Creditability detection method of computer

A detection method and reliability technology, applied in the computer field, can solve problems such as inability to dynamically add new components, inconvenient system expansion, and increase system maintenance and update costs, so as to facilitate expansion, improve security and verification flexibility, The effect of reducing maintenance and updating costs

Active Publication Date: 2011-10-12
NATIONZ TECH INC
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1) In the existing chain of trust, if an endpoint on the link needs to be updated and maintained, all components under the endpoint need to be updated and adjusted, which greatly increases the maintenance and update cost of the system;
[0008] 2) The existing chain of trust is a one-way linear transfer process. Once a...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Creditability detection method of computer
  • Creditability detection method of computer
  • Creditability detection method of computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The main idea of ​​the present invention is: the ring trust chain structure is supported, and the independent hardware TCM is used as the trusted measurement controller of the whole computer platform. TCM uses physical methods and software-assisted methods to integrate trusted computing roots, trusted storage roots and trusted reporting roots, and has the function of platform identity authentication for itself. When testing the reliability of a computer, the components (also called endpoints) on the circular trust chain use the TCM trusted computing measurement function, and the adjacent components use the cross-measurement mechanism to finally transfer the trust to the TCM, and the TCM completes the platform. reliability report. If the starting point of the measurement is the TCM, the security guidance requirements of the traditional chain trust chain platform can be fulfilled, but the last component to be measured must be required to pass the trust to the TCM, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a creditability detection method of a computer. The method comprises the following steps of: building an annular trust chain, wherein the annular trust chain has end points which sequentially are a trusted cryptography module (TCM), a boot block of a basic input output system (BIOS), a main block, an operating system (OS) loader and an OS kernel; initializing integrity measurement from any one of the end points on the annular trust chain, and sequentially carrying out the integrity measurement along a clockwise direction or an anticlockwise direction of the annular trust chain until the measurement of all end points on the annular trust chain is finished; and after the measurement of the last end point which is subjected to the integrity measurement is finished, transmitting trust to the TCM, and finishing a final creditability report of a computer platform by the TCM. By the creditability detection method of the computer, the safety and validation flexibilityof the computer platform are improved, the maintenance updating cost of a computer system is reduced, and the expansion of the computer system can be facilitated.

Description

technical field [0001] The invention relates to the field of computers, in particular to a computer credibility detection method. Background technique [0002] In the information system based on network and data sharing, the most commonly used terminal computer system is a microcomputer. For the most commonly used microcomputers, only by comprehensively taking measures from chips, motherboards and other hardware, BIOS (Basic Input Output System), operating system and upper-layer application software, can its security be effectively improved. It is flawed to ensure the trustworthiness of software code dynamic running by security measurement, because the intruder can make the software in an untrusted state without destroying the static integrity of software code, so as to achieve the purpose of attack. It is based on this technical problem that the birth of trusted computing was born. The basic idea is to establish a trust in the computer system, and then pass the trust up th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/57
Inventor 周超刘鑫
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products