying user identity, controlling the opening and closing of an I/O (Input/Output) port, and performing high-speed encryption/decryption on key data. The invention can be used for effectively controlling malicious codes from entering a computer system and preventing BIOS from falsification and illegal users from logging in, and thus, information safety protection capability of the system is improved.

Description

technical field [0001] The invention relates to a computer platform, in particular to a trusted computer platform. Background technique [0002] A common computer platform includes a central processing unit (CPU), a chipset (south bridge and north bridge), BIOS chips, I / O ports, power supply and clock management modules. However, ordinary computer platforms rarely consider trustworthiness, which provides opportunities for malicious codes to run. First, the many open ports on the platform (such as USB port, network port, serial port, parallel port, etc.) provide a simple and easy way for the invasion of malicious code. Second, the BIOS chip of the existing general-purpose computer platform is directly connected to the south bridge. Once the BIOS is maliciously tampered with, these malicious codes will be loaded when the platform is started, causing the root cause of the computer system to be untrustworthy. Third, the important data of the user is completely visible to the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/20G06F21/72G06F21/74
Inventor 蒋志翔曲新春孙永泉郭灵儿冯博凌
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products