Credible device with active control function and authentication method thereof

An active control and trusted technology, applied in the field of information security, can solve problems such as increased design complexity, trusted chip hardware scale and internal firmware scale, and undefined hardware device credibility.

Active Publication Date: 2011-05-18
BEIJING UNIV OF TECH
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

) function requirements are constantly improving, and the design complexity is constantly increasing, which in turn causes the hardware scale and internal firmware scale of the trusted chip to increase continuously
[0003] In the field of computer terminals, the existing trusted computing specifications do not define the reliability and detailed functional requirements of hardware devices on the motherboard platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible device with active control function and authentication method thereof
  • Credible device with active control function and authentication method thereof
  • Credible device with active control function and authentication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The trusted module and the trusted platform control module selected in the present invention all adopt the programmable development board of the trusted platform control module provided by domestic Ruida Information Security Industry Co., Ltd.

[0059] Based on the trusted platform control module programmable development board, a trusted platform control module and a trusted module are developed. The trusted platform control module is connected with the peripheral device controller through a signal line. The trusted module is connected with the trusted hardware device through the signal line.

[0060] Ritar is a large-scale domestic supplier specializing in R&D and production of information security products and an information security solution provider. The devices it provides can be considered authentic.

[0061] The authentication methods of the trusted platform and the trusted platform control module include: a trusted platform initialization method, a trusted pla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible device with an active control function and an authentication method thereof, relating to the field of information security. A credible platform control module with the active control function and a hardware device are connected to a credible platform of the credible device with the active control function, wherein the hardware device are separated into a credible hardware device and an incredible hardware device by the credible platform control module through the active control function, and the credible platform control module is internally provided with hardware units such as an active measurement engine, a control judgment engine, a work mode customizing engine, a credible control policy configuration engine and the like to realize active check on theworking condition configuration information of the hardware device, control policy configuration information, a firmware code and the working condition of a circuit. Mutual binding between the credible platform and the credible hardware is realized through combing the credible platform control module and a credible pipeline technology, the binding process of the credible platform control module and the credible hardware is completely transparent to an operating system and an application program, and the operating system cannot bypass or intervene the process of binding the credible hardware by the credible platform.

Description

technical field [0001] The invention relates to the field of information security, in particular to a trusted device with an active control function and an authentication method thereof. Background technique [0002] With the continuous deepening of research on trusted computing technology, the functional requirements of trusted computing specifications for trusted chips are also increasing. From the earliest TCG1.1 version to the current 1.2 version, from the application of computer terminals to servers, embedded devices, virtual machines, networks, etc., it can be said that trusted chips (trusted chips defined by TCG are called trusted chips) Platform module.) The functional requirements are constantly improving, and the design complexity is constantly increasing, which in turn also causes the hardware scale and internal firmware scale of the trusted chip to continuously increase. [0003] In the field of computer terminals, the existing trusted computing specifications d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/57
Inventor 王昱波毛军捷方娟刘毅张宁
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products